All-round protection with Industrial Security - Plant Security
With the rising use of Ethernet connections right into the field level, security issues in the industry are also gaining increasing significance. There are enormous chances but also large risks in open communication and the increased networking of production systems. In order to protect an industrial plant from attacks in terms of security, appropriate measures have to be taken.
Siemens offers a multi-layered concept with Defense in Depth according to the recommendations of ISA 99/ IEC 62443 that protects the plant all-round but also in depth. The concept is based on the following components:
- Plant security
- Network security
- System integrity
Whilst classic plant security thwarts physical access, network security and the protection of system integrity safeguards from cyber attacks and unauthorized access by users or people not belonging to the company. Here, you can find an overview arranged in themes with links to the most important entries.
|Plant security||Network security||System integrity|
Plant security prevents physical access to critical components. This starts with the classic access to the building at the porter right to the securing of sensitive areas by means of code cards.
Organizational measures and particularly the introduction of a security management processes are another indispensable component to permanently secure plant security. The aim is to keep unauthorized persons out and to complicate the deliberate installation of harmful software or to prevent industrial espionage.
Siemens provides products and solutions with industrial security functions that support the secure operation of plants, systems, machines and networks. In order to protect plants, systems, machines and networks against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept. Siemens’ products and solutions only form one element of such a concept. Customer is responsible to prevent unauthorized access to its plants, systems, machines and networks. Systems, machines and components should only be connected to the enterprise network or the internet if and to the extent necessary and with appropriate security measures (e.g. use of firewalls and network segmentation) in place. Additionally, Siemens’ guidance on appropriate security measures should be taken into account. For more information about industrial security, please visit http://www.siemens.com/industrialsecurity.
Siemens’ products and solutions undergo continuous development to make them more secure. Siemens strongly recommends to apply product updates as soon as available and to always use the latest product versions. Use of product versions that are no longer supported, and failure to apply latest updates may increase customer’s exposure to cyber threats.To stay informed about product updates, subscribe to the Siemens Industrial Security RSS Feed under http://www.siemens.com/industrialsecurity.