2.4.14.17
| Req No | Requirement | Compliance Class And Applicability | Primary Keyword | Secondary Keyword | 
|---|---|---|---|---|
| 2.4.14.17 | Steps have been taken to prevent inauthentic devices from being programmed with confidential firmware images and configuration data. This is to prevent IP theft and reverse engineering. | Mandatory for Class 2 and above | Business | Process |