{"id":436518,"date":"2024-10-20T07:54:55","date_gmt":"2024-10-20T07:54:55","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1686-2022\/"},"modified":"2024-10-26T14:56:00","modified_gmt":"2024-10-26T14:56:00","slug":"ieee-1686-2022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1686-2022\/","title":{"rendered":"IEEE 1686-2022"},"content":{"rendered":"
Revision Standard – Active. The functions and features to be provided in intelligent electronic devices (IEDs) to accommodate cybersecurity programs are defined in this standard. Security regarding the access, operation, configuration, firmware revision and data retrieval from an IED. Confidentiality, integrity, and availability of external interfaces of the IED is also addressed.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 1686-2022 Front Cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 1. Overview 1.1 Scope 1.2 Purpose 1.3 Reason <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 1.4 Word usage 2. Normative references <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3. Definitions, acronyms, and abbreviations 3.1 Definitions 3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4. Use of this standard 4.1 General <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4.2 Applicability 4.3 Implementing IED security 4.4 Proper use of this standard 4.4.1 IEEE Std 1686 requirements 4.4.2 Proper citation <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4.4.3 Table of conformance (TOC) 5. IED cybersecurity capabilities 5.1 IED identification and authentication control 5.1.1 Purpose <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.1.2 Requirements 5.1.2.1 Memorized secret\u2013based access 5.1.2.2 Memorized secret construction <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.1.2.3 Log in management policy enforcement 5.1.2.4 Memorized secret defeat mechanisms 5.1.2.5 Number of individual users 5.2 IED authorization and access control 5.2.1 Purpose <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.2.2 Requirements 5.2.3 IED main security functions <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.3 IED data integrity 5.3.1 Purpose 5.3.2 Requirements 5.4 IED data confidentiality 5.4.1 Purpose 5.4.2 Requirements <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.5 IED response to cybersecurity events 5.5.1 Purpose 5.5.2 Requirements <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.5.3 Events and alarms definition 5.5.3.1 Events <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.5.3.2 Alarms 5.6 IED resilience 5.6.1 Purpose 5.6.2 Requirements <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.7 Firmware quality assurance 5.8 Documentation 5.8.1 Requirements 5.8.2 Recommendations <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex A (informative) Table of conformance (TOC) <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Annex B (informative) Certificate-based access B.1 Purpose B.2 IED capabilities <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | B.3 Certificates events and alarms <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Annex C (informative) Intelligent electronic device (IED) secure product lifecycle guidelines C.1 Secure development C.1.1 Product development environment check <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | C.2 Engineering and maintenance C.2.1 Engineering C.2.2 Installing and commissioning C.2.3 Maintenance and support (manufacturer\/integrator) <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | C.2.4 Maintenance and operation (client) C.2.5 Security update C.3 Decommissioning C.3.1 Decommissioning, recycling, and disposal (client) <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Annex D (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Back Cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Intelligent Electronic Devices Cybersecurity Capabilities (Approved Draft)<\/b><\/p>\n |