Components

3 Twig Components
7 Render Count
4 ms Render Time
80.0 MiB Memory Usage

Components

Name Metadata Render Count Render Time
ProductState
"App\Twig\Components\ProductState"
components/ProductState.html.twig
3 0.85ms
ProductMostRecent
"App\Twig\Components\ProductMostRecent"
components/ProductMostRecent.html.twig
3 2.87ms
ProductType
"App\Twig\Components\ProductType"
components/ProductType.html.twig
1 0.21ms

Render calls

ProductState App\Twig\Components\ProductState 66.0 MiB 0.31 ms
Input props
[
  "product" => App\Entity\Product\Product {#7310
    #id: 11345
    #code: "IEEE00005957"
    #attributes: Doctrine\ORM\PersistentCollection {#7700 …}
    #variants: Doctrine\ORM\PersistentCollection {#7743 …}
    #options: Doctrine\ORM\PersistentCollection {#7915 …}
    #associations: Doctrine\ORM\PersistentCollection {#7899 …}
    #createdAt: DateTime @1751039645 {#7274
      date: 2025-06-27 17:54:05.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970307 {#7322
      date: 2025-07-31 15:58:27.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#7921 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#7920
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#7310}
        #id: 40389
        #name: "IEEE PC37.249"
        #slug: "ieee-pc37-249-ieee00005957-242997"
        #description: """
          New IEEE Standard - Superseded - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection and automation related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection and automation related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection and Automation Related Data Files"
        -notes: "Superseded"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#7533 …}
    #channels: Doctrine\ORM\PersistentCollection {#7627 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#7612 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#7644 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#7389 …}
    -apiLastModifiedAt: DateTime @1743289200 {#7317
      date: 2025-03-30 00:00:00.0 Europe/Paris (+01:00)
    }
    -lastUpdatedAt: DateTime @1707778800 {#7292
      date: 2024-02-13 00:00:00.0 Europe/Paris (+01:00)
    }
    -author: ""
    -publishedAt: DateTime @1658440800 {#7318
      date: 2022-07-22 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 63
    -documents: Doctrine\ORM\PersistentCollection {#7464 …}
    -favorites: Doctrine\ORM\PersistentCollection {#7499 …}
  }
  "showFullLabel" => "true"
]
Attributes
[
  "showFullLabel" => "true"
]
Component
App\Twig\Components\ProductState {#93007
  +product: App\Entity\Product\Product {#7310
    #id: 11345
    #code: "IEEE00005957"
    #attributes: Doctrine\ORM\PersistentCollection {#7700 …}
    #variants: Doctrine\ORM\PersistentCollection {#7743 …}
    #options: Doctrine\ORM\PersistentCollection {#7915 …}
    #associations: Doctrine\ORM\PersistentCollection {#7899 …}
    #createdAt: DateTime @1751039645 {#7274
      date: 2025-06-27 17:54:05.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970307 {#7322
      date: 2025-07-31 15:58:27.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#7921 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#7920
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#7310}
        #id: 40389
        #name: "IEEE PC37.249"
        #slug: "ieee-pc37-249-ieee00005957-242997"
        #description: """
          New IEEE Standard - Superseded - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection and automation related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection and automation related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection and Automation Related Data Files"
        -notes: "Superseded"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#7533 …}
    #channels: Doctrine\ORM\PersistentCollection {#7627 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#7612 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#7644 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#7389 …}
    -apiLastModifiedAt: DateTime @1743289200 {#7317
      date: 2025-03-30 00:00:00.0 Europe/Paris (+01:00)
    }
    -lastUpdatedAt: DateTime @1707778800 {#7292
      date: 2024-02-13 00:00:00.0 Europe/Paris (+01:00)
    }
    -author: ""
    -publishedAt: DateTime @1658440800 {#7318
      date: 2022-07-22 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 63
    -documents: Doctrine\ORM\PersistentCollection {#7464 …}
    -favorites: Doctrine\ORM\PersistentCollection {#7499 …}
  }
  +appearance: "state-suspended"
  +labels: [
    "Superseded"
  ]
  -stateAttributeCode: "state"
  -localeContext: Sylius\Component\Locale\Context\CompositeLocaleContext {#1833 …}
}
ProductType App\Twig\Components\ProductType 68.0 MiB 0.21 ms
Input props
[
  "product" => App\Entity\Product\Product {#7310
    #id: 11345
    #code: "IEEE00005957"
    #attributes: Doctrine\ORM\PersistentCollection {#7700 …}
    #variants: Doctrine\ORM\PersistentCollection {#7743 …}
    #options: Doctrine\ORM\PersistentCollection {#7915 …}
    #associations: Doctrine\ORM\PersistentCollection {#7899 …}
    #createdAt: DateTime @1751039645 {#7274
      date: 2025-06-27 17:54:05.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970307 {#7322
      date: 2025-07-31 15:58:27.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#7921 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#7920
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#7310}
        #id: 40389
        #name: "IEEE PC37.249"
        #slug: "ieee-pc37-249-ieee00005957-242997"
        #description: """
          New IEEE Standard - Superseded - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection and automation related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection and automation related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection and Automation Related Data Files"
        -notes: "Superseded"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#7533 …}
    #channels: Doctrine\ORM\PersistentCollection {#7627 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#7612 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#7644 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#7389 …}
    -apiLastModifiedAt: DateTime @1743289200 {#7317
      date: 2025-03-30 00:00:00.0 Europe/Paris (+01:00)
    }
    -lastUpdatedAt: DateTime @1707778800 {#7292
      date: 2024-02-13 00:00:00.0 Europe/Paris (+01:00)
    }
    -author: ""
    -publishedAt: DateTime @1658440800 {#7318
      date: 2022-07-22 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 63
    -documents: Doctrine\ORM\PersistentCollection {#7464 …}
    -favorites: Doctrine\ORM\PersistentCollection {#7499 …}
  }
]
Attributes
[]
Component
App\Twig\Components\ProductType {#93187
  +product: App\Entity\Product\Product {#7310
    #id: 11345
    #code: "IEEE00005957"
    #attributes: Doctrine\ORM\PersistentCollection {#7700 …}
    #variants: Doctrine\ORM\PersistentCollection {#7743 …}
    #options: Doctrine\ORM\PersistentCollection {#7915 …}
    #associations: Doctrine\ORM\PersistentCollection {#7899 …}
    #createdAt: DateTime @1751039645 {#7274
      date: 2025-06-27 17:54:05.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970307 {#7322
      date: 2025-07-31 15:58:27.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#7921 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#7920
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#7310}
        #id: 40389
        #name: "IEEE PC37.249"
        #slug: "ieee-pc37-249-ieee00005957-242997"
        #description: """
          New IEEE Standard - Superseded - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection and automation related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection and automation related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection and Automation Related Data Files"
        -notes: "Superseded"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#7533 …}
    #channels: Doctrine\ORM\PersistentCollection {#7627 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#7612 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#7644 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#7389 …}
    -apiLastModifiedAt: DateTime @1743289200 {#7317
      date: 2025-03-30 00:00:00.0 Europe/Paris (+01:00)
    }
    -lastUpdatedAt: DateTime @1707778800 {#7292
      date: 2024-02-13 00:00:00.0 Europe/Paris (+01:00)
    }
    -author: ""
    -publishedAt: DateTime @1658440800 {#7318
      date: 2022-07-22 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 63
    -documents: Doctrine\ORM\PersistentCollection {#7464 …}
    -favorites: Doctrine\ORM\PersistentCollection {#7499 …}
  }
  +label: "Draft standard"
  -typeAttributeCode: "type"
  -localeContext: Sylius\Component\Locale\Context\CompositeLocaleContext {#1833 …}
}
ProductMostRecent App\Twig\Components\ProductMostRecent 68.0 MiB 0.72 ms
Input props
[
  "product" => App\Entity\Product\Product {#7310
    #id: 11345
    #code: "IEEE00005957"
    #attributes: Doctrine\ORM\PersistentCollection {#7700 …}
    #variants: Doctrine\ORM\PersistentCollection {#7743 …}
