The cybersecurity guidelines are available to support the secure commissioning and deployment of the software. The guidelines describe how the system must be configured to foster secure operation in the intended operating environment.

Converting the downloadable images provided by Siemens to any other image types during the deployment compromises the security of the system. The images delivered by Siemens provide robust isolation to safeguard the infrastructure. Altering this setup or format introduces potential vulnerabilities.

It is highly advised to consider the following recommendations to ensure the highest possible security level.