Security Recommendations
Rockwell has developed an architecture for security information. For more details, refer to the following enterprise manuals available in the literature library:
- SECURE-UM001 - Configure System Security Features (User Manual)
- SECURE-RM001 - System Security Design Guidelines (Reference Manual)
- SECURE-AT001 - CIP security with Rockwell Automation Products Application Technique
It is recommended to follow the organizational security requirements and policies for setting up and operating the system. Some recommendations are below:
- Follow your organization's guidelines for user management, user creation, access control, etc.
- Set a complex password as per the company policy.
- Obtain a certificate from an approved CA as per your organization’s guidance and configure TLS on the platform. The key size of the certificate must be at least 2048 bits and must use the SHA-256, SHA-384, or SHA-512 algorithm for digital signatures.
- Non-administrative users should not be allowed to change the configuration.
- Configure firewalls and harden the infrastructure as recommended by the IT/security team in the environment.
Provide Feedback