Search FAQs
General Security Recommandations - Easergy Sepam series
We strongly recommend the following industry cybersecurity best practices such as:
*To configure Access control List at Device level use the IP filtering features in the SEPAM, ACE850 Advanced Parameters.
- Configure IP Access Control List and restrict connection to the devices *
- Locate control and remote devices behind firewalls, and isolate them from the business network.
- Physical controls should be in place so that no unauthorized person would have access to the ICS, peripheral equipment or the ICS
- All Settings software should be kept in locked cabinets and should have restricted connection to network for the devices that it is intended.
- Laptops that have connected to any other network besides the intended network should never be allowed to connect to the control networks without proper sanitation.
- Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the any untrusted network.
*To configure Access control List at Device level use the IP filtering features in the SEPAM, ACE850 Advanced Parameters.
Released for:Schneider Electric Hong Kong
Explore more
Range:
Explore more
Range: