PRICES include / exclude VAT
Homepage>IEEE Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.030 IT Security>IEEE 1686-2022 - IEEE Standard for Intelligent Electronic Devices Cybersecurity Capabilities
Released: 01.02.2023

IEEE 1686-2022 - IEEE Standard for Intelligent Electronic Devices Cybersecurity Capabilities

IEEE Standard for Intelligent Electronic Devices Cybersecurity Capabilities

Format
Availability
Price and currency
English PDF
Immediate download
62.64 USD
English Hardcopy
In stock
77.76 USD
Standard number:IEEE 1686-2022
Released:01.02.2023
ISBN:978-1-5044-9374-1
Pages:36
Status:Active
Language:English
DESCRIPTION

IEEE 1686-2022

The standard defines the functions and features to be provided in intelligent electronic devices (IEDs) to accommodate cybersecurity programs. The standard addresses security regarding the access, operation, configuration, firmware revision and data retrieval from an IED. Confidentiality, integrity and availability of external interfaces of the IED is also addressed.

The standard defines the functions and features to be provided in IEDs to support cybersecurity programs. Specifically, the standard states what safeguards, audit mechanisms, and alarm indications shall be provided by the vendor of the IED regarding the capabilities associated with access, operation, configuration, firmware revision, and data retrieval from an IED. The standard also allows the user to define a security program around these features tailored to the specific requirements of that security program; if an IED does not meet this standard, whether the requirements are tailored or not, this can identify the need for other defensive measures (technical and/or procedural) to be taken. This standard also defines explicit measures to help ensure authenticity, integrity, and confidentiality of data at rest and in transit.

Revision Standard - Active. The functions and features to be provided in intelligent electronic devices (IEDs) to accommodate cybersecurity programs are defined in this standard. Security regarding the access, operation, configuration, firmware revision and data retrieval from an IED. Confidentiality, integrity, and availability of external interfaces of the IED is also addressed.