ABB RELION 670 SERIES Manual page 105

Cyber security deployment guideline
Hide thumbs Also See for RELION 670 SERIES:
Table of Contents

Advertisement

1MRK 511 399-UEN B
670 series 2.2 IEC
Cyber security deployment guideline
Clause
Title
5.5
IED configuration
software
5.5.1
Authentication
5.5.2
Digital signature
5.5.3
ID/password control
5.5.4
ID/password
controlled features
5.5.4.1
View configuration
data
5.5.4.2
Change configuration
data
5.6
Communications port
access
5.7
Firmware quality
assurance
Standard compliance statement
Status
Comment
Acknowledge
Exception
IED can be configured using
unauthorized copies of the
configuration software. However
configuration download is handled
by authentication.
Exception
Feature not supported
Comply
Stored in the IED.
Comply
Comply
Comply
Comply
Exception
Quality control is handled according
to ISO9001 and CMMI.
Section 8
99

Advertisement

Table of Contents
loading

This manual is also suitable for:

Relion 670 series

Table of Contents