Understand Meter and ERT Security Levels

Itron meters and ERTs may fall into one of three Itron security level features:

  • Basic security devices. These ERTs and meters do not require the use of secure commands or keys and they operate in only a single mode. These devices respond to all commands on their action command menu (provided you have the necessary permissions).
  • Enhanced security capable devices. Utilities can configure these ERTs and meters to operate in one of three security levels:
    • Ready to secure (enhanced security not enabled). At this security level the device does not require use of secure commands. It responds to all commands on the device's action command menu except those that connect and disconnect service at a customer's premises. Service connect and disconnects are unavailable to any meter or ERT operating without security enabled.
    • Command security. At this security level the device responds to only secure commands. This includes commands for connecting and disconnecting service to a customer and open session commands.
    • Full security. At this level the device requires the use of secure commands and/or keys for all actions on the action command menu. It requires commands for connecting and disconnecting service to a customer, open session commands, and the use of reading keys for reading or retrieving data from the device.
  • Network Mode (multi-mode capable devices). In Network Mode the device always operates at a secure level, requiring an open session for all actions on its action command menu. An open session delivers a signed authorization that temporarily unlocks the device for a configured amount of time. For more information about Network Mode, see Understand Mobile Mode and Network Mode.

Note:  For meters and ERTs operating with security, Field Tools facilitates the exchange of all security materials. At the request of your utility's security officer, Itron Security Manager (ISM) issues security materials (signed authorizations, secure commands, keys, and so on) and passes them along to the FDM Tools server your Field Tools mobile application syncs with. If security material has been issued for any of your work, you can quickly and easily retrieve it using Request Commands on the Field Tools menu. For more information, see Request Commands.