    #options: Doctrine\ORM\PersistentCollection {#7915 …}
    #associations: Doctrine\ORM\PersistentCollection {#7899 …}
    #createdAt: DateTime @1751039645 {#7274
      date: 2025-06-27 17:54:05.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970307 {#7322
      date: 2025-07-31 15:58:27.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#7921 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#7920
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#7310}
        #id: 40389
        #name: "IEEE PC37.249"
        #slug: "ieee-pc37-249-ieee00005957-242997"
        #description: """
          New IEEE Standard - Superseded - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection and automation related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection and automation related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection and Automation Related Data Files"
        -notes: "Superseded"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#7533 …}
    #channels: Doctrine\ORM\PersistentCollection {#7627 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#7612 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#7644 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#7389 …}
    -apiLastModifiedAt: DateTime @1743289200 {#7317
      date: 2025-03-30 00:00:00.0 Europe/Paris (+01:00)
    }
    -lastUpdatedAt: DateTime @1707778800 {#7292
      date: 2024-02-13 00:00:00.0 Europe/Paris (+01:00)
    }
    -author: ""
    -publishedAt: DateTime @1658440800 {#7318
      date: 2022-07-22 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 63
    -documents: Doctrine\ORM\PersistentCollection {#7464 …}
    -favorites: Doctrine\ORM\PersistentCollection {#7499 …}
  }
]
Attributes
[]
Component
App\Twig\Components\ProductMostRecent {#93262
  +product: App\Entity\Product\Product {#7310
    #id: 11345
    #code: "IEEE00005957"
    #attributes: Doctrine\ORM\PersistentCollection {#7700 …}
    #variants: Doctrine\ORM\PersistentCollection {#7743 …}
    #options: Doctrine\ORM\PersistentCollection {#7915 …}
    #associations: Doctrine\ORM\PersistentCollection {#7899 …}
    #createdAt: DateTime @1751039645 {#7274
      date: 2025-06-27 17:54:05.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970307 {#7322
      date: 2025-07-31 15:58:27.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#7921 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#7920
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#7310}
        #id: 40389
        #name: "IEEE PC37.249"
        #slug: "ieee-pc37-249-ieee00005957-242997"
        #description: """
          New IEEE Standard - Superseded - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection and automation related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection and automation related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection and Automation Related Data Files"
        -notes: "Superseded"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#7533 …}
    #channels: Doctrine\ORM\PersistentCollection {#7627 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#7612 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#7644 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#7389 …}
    -apiLastModifiedAt: DateTime @1743289200 {#7317
      date: 2025-03-30 00:00:00.0 Europe/Paris (+01:00)
    }
    -lastUpdatedAt: DateTime @1707778800 {#7292
      date: 2024-02-13 00:00:00.0 Europe/Paris (+01:00)
    }
    -author: ""
    -publishedAt: DateTime @1658440800 {#7318
      date: 2022-07-22 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 63
    -documents: Doctrine\ORM\PersistentCollection {#7464 …}
    -favorites: Doctrine\ORM\PersistentCollection {#7499 …}
  }
  +label: "Historical"
  +icon: "historical"
  -mostRecentAttributeCode: "most_recent"
  -localeContext: Sylius\Component\Locale\Context\CompositeLocaleContext {#1833 …}
}
ProductState App\Twig\Components\ProductState 80.0 MiB 0.29 ms
Input props
[
  "product" => App\Entity\Product\Product {#93671
    #id: 12846
    #code: "IEEE00010784"
    #attributes: Doctrine\ORM\PersistentCollection {#93653 …}
    #variants: Doctrine\ORM\PersistentCollection {#93650 …}
    #options: Doctrine\ORM\PersistentCollection {#93646 …}
    #associations: Doctrine\ORM\PersistentCollection {#93648 …}
    #createdAt: DateTime @1751040697 {#93679
      date: 2025-06-27 18:11:37.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970953 {#93658
      date: 2025-07-31 16:09:13.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#93664 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#93699
