Security Recommendations

Rockwell has developed an architecture for security information.  For more details, refer to the following enterprise manuals available in the Literature Library:
  • SECURE-UM001 - Configure System Security Features (User Manual)
  • SECURE-RM001 - System Security Design Guidelines  (Reference Manual)
  • SECURE-AT001 - CIP security with Rockwell Automation Products Application Technique
It is recommended to follow the organizational security requirements and policies for setting up and operating the system. Some recommendations are below:
  • Follow your organization's guidelines for user management, user creation, access control, and so on.
  • Set a complex password as per the company policy.
  • Obtain a certificate from an approved CA (Certificate Authority) as per your organization’s guidance and configure TLS (Transport Layer Security) on the platform. The key size of the certificate must be at least 2048 bits and must use the SHA-256, SHA-384, or SHA-512 algorithm for digital signatures.
  • Configure firewalls and harden the infrastructure as recommended by the IT/security team in the environment.
Provide Feedback
Have questions or feedback about this documentation? Please submit your feedback here.