§ Numbers and times
of all stops and starts of systems, controllers, and applications
§ Status of each
application and/or software module: stopped, suspended, running, not
responding, inadequate or inconsistent input, errors
in outputs, error state, etc.
§ Status of all
network connections to an IED, including numbers and times of temporary and
permanent failures
§ Status of any
“keep-alive” heartbeats, including any missed heartbeats
§ Status of backup
or failover mechanisms, such as numbers and times these mechanisms were
unavailable
§ Status of data
reporting: normal, not able to keep up with requests, missing data, etc.
§ Status of access:
numbers, times, and types of unauthorized attempts to access data or issue
controls
§ Anomalies in data
access (e.g. individual request when normally reported periodically)
|
§ Start or stop
reporting
§ Restart IED
§ Kill and/or
restart application
§ Re-establish
connection to another IED
§ Shut down another
IED
§ Provide event log
of information events
§ Change password
§ Change backup or
failover options
|