DOCA0371EN-00

Overview

The objective of cybersecurity is to provide increased levels of protection for information and physical assets from theft, corruption, misuse, or accidents while maintaining access for their intended users. There are many aspects to cybersecurity including designing secure systems, restricting access using physical and digital methods, identifying users, as well as implementing security procedures and best practice policies.

This section provides information on how to secure your system from a malicious cyber-attack.

Refer to Schneider Electric’s product security brochure for Recommended Cybersecurity Best Practices.

To communicate a security topic affecting a Schneider Electric product or solution, go to Vulnerability Management Policy.

NOTICE
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY, AND CONFIDENTIALITY
Change default passwords or passcodes to help prevent unauthorized access to device settings and information.
Disable unused ports or services and default accounts, where possible, to minimize pathways for malicious attacks.
Place networked devices behind multiple layers of cyber defenses (such as firewalls, network segmentation, network intrusion, detection and protection).
Use cybersecurity best practices (for example: least privilege, separation of duties) to help prevent unauthorized exposure, loss, modification of data and logs, interruption of services, or unintended operation.
Failure to follow these instructions can result in unintended data loss or loss of application function.
QR Code is a registered trademark of DENSO WAVE INCORPORATED in Japan and other countries.

Was this helpful?