Software (security functions)
• Keep the rmware up to date. Check regularly for security updates for the device. You can
nd information on this at the Industrial Security (
https://www.siemens.com/
industrialsecurity) website.
• Inform yourself regularly about security recommendations published by Siemens
ProductCERT (https://www.siemens.com/cert/en/cert-security-advisories.htm).
• Only activate protocols that you require to use the device.
• Restrict access to the management of the device with rules in an access control list (ACL).
• The option of VLAN structuring provides protection against DoS attacks and unauthorized
access. Check whether this is practical or useful in your environment.
• Use a central logging server to log changes and accesses. Operate your logging server within
the protected network area and check the logging information regularly.
Passwords
• Dene rules for the assignment of passwords.
• Regularly change your passwords to increase security.
• Use passwords with a high password strength.
• Make sure that all passwords are protected and inaccessible to unauthorized persons.
• A password must be changed if it is known or suspected to be known by unauthorized
persons.
• Do not use the same password for dierent users and systems.
Certicates and keys
• The device contains a pre-installed certicate with key. Replace this certicate with a self-
made certicate with key. We recommend that you use a certicate signed either by a reliable
external or by an internal certication authority. You can install the certicate via the WBM
(System > Load and Save).
• Use the certication authority including key revocation and management to sign the
certicates.
• Make sure that user-dened private keys are protected and inaccessible to unauthorized
persons.
• Verify certicates and ngerprints on the server and client to prevent "man in the middle"
attacks.
• It is recommended that you use password-protected certicates in the PKCS#12 format.
• It is recommended that you use certicates with a key length of at least 2048 bits.
• Change keys and certicates immediately if there is a suspicion of compromise.
Recommendations on network security
SCALANCE XM-400
14 Operating Instructions, 03/2021, C79000-G8976-C306-10