{
	"id": "7c181ef6-8337-4d7d-87e0-87636c85bdfc",
	"created_at": "2026-04-06T00:14:01.598414Z",
	"updated_at": "2026-04-10T13:12:55.462592Z",
	"deleted_at": null,
	"sha1_hash": "f8d0580c432960cb604340197130412b414a5be8",
	"title": "IEEE Standards Association",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 34522,
	"plain_text": "IEEE Standards Association\r\nArchived: 2026-04-05 16:10:32 UTC\r\nCurrent projects that have been authorized by the IEEE SA Standards Board to develop a standard.\r\nNo Active Projects\r\nStandards approved by the IEEE SA Standards Board that are within the 10-year lifecycle.\r\n1686-2022\r\nIEEE Standard for Intelligent Electronic Devices Cybersecurity Capabilities\r\nThe functions and features to be provided in intelligent electronic devices (IEDs) to accommodate cybersecurity\r\nprograms are defined in this standard. Security regarding the access, operation, configuration, firmware revision\r\nand data retrieval from an IED. Confidentiality, integrity, and availability of external interfaces of the IED is also\r\naddressed.\r\nLearn More About 1686-2022\r\n1686-2022/Cor 1-2025\r\nIEEE Standard for Intelligent Electronic Devices Cybersecurity Capabilities--Corrigendum 1\r\nThe functions and features to be provided in intelligent electronic devices (IEDs) to accommodate cybersecurity\r\nprograms are defined in this standard. Security regarding access, operation, configuration, firmware revision, and\r\ndata retrieval from an IED is addressed. Confidentiality, integrity, and availability of external interfaces of the IED\r\nare also addressed. This corrigendum clarifies the definition of value forcing and updates outdated bibliographic\r\nreferences.\r\nLearn More About 1686-2022/Cor 1-2025\r\nThese standards have been replaced with a revised version of the standard, or by a compilation of the\r\noriginal active standard and all its existing amendments, corrigenda, and errata.\r\n1686-2007\r\nIEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities\r\nThe functions and features to be provided in substation intelligent electronic devices (IEDs) to accommodate\r\ncritical infrastructure protection programs are defined in this standard. Security regarding the access, operation,\r\nconfiguration, firmware revision, and data retrieval from an IED is addressed in this standard. Communications\r\nhttps://standards.ieee.org/standard/1686-2013.html\r\nPage 1 of 2\n\nfor the purpose of power system protection (teleprotection) is not addressed. Encryption for the secure\r\ntransmission of data both within and external to the substation, including supervisory control and data acquisition,\r\nis not part of this standard as this is addressed in other efforts.\r\nLearn More About 1686-2007\r\nThese standards have been removed from active status through a ballot where the standard is made\r\ninactive as a consensus decision of a balloting group.\r\nNo Inactive-Withdrawn Standards\r\nThese standards are removed from active status through an administrative process for standards that have\r\nnot undergone a revision process within 10 years.\r\nNo Inactive-Reserved Standards\r\nSource: https://standards.ieee.org/standard/1686-2013.html\r\nhttps://standards.ieee.org/standard/1686-2013.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://standards.ieee.org/standard/1686-2013.html"
	],
	"report_names": [
		"1686-2013.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434441,
	"ts_updated_at": 1775826775,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f8d0580c432960cb604340197130412b414a5be8.pdf",
		"text": "https://archive.orkl.eu/f8d0580c432960cb604340197130412b414a5be8.txt",
		"img": "https://archive.orkl.eu/f8d0580c432960cb604340197130412b414a5be8.jpg"
	}
}