Active
Standard Corrigendum
Most Recent
IEEE P1686:2022/Cor 1
IEEE Draft Standard for Intelligent Electronic Devices Cybersecurity Capabilities - Corrigendum 1
Summary
Corrigendum Standard - Active - Draft.
The functions and features to be provided in intelligent electronic devices (IEDs) to accommodate cybersecurity programs are defined in this standard. Security regarding access, operation, configuration, firmware revision, and data retrieval from an IED are addressed. Confidentiality, integrity, and availability of external interfaces of the IED are also addressed. This corrigendum clarifies the definition of value forcing and updates outdated bibliographic references.
This corrigendum
(1) clarifies the definition of “Value forcing” in 5.5.3.1(d) and differentiates it from the concept of “Control operation”.
(2) updates outdated references to external standards and RFCs.
The standard defines the functions and features to be provided in IEDs to support cybersecurity programs. Specifically, the standard states what safeguards, audit mechanisms, and alarm indications shall be provided by the vendor of the IED regarding the capabilities associated with access, operation, configuration, firmware revision, and data retrieval from an IED. The standard also allows the user to define a security program around these features tailored to the specific requirements of that security program; if an IED does not meet this standard, whether the requirements are tailored or not, this can identify the need for other defensive measures (technical and/or procedural) to be taken. This standard also defines explicit measures to help ensure authenticity, integrity, and confidentiality of data at rest and in transit.
The functions and features to be provided in intelligent electronic devices (IEDs) to accommodate cybersecurity programs are defined in this standard. Security regarding access, operation, configuration, firmware revision, and data retrieval from an IED are addressed. Confidentiality, integrity, and availability of external interfaces of the IED are also addressed. This corrigendum clarifies the definition of value forcing and updates outdated bibliographic references.
This corrigendum
(1) clarifies the definition of “Value forcing” in 5.5.3.1(d) and differentiates it from the concept of “Control operation”.
(2) updates outdated references to external standards and RFCs.
The standard defines the functions and features to be provided in IEDs to support cybersecurity programs. Specifically, the standard states what safeguards, audit mechanisms, and alarm indications shall be provided by the vendor of the IED regarding the capabilities associated with access, operation, configuration, firmware revision, and data retrieval from an IED. The standard also allows the user to define a security program around these features tailored to the specific requirements of that security program; if an IED does not meet this standard, whether the requirements are tailored or not, this can identify the need for other defensive measures (technical and/or procedural) to be taken. This standard also defines explicit measures to help ensure authenticity, integrity, and confidentiality of data at rest and in transit.
Notes
Active
Technical characteristics
| Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
| Publication Date | 05/21/2025 |
| Page Count | 12 |
| EAN | --- |
| ISBN | --- |
| Weight (in grams) | --- |
| Brochures |
|
Amendments modifies
01/02/2023
Active
Most Recent
Previous versions
21/05/2025
Active
Most Recent
01/02/2023
Active
Most Recent
13/01/2014
Superseded
Historical
11/02/2008
Superseded
Historical