Commissioning Manual
16 6FC5397-4EP10-0BA8, 07/2018
Note
Industrial security
Siemens provides products and solutions with industrial security functions that support the secure operation of plants,
systems, machines and networks.
In order to protect plants, systems, machines and networks agai
nst cyber threats, it is necessary to implement – and
– a holistic, state-of-the-
art industrial security concept. Siemens’ products and solutions constitute one
element of such a concept.
Customers are responsible for preventing unaut
horized access to their plants, systems, machines and networks. Such
systems, machines and components should only be connected to an enterprise network or the Internet if and to the extent
such a connection is necessary and only when appropriate security m
easures (e.g. firewalls and/or network segmentation)
For additional information on industrial security measures that may be implemented, please visit:
http://www.siemens.com/industrialsecurity)
Siemens’ products and solutions undergo continuous development to make them more secure. Siemens strongly
recommends that product updates are applied as soon as they are available and that the latest product versions are us
ed.
Use of product versions that are no longer supported, and failure to apply the latest updates may increase customer’s
exposure to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS Feed at:
al security (http://www.siemens.com/industrialsecurity)
Further information is provided on the Internet:
Industrial Security Configuration Manual (https://support.industry.siemens.com/cs/ww/en/view/108862708)
Unsafe operating states resulting from software manipulation
Software manipulations (e.g. viruses, trojans, malware or worms) can cause unsafe operating states in your system that
may lead to death, serious injury, and property damage.
• Keep the software up to date.
• Incorporate the automation and drive components into a holistic, state-of-the-art industrial security concept for the
installation or machine.
• Make sure that you include all installed products into the holistic industrial security concept.
• Protect files stored on exchangeable storage media from malicious software by with suitable protection measures, e.g.
virus scanners.
• Protect the drive against unauthorized changes by activating the "know-how protection" drive function.
Residual risks of power drive systems
When assessing the machine- or system-related risk in accordance with the respective local regulations (e.g., EC Machinery
Directive), the machine manufacturer or system installer must take into account the following residual risks emanating from
the control and drive components of a drive system:
1. Unintentional movements of driven machine or system components during commissioning, operation, maintenance, and
repairs caused by, for example,
– Hardware and/or software errors in the sensors, control system, actuators, and cables and connections
– Response times of the control system and of the drive
– Operation and/or environmental conditions outside the specification
– Condensation/conductive contamination
– Parameterization, programming, cabling, and installation errors
– Use of wireless devices/mobile phones in the immediate vicinity of electronic components
– External influences/damage
– X-ray, ionizing radiation and cosmic radiation