18 Rockwell Automation Publication 1734-UM013N-EN-P - September 2017
Chapter 1 POINT Guard I/O Overview
Securing the System
To secure access to the [device] by authorized users only, consider these options:
• Password protect the source and execution of the control program
• Remove the key from the controller
• Deploy EtherNet/IP devices in accordance with recommended
architectures and concepts. See the Converged Plantwide Ethernet
(CPwE) Design and Implementation Guide, publication ENET-TD001
• Implement physical barriers, such as locked cabinets
To secure access to the system, consider these options:
• Follow industry best practices to harden your personal computers and
servers, including anti-virus/anti-malware and application whitelisting
solutions. These recommendations are published in Knowledgebase article
KB546987
.
• Develop and deploy backup and disaster recovery policies and procedures.
Test backups on a regular schedule.
• Minimize network exposure for all control system devices and systems, and
verify that they are not accessible from the Internet.
• Locate control system networks and devices behind firewalls and isolate
them from the business network.
• Subscribe to Rockwell Automation's Security Advisory Index,
Knowledgebase article KB54102
so you have access to information about
security matters that affect Rockwell Automation products.