Cybersecurity overview
Network Administrators, System Integrators and personnel that commission, maintain or dispose of a device should:
- Apply and maintain the device’s security capabilities. See Device security capabilities for details.
- Review assumptions about protected environments. See Protected environment assumptions for details.
- Address potential risks and mitigation strategies. See Potential risks and compensating controls for details.
- Follow recommendations to optimize cybersecurity.
Your device has security capabilities that:
- Allow it to be part of a NERC CIP compliant facility. Go to the North American Electric Reliability Corporation website for information on NERC Reliability Standards.
- Align with cybersecurity standards in the IEC 62443 international standard for business IT systems and Industrial Automation and Control Systems (IACS) products. Go to the International Electrotechnical Commission website for information about the IEC 62443 international standard.
To report a security topic affecting a Schneider Electric product or solution, go to the Schneider Electric Vulnerability Management Policy website.
warning
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY, AND CONFIDENTIALITY
| ● | Change default passwords to help prevent unauthorized access to device settings and information. |
| ● | Disable unused ports/services and default accounts, where possible, to minimize pathways for malicious attacks. |
| ● | Place networked devices behind multiple layers of cyber defenses (such as firewalls, network segmentation, and network intrusion detection and protection). |
| ● | Use cybersecurity best practices (for example: least privilege, separation of duties) to help prevent unauthorized exposure, loss, modification of data and logs, interruption of services, or unintended operation. |
Failure to follow these instructions can result in death, serious injury, or equipment damage.