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#93671}
        #id: 46393
        #name: "IEEE C37.249:2024"
        #slug: "ieee-c37-249-2024-ieee00010784-244502"
        #description: """
          New IEEE Standard - Active - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection, automation, and control related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection, automation, and control related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection, Automation, and Control Related Data Files"
        -notes: "Active"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#93662 …}
    #channels: Doctrine\ORM\PersistentCollection {#93655 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#93660 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#93657 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#93672 …}
    -apiLastModifiedAt: DateTime @1750802400 {#93642
      date: 2025-06-25 00:00:00.0 Europe/Paris (+02:00)
    }
    -lastUpdatedAt: DateTime @1750629600 {#93678
      date: 2025-06-23 00:00:00.0 Europe/Paris (+02:00)
    }
    -author: ""
    -publishedAt: DateTime @1747692000 {#93677
      date: 2025-05-20 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 66
    -documents: Doctrine\ORM\PersistentCollection {#93668 …}
    -favorites: Doctrine\ORM\PersistentCollection {#93666 …}
  }
  "showFullLabel" => "true"
]
Attributes
[
  "showFullLabel" => "true"
]
Component
App\Twig\Components\ProductState {#106839
  +product: App\Entity\Product\Product {#93671
    #id: 12846
    #code: "IEEE00010784"
    #attributes: Doctrine\ORM\PersistentCollection {#93653 …}
    #variants: Doctrine\ORM\PersistentCollection {#93650 …}
    #options: Doctrine\ORM\PersistentCollection {#93646 …}
    #associations: Doctrine\ORM\PersistentCollection {#93648 …}
    #createdAt: DateTime @1751040697 {#93679
      date: 2025-06-27 18:11:37.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970953 {#93658
      date: 2025-07-31 16:09:13.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#93664 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#93699
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#93671}
        #id: 46393
        #name: "IEEE C37.249:2024"
        #slug: "ieee-c37-249-2024-ieee00010784-244502"
        #description: """
          New IEEE Standard - Active - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection, automation, and control related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection, automation, and control related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection, Automation, and Control Related Data Files"
        -notes: "Active"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#93662 …}
    #channels: Doctrine\ORM\PersistentCollection {#93655 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#93660 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#93657 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#93672 …}
    -apiLastModifiedAt: DateTime @1750802400 {#93642
      date: 2025-06-25 00:00:00.0 Europe/Paris (+02:00)
    }
    -lastUpdatedAt: DateTime @1750629600 {#93678
      date: 2025-06-23 00:00:00.0 Europe/Paris (+02:00)
    }
    -author: ""
    -publishedAt: DateTime @1747692000 {#93677
      date: 2025-05-20 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 66
    -documents: Doctrine\ORM\PersistentCollection {#93668 …}
    -favorites: Doctrine\ORM\PersistentCollection {#93666 …}
  }
  +appearance: "state-active"
  +labels: [
    "Active"
  ]
  -stateAttributeCode: "state"
  -localeContext: Sylius\Component\Locale\Context\CompositeLocaleContext {#1833 …}
}
ProductMostRecent App\Twig\Components\ProductMostRecent 80.0 MiB 1.16 ms
Input props
[
  "product" => App\Entity\Product\Product {#93671
    #id: 12846
    #code: "IEEE00010784"
    #attributes: Doctrine\ORM\PersistentCollection {#93653 …}
    #variants: Doctrine\ORM\PersistentCollection {#93650 …}
    #options: Doctrine\ORM\PersistentCollection {#93646 …}
    #associations: Doctrine\ORM\PersistentCollection {#93648 …}
    #createdAt: DateTime @1751040697 {#93679
      date: 2025-06-27 18:11:37.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970953 {#93658
      date: 2025-07-31 16:09:13.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#93664 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#93699
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#93671}
        #id: 46393
        #name: "IEEE C37.249:2024"
        #slug: "ieee-c37-249-2024-ieee00010784-244502"
        #description: """
