Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI Connector for HART-IP

Security best practices for PI Connector for HART-IP

Security best practices for PI Connector for HART-IP

  • Last UpdatedSep 28, 2022
  • 1 minute read

To mitigate security vulnerabilities, any system connected to the internet that communicates over HART-IP should adhere to organizational security practices for TCP and UDP communication.

In addition to organizational security practices, OSIsoft recommends that you restrict HART-IP to internal networks.

Traffic from HART-IP (usually UDP or TCP port 5094) should be restricted to a management VLAN segment with strong network controls. Scan for HART-IP usage outside of the trusted network and monitor the trusted network for abnormal activity.

Related Links
TitleResults for “How to create a CRG?”Also Available in