109
14 Cybersecurity Best Practice
It’s important to locate the Inverter in a secure network zone (e.g., SCADA network
or PCN), that is blocked from direct communication with the Internet and/
orCorporate IT networks by network security devices (e.g., firewalls). This
networkisolation concept is a best practice recommendation based on the Purdue
ReferenceModel (PRM), an industry leading Industrial Control System (ICS)
cybersecuritymodel adopted by standards and frameworks such as the ISA 62443,
NISTCybersecurity Framework, and NERC CIP.
For more information, please reference “Secure Network and Firewall
Deployment Recommendations for SCADA Systems” by the Cybersecurity and
Infrastructure Security Agency (CISA)
. cisa.gov/ics/Abstract-
Firewall-Deployment-ICS-Networks-RP
Содержание SG3425UD-MV
Страница 2: ......
Страница 35: ...27 System Manual 5 Mechanical Installation...
Страница 121: ...M H 002011 www sungrowpower com Sungrow Power Supply Co Ltd...