This website uses Google Analytics. Please click here to prevent Analytics from tracking your surfing behavior. Click here to stop the tracking.

Top 10 Commandments of Industrial Data Communication

Bring your own machine (BYOM)

Just as IT managers are now used to controlling access to their networks from personal devices like smart phones and tablets - catchword: bring your own device (BYOD) - the same diligence has to be applied to the security of automation and process control systems and networks as nowadays machines and other devices are much more communicative.

 

In relation to the Top 10 Threats of the BSI 1), our experts have phrased and compiled the most important security aspects for "Safer Security" as "Top 10 Commandments" for you.

Measure catalog  PDF

Top 10 Commandments of Industrial Data Communication
CommandmentExplanation
1. Be unique!
  • use only individual access data (password, login)
  • prohibit standard -passwords (initial state, default settings)
2. Build fire compartments!
  • segment data networks to minimise the "range" of remote accesses
3. Be closed!
  • allow only outgoing and encrypted connections, like VPN and icom Connectivity Suite – VPN
  • restrict the communication of existing devices that cannot be updated using firewall routers
4. Don't let strangers in!
  • use firewalls and filters
5. Don't let one lure you out of the house!
  • don't click on unknown web links, like in e-mails
  • don't react on any communication attempt of unknown participants
6. Ask for the password!
  • permit a connection establishment only upon authentication
7. Control servant's entrances!
  • set up secure remote accesses for manufacturers and external service providers
  • prohibit unrestricted back doors
8. Allow yourself a mudroom!
  • establish a demilitarised zone (DMZ)
9. Deal with safe partners only! 
  • transmit data only via secure VPN connections (VPN tunnels)
10. Wash your hands!
  • also keep field devices up-to-date via firmware updates
  • install and run only services that are necessary for operation
  • a reset to default settings must delete everything: configuration, log files, security certificates, user names and passwords

 1) Source: BSI-CS 029 | Version 1.00 dated April 12, 2012   Web link 

Callback Service
Do you need more
information?
Ask for a callback!