{"id":693880,"date":"2024-11-06T05:34:37","date_gmt":"2024-11-06T05:34:37","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ul-2900-2-22016\/"},"modified":"2024-11-06T05:34:37","modified_gmt":"2024-11-06T05:34:37","slug":"ul-2900-2-22016","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ul\/ul-2900-2-22016\/","title":{"rendered":"UL 2900-2-2:2016"},"content":{"rendered":"
1 Scope<\/b><\/p>\n
1.1 This security evaluation outline applies to the evaluation of industrial control systems components. It applies to, but is not limited to, the following products:<\/p>\n
\na)\u00a0\u00a0\u00a0\u00a0Programmable Logic Controllers (PLC);<\/p>\n
b)\u00a0\u00a0\u00a0\u00a0Distributed Control Systems (DCS);<\/p>\n
c)\u00a0\u00a0\u00a0\u00a0Process control systems;<\/p>\n
d)\u00a0\u00a0\u00a0\u00a0Data acquistion systems;<\/p>\n
e)\u00a0\u00a0\u00a0\u00a0Historians, data loggers and data storage systems;<\/p>\n
f)\u00a0\u00a0\u00a0\u00a0Control servers;<\/p>\n
g)\u00a0\u00a0\u00a0\u00a0SCADA servers;<\/p>\n
h)\u00a0\u00a0\u00a0\u00a0Remote Terminal Units (RTU);<\/p>\n
i)\u00a0\u00a0\u00a0\u00a0Intelligent Electronic Devices (IED);<\/p>\n
j)\u00a0\u00a0\u00a0\u00a0Human-Machine Interfaces (HMI);<\/p>\n
k)\u00a0\u00a0\u00a0\u00a0Input\/Output (IO) servers;<\/p>\n
l)\u00a0\u00a0\u00a0\u00a0Fieldbuses;<\/p>\n
m)\u00a0\u00a0\u00a0\u00a0Networking equipment for ICS systems;<\/p>\n
n)\u00a0\u00a0\u00a0\u00a0Data radios;<\/p>\n
o)\u00a0\u00a0\u00a0\u00a0Smart sensors;<\/p>\n
p)\u00a0\u00a0\u00a0\u00a0Controllers; and<\/p>\n
q)\u00a0\u00a0\u00a0\u00a0Embedded system\/controllers.<\/p>\n<\/blockquote>\n
1.2 This outline does not contain any requirements regarding functional testing of products unless where expressly specified.<\/p>\n
1.3 This outline also describes requirements for the product risk management process carried out by the vendor of the product, including a list of security controls that the product (or the vendor, as applicable) shall comply with unless a risk assessment done by the vendor shows that the risk of not implementing one of these security controls is acceptable.<\/p>\n","protected":false},"excerpt":{"rendered":"
Outline for Software Cybersecurity for Network-Connectable Products, Part 2-2: Particular Requirements for Industrial Control Systems<\/b><\/p>\n
\n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n UL<\/b><\/a><\/td>\n 2016-03-30<\/td>\n 14<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":693890,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2680],"product_tag":[],"class_list":{"0":"post-693880","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ul","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/693880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/693890"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=693880"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=693880"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=693880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}