Controller Security Features
The following figure shows an example of a secure control system that implements other security-focused products. For certification requirements related to other security-focused products, see the security checklists.
Follow the security checklists in this section to secure the system and controller. It is your responsibility to monitor the system periodically to make sure that the security settings function as you configured them.
Secure Architecture Environment
Provide Feedback