Controller Security Features

The following figure shows an example of a secure control system that implements other security-focused products. For certification requirements related to other security-focused products, see the security checklists.
Follow the security checklists in this section to secure the system and controller. It is your responsibility to monitor the system periodically to make sure that the security settings function as you configured them.
Secure Architecture Environment
This image shows an example of a secure application with standard Logix controllers.
Provide Feedback
Have questions or feedback about this documentation? Please submit your feedback here.
Normal