Introduction

Your PC system can run various applications to enhance security in your control environment. The system has factory default settings that require reconfiguration to align with Schneider Electric device hardening recommendations of the defense-in-depth approach.

A topic dedicated to cyber security is available in the support area of the Schneider Electric website.

Defense-In-Depth Approach

In addition to the solutions presented in this book, the recommendation is to follow the Schneider Electric defense-in-depth approach as described in the following STN guide:

  • Book title: How can I ... Reduce Vulnerability to Cyber Attacks? System Technical Note, Cyber Security Recommendations

  • Website link description (book description): How Can I Reduce Vulnerability to Cyber Attacks in PlantStruxure Architectures?

Managing Vulnerabilities

Reported vulnerabilities from Schneider Electric devices are notified in the Cybersecurity support webpage: http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page.

If you face a cyber security incident or vulnerability not mentioned in the list provided by Schneider Electric, you can report this incident or vulnerability by clicking Report an incident or vulnerability button in the Cybersecurity support webpage.