1MRK 511 399-UEN B
670 series 2.2 IEC
Cyber security deployment guideline
Clause
Title
5.5
IED configuration
software
5.5.1
Authentication
5.5.2
Digital signature
5.5.3
ID/password control
5.5.4
ID/password
controlled features
5.5.4.1
View configuration
data
5.5.4.2
Change configuration
data
5.6
Communications port
access
5.7
Firmware quality
assurance
Standard compliance statement
Status
Comment
Acknowledge
Exception
IED can be configured using
unauthorized copies of the
configuration software. However
configuration download is handled
by authentication.
Exception
Feature not supported
Comply
Stored in the IED.
Comply
Comply
Comply
Comply
Exception
Quality control is handled according
to ISO9001 and CMMI.
Section 8
99