Ad

Siemens establishes binding cybersecurity requirements for suppliers

Feb 18, 2019
Misc
Posted by Patrick Haddad

Siemens has released new cybersecurity requirements for suppliers in order to provide holistic protection against hackers and cyber attacks.

 The requirements stipulate, for example, that suppliers must integrate special standards, processes and methods into their products and services. The reason is to prevent vulnerabilities and malicious codes at suppliers – and thus in Siemens products as well.

These requirements will apply primarily to suppliers of security-critical components such as software, processors and electronic components for certain types of control units. Existing suppliers who do not yet comply with the requirements are to implement them gradually.

In the future, suppliers themselves must, for example, perform security reviews, conduct tests and take corrective action on a regular basis. Siemens is making these requirements mandatory for its own activities as well.

“This step will enable us to reduce the risk of security incidents along the entire value chain in a holistic manner and offer our customers greater cybersecurity,” said Roland Busch, member of Siemens’ Managing Board and the company’s Chief Operating Officer and Chief Technology Officer. “If all our partner companies put their global weight behind these measures and implement them together with their suppliers, we can generate tremendous impact and make the digital world more secure.”

In the fall of 2018, Siemens further strengthened its internal capacities for repelling hacker attacks and restructured its cyberorganization. Operating as a worldwide network, the new unit combines what were once separate areas. As a result, Siemens is now the first major company to take a holistic approach to the topic of cybersecurity.

The new requirements will be introduced step-by-step starting on February 15, 2019, and will be anchored in a separate, binding clause in all new contracts.

 

Source: Siemens

Photo (for illustrative purposes): Hacking Cybercrime / jaydeep_ / Pixabay / Free for commercial use

Comments

Leave a reply

Your email address will not be published. Required fields are marked *