Chapter 9 - Cyber-Security
●
IED functions and features are assigned to different password levels. The assignment is fixed.
●
The audit trail is recorded, listing events in the order in which they occur, held in a circular buffer.
●
Records contain all defined fields from the standard and record all defined function event types where
the function is supported.
●
No password defeat mechanism exists. Instead a secure recovery password scheme is implemented.
●
Unused ports (physical and logical) may be disabled.
280
MiCOM P747
P747-TM-EN-1
P747-TM-EN-1.1