8.2 IEEE1686 compliance
GUID-009DC366-9ABB-430B-A71C-AA4E5FD1B631 v2
Table 23: IEEE1686 compliance
Clause Title Status Comment
5 IED cyber security
features
Acknowledge
5.1 Electronic access
control
Acknowledge
5.1.1 IED access control
overview
Comply Access is protected for local access
through control panel. Access is
protected for local access through
communication /diagnostic ports.
Access is protected for remote
access through a communication
media
5.1.2 Password defeat
mechanisms
Comply
5.1.3 Number of individual
users
Exceed 20 unique ID/password combinations
are supported (only applicable in
Local User Account Management)
5.1.4 Password
construction
Comply The minimum enforced password
length is configurable. If password
policy is enforced, minimum is 6.
Use of mix of lower and
UPPERCASE characters is
enforced, configurable in password
policies Use of numerical values is
enforced, configurable in password
policies. Use of non-alphanumeric
character (e.g. @, #, %, &, *) is
enforced, configurable in password
policies. When Central Account
Management is active the password
policy is not defined in the IED.
5.1.5 IED access control Acknowledge
5.1.5.1 Authorization levels
by password
Comply
5.1.5.2 Authorization using
role-based access
control (RBAC)
Exceed IED provides 8 user-defined roles.
5.1.6 IED main security
functions
Acknowledge
5.1.6 a) View data Comply Feature is accessible through
individual user accounts.
5.1.6 b) View configuration
settings
Comply Feature is accessible through
individual user accounts.
5.1.6 c) Force values Comply Feature is accessible through
individual user accounts.
5.1.6 d) Configuration change Comply Feature is accessible through
individual user accounts.
5.1.6 e) Firmware change Comply Feature is accessible through
individual user accounts.
Table continues on next page
Section 8 1MRK 511 399-UEN B
Standard compliance statement
96 670 series 2.2 IEC
Cyber security deployment guideline