Security Recommendations

Rockwell has developed architecture for security information.  For more details, refer to the following enterprise manuals available in literature library:
  • SECURE-UM001 - Configure System Security Features (User Manual)
  • SECURE-RM001 - System Security Design Guidelines  (Reference Manual)
It is recommended to follow the organizational security requirements and policies for setting up and operating the system. Some recommendations are below:
  • Follow your organization's guidelines for user management, user creation, access control etc.
  • Set a complex password as per the company policy.
  • Obtain a certificate from an approved CA as per your organization’s guidance and configure TLS on the platform. The key size of the certificate must be at least 2048 bits and must use the SHA-256, SHA-384, or SHA-512 algorithm for digital signatures.
  • Non-administrative users should not be allowed to change the configuration.
  • Configure firewalls and harden the infrastructure as recommended by the IT/security team in the environment.
Provide Feedback
Have questions or feedback about this documentation? Please submit your feedback here.