Data Security

Professional planning and design is an important requirement for securing data confidentiality, availability and integrity.

Random Influences

Data transmission and processing can be disrupted by random influences, such as temporary electromagnetic disturbances. Proper setup can significantly reduce the likelihood of corruption or destruction of data.

For additional information see: EMC Installations.

Deliberate Influences

Use in ETHERNET Areas

ETHERNET products are designed for use in local networks. Please note the following when using ETHERNET products in your system:

  • Do not connect control components and control networks to an open network such as the Internet or an office network.
    WAGO recommends putting control components and control networks behind a firewall.
  • In the control components, close all ports and services (e.g., for WAGO-I/O-CHECK and CODESYS) not required by your application to minimize the risk of cyber attacks and to enhance cybersecurity.
    Only open the ports and services for the duration of the commissioning/configuration.
  • Limit physical and electronic access to all automation components to authorized personnel only.
  • To reduce the risk of unauthorized access to your system, change the default passwords before initial commissioning.
  • To reduce the risk of unauthorized access to your system, regularly change the passwords used.
  • To verify that the measures taken meet your security requirements, regularly perform threat analyses.
  • To restrict access to and control of individual products and networks, employ a “defense-in-depth” mechanism in your system’s security configuration.

Additional documents

All the documentation and information is available at: www.wago.com.

Use of Cloud Services

Note

Please note the risks of using cloud services!

If you use third-party cloud services, sensitive data is transferred to the cloud service provider on your own responsibility. External access may result in manipulated data and/or unwanted control commands affecting the performance of your control system.

  • Use encryption methods to protect your data.
  • Observe the information provided by the Federal Office for Information Security – “Cloud: Risks and Security Tips.”
  • Observe comparable publications of the responsible authorities of your country.

Additional information is available at: www.bsi.bund.de.