User Manual

Cybersecurity Concepts How to Secure the System
IT Security
3
60 | 85
A6V11646120_enUS_b_40
NOTICE
The owner of the Desigo CC system is responsible for establishing and maintaining
appropriate IT security, in particular by applying virus scanners, deactivating
unneeded services and network ports, and by regular patching and updating the
operating system and all installed applications.
Self-signed certificates are supported to allow local deployments without the
overhead of obtaining commercial certificates. When using self-signed certificates,
the owner of the Desigo CC system is responsible for maintaining their validity
status, and for manually adding them to and removing them from the list of trusted
certificates.
Self-signed certificates may only be used in accordance with local IT regulations
(some CIO organizations do not allow them, and network scans will identify them).
Importing of commercial certificates follows the same procedures.
Wireless input devices (especially keyboards) use radio transmission that is often
not or inadequately cryptographically protected. Even from greater distances, it is
possible to listen in or even plant external data into the system. The use of wireless
input devices should be avoided when used in high security environments. If the use
of wireless input devices is absolutely necessary, use only devices with proven
encryption.
With version 4.0, the Bluetooth (BT) standard includes an encryption mechanism
(AES128). In order to be effective, all devices must use BT 4.0. Users should also
observe the information provided by the manufacturer.