Clause Title Status Comment
5.5 IED configuration
software
Acknowledge
5.5.1 Authentication Exception IED can be configured using
unauthorized copies of the
configuration software. However
configuration download is handled
by authentication.
5.5.2 Digital signature Exception Feature not supported
5.5.3 ID/password control Comply Stored in the IED.
5.5.4 ID/password
controlled features
Comply
5.5.4.1 View configuration
data
Comply
5.5.4.2 Change configuration
data
Comply
5.6 Communications port
access
Comply
5.7 Firmware quality
assurance
Exception Quality control is handled according
to ISO9001 and CMMI.
1MRK 511 399-UEN B Section 8
Standard compliance statement
670 series 2.2 IEC 99
Cyber security deployment guideline