          New IEEE Standard - Active - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection, automation, and control related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection, automation, and control related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection, Automation, and Control Related Data Files"
        -notes: "Active"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#93662 …}
    #channels: Doctrine\ORM\PersistentCollection {#93655 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#93660 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#93657 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#93672 …}
    -apiLastModifiedAt: DateTime @1750802400 {#93642
      date: 2025-06-25 00:00:00.0 Europe/Paris (+02:00)
    }
    -lastUpdatedAt: DateTime @1750629600 {#93678
      date: 2025-06-23 00:00:00.0 Europe/Paris (+02:00)
    }
    -author: ""
    -publishedAt: DateTime @1747692000 {#93677
      date: 2025-05-20 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 66
    -documents: Doctrine\ORM\PersistentCollection {#93668 …}
    -favorites: Doctrine\ORM\PersistentCollection {#93666 …}
  }
]
Attributes
[]
Component
App\Twig\Components\ProductMostRecent {#106894
  +product: App\Entity\Product\Product {#93671
    #id: 12846
    #code: "IEEE00010784"
    #attributes: Doctrine\ORM\PersistentCollection {#93653 …}
    #variants: Doctrine\ORM\PersistentCollection {#93650 …}
    #options: Doctrine\ORM\PersistentCollection {#93646 …}
    #associations: Doctrine\ORM\PersistentCollection {#93648 …}
    #createdAt: DateTime @1751040697 {#93679
      date: 2025-06-27 18:11:37.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970953 {#93658
      date: 2025-07-31 16:09:13.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#93664 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#93699
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#93671}
        #id: 46393
        #name: "IEEE C37.249:2024"
        #slug: "ieee-c37-249-2024-ieee00010784-244502"
        #description: """
          New IEEE Standard - Active - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection, automation, and control related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection, automation, and control related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection, Automation, and Control Related Data Files"
        -notes: "Active"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#93662 …}
    #channels: Doctrine\ORM\PersistentCollection {#93655 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#93660 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#93657 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#93672 …}
    -apiLastModifiedAt: DateTime @1750802400 {#93642
      date: 2025-06-25 00:00:00.0 Europe/Paris (+02:00)
    }
    -lastUpdatedAt: DateTime @1750629600 {#93678
      date: 2025-06-23 00:00:00.0 Europe/Paris (+02:00)
    }
    -author: ""
    -publishedAt: DateTime @1747692000 {#93677
      date: 2025-05-20 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 66
    -documents: Doctrine\ORM\PersistentCollection {#93668 …}
    -favorites: Doctrine\ORM\PersistentCollection {#93666 …}
  }
  +label: "Most Recent"
  +icon: "check-xs"
  -mostRecentAttributeCode: "most_recent"
  -localeContext: Sylius\Component\Locale\Context\CompositeLocaleContext {#1833 …}
}
ProductState App\Twig\Components\ProductState 80.0 MiB 0.25 ms
Input props
[
  "product" => App\Entity\Product\Product {#7310
    #id: 11345
    #code: "IEEE00005957"
    #attributes: Doctrine\ORM\PersistentCollection {#7700 …}
    #variants: Doctrine\ORM\PersistentCollection {#7743 …}
    #options: Doctrine\ORM\PersistentCollection {#7915 …}
    #associations: Doctrine\ORM\PersistentCollection {#7899 …}
    #createdAt: DateTime @1751039645 {#7274
      date: 2025-06-27 17:54:05.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970307 {#7322
      date: 2025-07-31 15:58:27.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#7921 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#7920
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#7310}
        #id: 40389
        #name: "IEEE PC37.249"
        #slug: "ieee-pc37-249-ieee00005957-242997"
        #description: """
          New IEEE Standard - Superseded - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection and automation related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection and automation related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection and Automation Related Data Files"
