||Protection of Devices Beyond Scope of Control: Equipment Suppliers should implement techniques such as tamper-proof crypto-chips/authentication credentials and (remote) authentication for (service provider) configuration controls, in customer premises equipment. Additionally, capabilities to remotely access or delete sensitive information on these devices is encouraged.
||Internet/Data; Satellite; Wireless; Wireline
||Cyber Security;Encryption;Information Protection;Intrusion Detection;
||PacketCableTM Security Specification PKT-SP-SEC-I11-040730, IETF RFC 3261, Related to BP 8134