IEEE 1686
IEEE Standard for IED Cyber Security Capabilities for substations
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (5)
IEEE 1686: Access Management
Controlling access to critical infrastructure systems (IEEE 1686)
| Code | Title |
|---|---|
| IEEE1686-06 | Physical and logical access controls |
| IEEE1686-07 | Personnel risk assessment |
| IEEE1686-08 | Electronic access perimeter management |
| IEEE1686-09 | Interactive remote access security |
| IEEE1686-10 | Revocation of access procedures |
IEEE 1686: Asset Identification & Governance
Identifying and governing critical assets (IEEE 1686)
| Code | Title |
|---|---|
| IEEE1686-01 | Critical asset identification and inventory |
| IEEE1686-02 | System security categorization |
| IEEE1686-03 | Security governance structure |
| IEEE1686-04 | Roles and responsibilities for critical systems |
| IEEE1686-05 | Security policy for operational technology |
IEEE 1686: Incident Response & Recovery
Responding to incidents in critical infrastructure (IEEE 1686)
| Code | Title |
|---|---|
| IEEE1686-16 | Incident response plan for operational disruptions |
| IEEE1686-17 | Recovery plan for critical systems |
| IEEE1686-18 | Reporting obligations to authorities |
| IEEE1686-19 | Coordination with sector-specific agencies |
| IEEE1686-20 | Exercises and drills for OT incidents |
IEEE 1686: Supply Chain & Configuration
Managing supply chain and system configurations (IEEE 1686)
| Code | Title |
|---|---|
| IEEE1686-21 | Supply chain risk management for critical components |
| IEEE1686-22 | Configuration management for OT systems |
| IEEE1686-23 | Change management procedures |
| IEEE1686-24 | Vulnerability assessment for critical systems |
IEEE 1686: Systems Security
Securing operational technology systems (IEEE 1686)
| Code | Title |
|---|---|
| IEEE1686-11 | Security patch management for OT |
| IEEE1686-12 | Malware prevention for operational systems |
| IEEE1686-13 | Network security monitoring |
| IEEE1686-14 | System security hardening |
| IEEE1686-15 | Ports and services management |
Maps to 555 other frameworks
Frequently Asked Questions
What is IEEE 1686?
IEEE 1686 is a compliance framework from International with 5 domains and 24 controls. IEEE Standard for IED Cyber Security Capabilities for substations It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does IEEE 1686 have?
IEEE 1686 has 24 controls organised across 5 domains. The largest domains are IEEE 1686: Access Management (5 controls), IEEE 1686: Asset Identification & Governance (5 controls), IEEE 1686: Incident Response & Recovery (5 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does IEEE 1686 map to?
IEEE 1686 maps to 555 other compliance frameworks. The top mapping partners are C2M2 (67% coverage), IEC 62443 (67% coverage), BIMCO Cyber Security (67% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with IEEE 1686 compliance?
Start your IEEE 1686 compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about IEEE 1686 requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 24 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required