CM 1542-1Operating Instructions, 07/2019, C79000-G8976-C355-04 27Configuration, programming 44.1 Security recommendationsKeep to the following security recommendations to prevent unauthorized access to thesystem.General● You should make regular checks to make sure that the device meets theserecommendations and other internal security guidelines if applicable.● Evaluate your plant as a whole in terms of security. Use a cell protection concept withsuitable products.● Do not connect the device directly to the Internet. Operate the device within a protectednetwork area.● Keep the firmware up to date. Check regularly for security updates of the firmware anduse them.● Check regularly for new features on the Siemens Internet pages.– Here you can find information on Industrial Security:Link: (http://www.siemens.com/industrialsecurity)– Here you can find information on security industrial communication:Link: (http://w3.siemens.com/mcms/industrial-communication/en/ie/industrial-ethernet-security/Seiten/industrial-security.aspx)– You can find a publication on the topic of network security (6ZB5530-1AP02-0BA5)here:Link:(http://w3app.siemens.com/mcms/infocenter/content/en/Pages/order_form.aspx?nodeKey=key_518693&infotype=brochures)Enter the following filter: 6ZB5530Physical accessRestrict physical access to the device to qualified personnel.Network attachmentDo not connect the CM directly to the Internet. If a connection from the CM to the Internet isrequired, arrange for suitable protection before the CM, for example a SCALANCE S withfirewall.