Section 8
IEEE Compliance statement
GUID-716DC304-B1C7-417E-BA01-DF9C5AD6660A v1
8.1
IEEE1686 compliance
GUID-009DC366-9ABB-430B-A71C-AA4E5FD1B631 v2.1.1
Table 10:
IEEE1686 compliance
Clause
Title
Status
Comment
5
IED cyber security
features
Acknowledge
5.1
Electronic access
control
Acknowledge
5.1.1
IED access control
overview
Comply
Access is protected for local access
through control panel. Access is
protected for local access through
communication /diagnostic ports.
Access is protected for remote
access through a communication
media
5.1.2
Password defeat
mechanisms
Comply
5.1.3
Number of individual
users
Exceed
20 unique ID/password combinations
are supported (only applicable in
Local User Account Management)
5.1.4
Password
construction
Comply
The minimum enforced password
length is configurable. If password
policy is enforced, minimum is 6.
Use of mix of lower and
UPPERCASE characters is
enforced, configurable in password
policies Use of numerical values is
enforced, configurable in password
policies. Use of non-alphanumeric
character (e.g. @, #, %, &, *) is
enforced, configurable in password
policies.
5.1.5
IED access control
Acknowledge
5.1.5.1
Authorization levels
by password
Comply
5.1.5.2
Authorization using
role-based access
control (RBAC)
Exceed
IED provides 7 user-defined roles.
5.1.6
IED main security
functions
Acknowledge
5.1.6 a)
View data
Comply
Feature is accessible through
individual user accounts.
5.1.6 b)
View configuration
settings
Comply
Feature is accessible through
individual user accounts.
5.1.6 c)
Force values
Comply
Feature is accessible through
individual user accounts.
Table continues on next page
1MRK 511 454-UEN A
Section 8
IEEE Compliance statement
GMS600 1.3
47
Cyber security deployment guideline