        -notes: "Superseded"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#7533 …}
    #channels: Doctrine\ORM\PersistentCollection {#7627 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#7612 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#7644 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#7389 …}
    -apiLastModifiedAt: DateTime @1743289200 {#7317
      date: 2025-03-30 00:00:00.0 Europe/Paris (+01:00)
    }
    -lastUpdatedAt: DateTime @1707778800 {#7292
      date: 2024-02-13 00:00:00.0 Europe/Paris (+01:00)
    }
    -author: ""
    -publishedAt: DateTime @1658440800 {#7318
      date: 2022-07-22 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 63
    -documents: Doctrine\ORM\PersistentCollection {#7464 …}
    -favorites: Doctrine\ORM\PersistentCollection {#7499 …}
  }
  "showFullLabel" => "true"
]
Attributes
[
  "showFullLabel" => "true"
]
Component
App\Twig\Components\ProductState {#106959
  +product: App\Entity\Product\Product {#7310
    #id: 11345
    #code: "IEEE00005957"
    #attributes: Doctrine\ORM\PersistentCollection {#7700 …}
    #variants: Doctrine\ORM\PersistentCollection {#7743 …}
    #options: Doctrine\ORM\PersistentCollection {#7915 …}
    #associations: Doctrine\ORM\PersistentCollection {#7899 …}
    #createdAt: DateTime @1751039645 {#7274
      date: 2025-06-27 17:54:05.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970307 {#7322
      date: 2025-07-31 15:58:27.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#7921 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#7920
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#7310}
        #id: 40389
        #name: "IEEE PC37.249"
        #slug: "ieee-pc37-249-ieee00005957-242997"
        #description: """
          New IEEE Standard - Superseded - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection and automation related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection and automation related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection and Automation Related Data Files"
        -notes: "Superseded"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#7533 …}
    #channels: Doctrine\ORM\PersistentCollection {#7627 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#7612 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#7644 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#7389 …}
    -apiLastModifiedAt: DateTime @1743289200 {#7317
      date: 2025-03-30 00:00:00.0 Europe/Paris (+01:00)
    }
    -lastUpdatedAt: DateTime @1707778800 {#7292
      date: 2024-02-13 00:00:00.0 Europe/Paris (+01:00)
    }
    -author: ""
    -publishedAt: DateTime @1658440800 {#7318
      date: 2022-07-22 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 63
    -documents: Doctrine\ORM\PersistentCollection {#7464 …}
    -favorites: Doctrine\ORM\PersistentCollection {#7499 …}
  }
  +appearance: "state-suspended"
  +labels: [
    "Superseded"
  ]
  -stateAttributeCode: "state"
  -localeContext: Sylius\Component\Locale\Context\CompositeLocaleContext {#1833 …}
}
ProductMostRecent App\Twig\Components\ProductMostRecent 80.0 MiB 0.99 ms
Input props
[
  "product" => App\Entity\Product\Product {#7310
    #id: 11345
    #code: "IEEE00005957"
    #attributes: Doctrine\ORM\PersistentCollection {#7700 …}
    #variants: Doctrine\ORM\PersistentCollection {#7743 …}
    #options: Doctrine\ORM\PersistentCollection {#7915 …}
    #associations: Doctrine\ORM\PersistentCollection {#7899 …}
    #createdAt: DateTime @1751039645 {#7274
      date: 2025-06-27 17:54:05.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970307 {#7322
      date: 2025-07-31 15:58:27.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#7921 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#7920
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#7310}
        #id: 40389
        #name: "IEEE PC37.249"
        #slug: "ieee-pc37-249-ieee00005957-242997"
        #description: """
          New IEEE Standard - Superseded - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection and automation related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection and automation related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection and Automation Related Data Files"
        -notes: "Superseded"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#7533 …}
    #channels: Doctrine\ORM\PersistentCollection {#7627 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#7612 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#7644 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#7389 …}
