Skip to main content
Version: 3.0

2.4.14.17

Req NoRequirementCompliance Class And ApplicabilityPrimary KeywordSecondary Keyword
2.4.14.17Steps have been taken to prevent inauthentic devices from being programmed with confidential firmware images and configuration data. This is to prevent IP theft and reverse engineering.Mandatory for Class 2 and aboveBusinessProcess