This chapter contains information about your product’s cybersecurity. Network administrators, system integrators and personnel that commission, maintain or dispose of a device should:
Apply and maintain the device’s security capabilities. See “Device security capabilities” for details.
Review assumptions about protected environments. See "Protected environment assumptions" for details.
Address potential risks and mitigation strategies. See “Potential Risks and compensating controls” for details.
Follow recommendations to optimize cybersecurity.
Your device has security capabilities that:
Allow it to be part of a NERC CIP compliant facility. Go to the North American Electric Reliability Corporation website for information on NERC Reliability Standards.
Align with cybersecurity standards in the IEC 62443 international standard for business IT systems and Industrial Automation and Control Systems (IACS) products. Go to the International Electrotechnical Commission website for information about the IEC 62443 international standard.
Meters manufactured on and after 1-January-2020 comply with Senate Bill 327 or SB-327 of California connected devices, effective in the state of California from beginning of the year 2020. Go to the https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180SB327 website for information about the bill.
To communicate a security topic affecting a Schneider Electric product or solution, go to http://www.se.com/en/work/support/cybersecurity/vulnerability-policy.jsp.
Potential compromise of system availability, integrity, and confidentiality
Failure to follow these instructions can result in death, serious injury, or equipment damage.