    -apiLastModifiedAt: DateTime @1743289200 {#7317
      date: 2025-03-30 00:00:00.0 Europe/Paris (+01:00)
    }
    -lastUpdatedAt: DateTime @1707778800 {#7292
      date: 2024-02-13 00:00:00.0 Europe/Paris (+01:00)
    }
    -author: ""
    -publishedAt: DateTime @1658440800 {#7318
      date: 2022-07-22 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 63
    -documents: Doctrine\ORM\PersistentCollection {#7464 …}
    -favorites: Doctrine\ORM\PersistentCollection {#7499 …}
  }
]
Attributes
[]
Component
App\Twig\Components\ProductMostRecent {#106986
  +product: App\Entity\Product\Product {#7310
    #id: 11345
    #code: "IEEE00005957"
    #attributes: Doctrine\ORM\PersistentCollection {#7700 …}
    #variants: Doctrine\ORM\PersistentCollection {#7743 …}
    #options: Doctrine\ORM\PersistentCollection {#7915 …}
    #associations: Doctrine\ORM\PersistentCollection {#7899 …}
    #createdAt: DateTime @1751039645 {#7274
      date: 2025-06-27 17:54:05.0 Europe/Paris (+02:00)
    }
    #updatedAt: DateTime @1753970307 {#7322
      date: 2025-07-31 15:58:27.0 Europe/Paris (+02:00)
    }
    #enabled: true
    #translations: Doctrine\ORM\PersistentCollection {#7921 …}
    #translationsCache: [
      "en_US" => App\Entity\Product\ProductTranslation {#7920
        #locale: "en_US"
        #translatable: App\Entity\Product\Product {#7310}
        #id: 40389
        #name: "IEEE PC37.249"
        #slug: "ieee-pc37-249-ieee00005957-242997"
        #description: """
          New IEEE Standard - Superseded - Draft.<br />\n
          Security categorization is the first step in a security risk management framework because of its impact on all other steps, from selection of security controls to apply based upon the assessment to the level of effort required to assess the effectiveness of the security controls put in place. Security categorization covers information (data) at rest and information systems. The approach used in this guide applies only to data at rest. The approach aligns National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60 Volume 1, revision 1 [B2] and with Federal Information Processing Standards (FIPS) FIPS 199 [B1], the latter of which establishes security categories based on the magnitude of harm expected to result from compromises rather than on the results of an assessment that includes an attempt to determine the probability of compromise.<br />\n
          \t\t\t\t<br />\n
          This guide identifies and categorizes protection and automation related data files based on content, use, and risk of disclosure or compromise. Protection and automation related data files include, but are not limited to, files used for configuration, management, and analysis of protective relaying systems.<br />\n
          This guide adds granularity to security practices to precisely apply security without impeding the use or access to protection and automation related data files.
          """
        #metaKeywords: null
        #metaDescription: null
        #shortDescription: "IEEE Draft Guide for Categorizing Security Needs for Protection and Automation Related Data Files"
        -notes: "Superseded"
      }
    ]
    #currentLocale: "en_US"
    #currentTranslation: null
    #fallbackLocale: "en_US"
    #variantSelectionMethod: "match"
    #productTaxons: Doctrine\ORM\PersistentCollection {#7533 …}
    #channels: Doctrine\ORM\PersistentCollection {#7627 …}
    #mainTaxon: Proxies\__CG__\App\Entity\Taxonomy\Taxon {#7311 …}
    #reviews: Doctrine\ORM\PersistentCollection {#7612 …}
    #averageRating: 0.0
    #images: Doctrine\ORM\PersistentCollection {#7644 …}
    -supplier: Proxies\__CG__\App\Entity\Supplier\Supplier {#7325 …}
    -subscriptionCollections: Doctrine\ORM\PersistentCollection {#7389 …}
    -apiLastModifiedAt: DateTime @1743289200 {#7317
      date: 2025-03-30 00:00:00.0 Europe/Paris (+01:00)
    }
    -lastUpdatedAt: DateTime @1707778800 {#7292
      date: 2024-02-13 00:00:00.0 Europe/Paris (+01:00)
    }
    -author: ""
    -publishedAt: DateTime @1658440800 {#7318
      date: 2022-07-22 00:00:00.0 Europe/Paris (+02:00)
    }
    -releasedAt: null
    -confirmedAt: null
    -canceledAt: null
    -edition: null
    -coreDocument: "C37.249"
    -bookCollection: ""
    -pageCount: 63
    -documents: Doctrine\ORM\PersistentCollection {#7464 …}
    -favorites: Doctrine\ORM\PersistentCollection {#7499 …}
  }
  +label: "Historical"
  +icon: "historical"
  -mostRecentAttributeCode: "most_recent"
  -localeContext: Sylius\Component\Locale\Context\CompositeLocaleContext {#1833 …}
}