You are on page 1of 10

Cyber Security

Chapter Overview
● Cyber Security & the M580

M580 Configuration V1.0


Schneider Electric | Industry Business | Training | February 17, 2019 2
What is Cyber Security?

● Cyber security is a branch of network administration that addresses


attacks on or by computer systems and through computer networks that
can result in accidental or intentional disruptions.

● The objective of cyber security is to provide increased levels of


protection for information and physical assets
from theft, corruption, misuse, or accidents
while maintaining access for their intended
users.

● Cyber security is an ongoing process that


encompasses procedures, policies, software,
and hardware.

M580 Configuration V1.0


Schneider Electric | Industry Business | Training | February 17, 2019 3
Cyber Security in the M580

● The Modicon M580 is the most advanced ePAC ever provided by


Schneider Electric in term of Cyber Security.

● With this new PAC, Schneider Electric insure the highest level of
protection against various cyber attacks.

M580 Configuration V1.0


Schneider Electric | Industry Business | Training | February 17, 2019 4
Cyber Security in the M580 (cont.)

● Wurldtech’s Achilles® Communications Certification provides an


industry leading benchmark for the secure development of the
applications, devices and systems found in critical infrastructure.

● The certification process presents device manufacturers with an


independently verified result to communicate their product security to
customers, while providing the operators of control systems with the
most complete, accurate, and trustworthy information possible about
the network resilience of their deployed products.

M580 Configuration V1.0


Schneider Electric | Industry Business | Training | February 17, 2019 5
Cyber Security in the M580 (cont.)

● Four types of products can be Achilles™ Certified:


● Embedded Devices:
●A special purpose device running embedded software designed
to directly monitor, control or actuate an industrial process.
● Host-based Devices:
●A general purpose device running a general purpose operating
system capable of hosting one or more applications, data stores
or functions.
● Control Applications:
●Software programs executing on the infrastructure (embedded,
host and network devices) that are used to interface with the
process.
● Network Components:
●A device that moves data from one device to another or restricts
the flow of data, but does not directly interact with a control
process.

M580 Configuration V1.0


Schneider Electric | Industry Business | Training | February 17, 2019 6
Cyber Security in the M580 (cont.)

● The M580 is Achilles Level 2 Certified:

● The system is intensively and in depth tested under Ethernet services &
protocols such ARP, ICMP, TCP, UDP, IP...

M580 Configuration V1.0


Schneider Electric | Industry Business | Training | February 17, 2019 7
Cyber Security in the M580 (cont.)

● The M580 has the capability to disable all unused Ethernet services:
● FTP
● HTTP
● telnet etc.

● Closing backdoors increases the overall security of the system

● Access Control Lists, maintain which IP addresses can and can’t


connect to the CPU.

M580 Configuration V1.0


Schneider Electric | Industry Business | Training | February 17, 2019 8
Unity Pro Implementation

● Cyber Security options can be found on the CPU embedded Ethernet


port properties Security tab:

M580 Configuration V1.0


Schneider Electric | Industry Business | Training | February 17, 2019 9
Exercise – Cyber Security settings(p7-8)

Learning Outcomes
● By the completion of this exercise you will be able to:
 implement the M580 Cyber Security settings.
 customise the M580 Cyber Security settings.
 test the M580 Cyber Security settings.

M580 Configuration V1.0


Schneider Electric | Industry Business | Training | February 17, 2019 10

You might also like