DOCA0260EN-00

Schneider Electric's Approach on Cybersecurity

Schneider Electric adheres to industries best practice in the development and implementation of control systems. This includes a defense-in-depth approach to secure an industrial control system. This approach places the controllers behind one or more firewalls to restrict access to authorized personnel and protocols only.

WARNING
UnAUTHENTICATED aCCESS AND SUBSEQUENT UNAUTHORIZED OPERATION
  • Evaluate whether your equipment or complete environment are connected to your critical infrastructure. If so, take appropriate steps in terms of prevention, based on defense-in-depth, before connecting the automation system to any network.
  • Limit the number of devices connected to a network inside your company.
  • Isolate your industrial network from other networks inside your company.
  • Protect any network against unintended access by using firewalls, VPN, or other, proven security measures.
  • Monitor activities within your systems.
  • Prevent subject devices from direct access or direct link by unauthorized parties or unauthenticated actions.
  • Prepare a recovery plan including backup of your system and process information.
Failure to follow these instructions can result in death, serious injury, or equipment damage.
Feedback
QR Code is a registered trademark of DENSO WAVE INCORPORATED in Japan and other countries.