Cybersecurity Information
General Cybersecurity Information
In recent years, the growing number of networked machines and production plants has seen a corresponding increase in the potential for cyber threats, such as unauthorized access, data breaches, and operational disruptions. You must, therefore, consider all possible cybersecurity measures to help protect assets and systems against such threats.
To help keep your Schneider Electric products secure and protected, it is in your best interest to implement the cybersecurity best practices as described in the Cybersecurity Best Practices document.
Schneider Electric provides additional information and assistance:
-
Subscribe to the Schneider Electric security newsletter.
-
Visit the Cybersecurity Support Portal web page to:
-
Find Security Notifications.
-
Report vulnerabilities and incidents.
-
-
Visit the Schneider Electric Cybersecurity and Data Protection Posture web page to:
-
Access the cybersecurity posture.
-
Learn more about cybersecurity in the cybersecurity academy.
-
Explore the cybersecurity services from Schneider Electric.
-
Cybersecurity Principles
This system hardening guideline can help you to follow best practices to improve the security of your system.
Passwords
-
Passwords should include upper case, lower case, number and special characters.
-
The password must have 10 characters minimum.
-
The password should not be easily found in the dictionary and a phrase is preferred.
-
Passwords should be changed frequently, at least once a year.
-
A default Admin password must be changed immediately when first received and after a factory reset.
-
Never reuse passwords.
-
After first login, change default password for local access.
Network
-
IoT devices should only be connected to your building’s private internal network.
-
IoT devices should not be made directly accessible from internet. Ensure that you DO NOT use port forwarding to access an IoT device from the public internet.
-
An IoT device should be on its own network segment. If your router supports a VLAN or other form of network segmentation, the IoT device should be located there.
-
Use the strongest Wi-Fi® encryption available.