Clause
Title
Status
Comment
5.3.3 a)
Unsuccessful login
attempt
Comply
5.3.3 b)
Reboot
Comply
A start-up event is created every
boot
5.3.3 c)
Attempted use of
unauthorized
configuration
software
Exception
Client certificates are not in use
5.3.3 d)
Invalid configuration
or firmware download
Comply
5.3.3 e)
Unauthorized
configuration or
firmware file
Exception
Not supported
5.3.3 f)
Time signal out of
tolerance
Exception
IED validates the time
synchronization messages but it
does not alarm if message is not
within the tolerances of the IED's
clock
5.3.3 g)
Invalid field hardware
changes
Comply
IED send a hardware changed
detected alarm.
5.3.4
Alarm point change
detect
Comply
5.3.5
Event and alarm
grouping
Exception
Not supported
5.3.6
Supervisory
permissive control
Exception
Not supported
5.4
IED cyber security
features
Acknowledge
5.4.1
IED functionality
compromise
Comply
Services and ports used for real-time
protocols are listed in the user
documentation.
5.4.2
Specific
cryptographic
features
Exception
File transfer functionality provided by
the IED user File transter protocol
over TLS.
5.4.2 a)
Webserver
functionality
Comply
Secure web communication using
HTTPS
5.4.2 b)
File transfer
functionality
Exception
File transfer protocol over TLS
5.4.2 c)
Text-oriented terminal
connections
Comply
Feature not supported
5.4.2 d)
SNMP network
management
Comply
Feature not supported
5.4.2 e)
Network time
synchronization
Comply
5.4.2 f)
Secure tunnel
functionality
Comply
Feature not supported
5.4.3
Cryptographic
techniques
Comply
Recommendation from the NIST
Computer Security Division are
taken into account in the
cryptographic techniques
implemented by the IED
Table continues on next page
1MRK 511 454-UEN A
Section 8
IEEE Compliance statement
GMS600 1.3
49
Cyber security deployment guideline