{"id":693880,"date":"2024-11-06T05:34:37","date_gmt":"2024-11-06T05:34:37","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ul-2900-2-22016\/"},"modified":"2024-11-06T05:34:37","modified_gmt":"2024-11-06T05:34:37","slug":"ul-2900-2-22016","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ul\/ul-2900-2-22016\/","title":{"rendered":"UL 2900-2-2:2016"},"content":{"rendered":"

1 Scope<\/b><\/p>\n

1.1 This security evaluation outline applies to the evaluation of industrial control systems components. It applies to, but is not limited to, the following products:<\/p>\n

\n

a)\u00a0\u00a0\u00a0\u00a0Programmable Logic Controllers (PLC);<\/p>\n

b)\u00a0\u00a0\u00a0\u00a0Distributed Control Systems (DCS);<\/p>\n

c)\u00a0\u00a0\u00a0\u00a0Process control systems;<\/p>\n

d)\u00a0\u00a0\u00a0\u00a0Data acquistion systems;<\/p>\n

e)\u00a0\u00a0\u00a0\u00a0Historians, data loggers and data storage systems;<\/p>\n

f)\u00a0\u00a0\u00a0\u00a0Control servers;<\/p>\n

g)\u00a0\u00a0\u00a0\u00a0SCADA servers;<\/p>\n

h)\u00a0\u00a0\u00a0\u00a0Remote Terminal Units (RTU);<\/p>\n

i)\u00a0\u00a0\u00a0\u00a0Intelligent Electronic Devices (IED);<\/p>\n

j)\u00a0\u00a0\u00a0\u00a0Human-Machine Interfaces (HMI);<\/p>\n

k)\u00a0\u00a0\u00a0\u00a0Input\/Output (IO) servers;<\/p>\n

l)\u00a0\u00a0\u00a0\u00a0Fieldbuses;<\/p>\n

m)\u00a0\u00a0\u00a0\u00a0Networking equipment for ICS systems;<\/p>\n

n)\u00a0\u00a0\u00a0\u00a0Data radios;<\/p>\n

o)\u00a0\u00a0\u00a0\u00a0Smart sensors;<\/p>\n

p)\u00a0\u00a0\u00a0\u00a0Controllers; and<\/p>\n

q)\u00a0\u00a0\u00a0\u00a0Embedded system\/controllers.<\/p>\n<\/blockquote>\n

1.2 This outline does not contain any requirements regarding functional testing of products unless where expressly specified.<\/p>\n

1.3 This outline also describes requirements for the product risk management process carried out by the vendor of the product, including a list of security controls that the product (or the vendor, as applicable) shall comply with unless a risk assessment done by the vendor shows that the risk of not implementing one of these security controls is acceptable.<\/p>\n","protected":false},"excerpt":{"rendered":"

Outline for Software Cybersecurity for Network-Connectable Products, Part 2-2: Particular Requirements for Industrial Control Systems<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
UL<\/b><\/a><\/td>\n2016-03-30<\/td>\n14<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":693890,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2680],"product_tag":[],"class_list":{"0":"post-693880","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ul","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/693880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/693890"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=693880"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=693880"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=693880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}