Clause
Title
Status
Comment
5.1.6 d)
Configuration change
Comply
Feature is accessible through
individual user accounts.
5.1.6 e)
Firmware change
Comply
Feature is accessible through
individual user accounts.
5.1.6 f)
ID/password or RBAC
management
Comply
Feature is accessible through
individual user accounts.
5.1.6 g)
Audit log
Comply
Feature is accessible through
individual user accounts.
5.1.7
Password display
Comply
5.1.8
Access time-out
Comply
A time-out feature exists. The time
period is configurable by the user.
5.2
Audit trail
Acknowledge
5.2.1
Audit trail background
Comply
The Audit log can be viewed through
PCM 600
5.2.2
Storage capability
Comply
5.2.3
Storage record
Comply
5.2.3 a)
Event record number
Comply
5.2.3 b)
Time and date
Comply
5.2.3 c)
User identification
Comply
5.2.3 d)
Event type
Comply
5.2.4
Audit trail event types
Acknowledge
5.2.4 a)
Login
Comply
5.2.4 b)
Manual logout
Comply
5.2.4 c)
Timed logout
Comply
5.2.4 d)
Value forcing
Comply
5.2.4 e)
Configuration access
Exception
5.2.4 f)
Configuration change
Comply
5.2.4 g)
Firmware change
Comply
5.2.4 h)
ID/password creation
or modification
Comply
5.2.4 i)
ID/password deletion
Comply
5.2.4 j)
Audit-log access
Comply
5.2.4 k)
Time/date change
Comply
5.2.4 l)
Alarm incident
Comply
5.3
Supervisory
monitoring and
control
Acknowledge
5.3.1
Overview of
supervisory
monitoring and
control
Comply
Made available through IEC61850
and syslog
5.3.2
Events
Exception
Time/date change and configuration
access not reported; Otherwise
compliance
5.3.3
Alarms
Acknowledge
Table continues on next page
Section 8
1MRK 511 454-UEN A
IEEE Compliance statement
48
GMS600 1.3
Cyber security deployment guideline