Shopping Cart

No products in the cart.

BSI PD IEC/TR 62351-13:2016

$167.15

Power systems management and associated information exchange. Data and communications security – Guidelines on security topics to be covered in standards and specifications

Published By Publication Date Number of Pages
BSI 2016 38
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of IEC 62351, which is a Technical Report, provides guidelines on what security topics could or should be covered in standards and specifications (IEC or otherwise) that are to be used in the power industry, and the audience is therefore the developers of standards and specifications.

These guidelines cannot be prescriptive for every standard, since individual standards and specifications may legitimately have very different focuses, but it should be expected that the combination of such standards and specifications used in any implementation should cover these security topics. These guidelines are therefore to be used as a checklist for the combination of standards and specifications used in implementations of systems.

Out-of-scope are explicit methods for cyber security in product development, implementations, or operations.

PDF Catalog

PDF Pages PDF Title
4 CONTENTS
6 FOREWORD
8 INTRODUCTION
9 Figures
Figure 1 – Security requirements, threats, and possible attacks
10 1 Scope
2 Normative references
3 Terms and definitions
11 4 Abbreviated terms and acronyms
5 Security requirements for users and applications interacting with automation systems
5.1 Risk assessment, security policies and security requirements
12 Figure 2 – Focus of different security standards and guidelines
14 5.2 User-focused cybersecurity procedures and techniques
16 6 Information and communication technology (ICT) cryptographic techniques
6.1 General
6.2 Best practices for specifying cryptography
17 6.3 Cryptographic methods
6.4 Internet cryptography
18 6.5 Wireless cryptography
6.6 Key management using public key cryptography
19 6.7 Multicast and group keys
20 6.8 Device and platform integrity
6.9 Design secure network configurations
6.10 Network and system management (NSM)
6.11 Defence-in-depth
21 6.12 Security testing and validation procedures
6.13 Security interoperability
6.14 Additional cybersecurity techniques
22 7 Engineering design and configuration management for grid resilience
7.1 Intertwining of cyber security and engineering to provide grid resilience
7.2 Security planning
Figure 3 – General security process – Continuous cycle
23 7.3 Engineering strategies for security
7.4 System engineering practices and configurations
24 7.5 Power system equipment monitoring, analysis, and control
7.6 Centralized monitoring and control
25 7.7 Centralized power system analysis and control
7.8 Testing
26 7.9 Training
8 Correlation of cyber security with information exchange standards
8.1 Concepts for correlating cyber security with information exchange standards
27 Figure 4 – ISO/OSI 7-Layer reference model and GWAC Stack reference model
28 Figure 5 – Core Smart Grid standards for utilities
Figure 6 – Customer-focused Smart Grid standards
29 8.2 Security for different OSI reference model layers
30 8.3 Interrelationships between the IEC 62351 security standards and IEC communication standards
Figure 7 – Interrelationships between the IEC 62351 security standards and certain IEC communication standards
31 Bibliography
BSI PD IEC/TR 62351-13:2016
$167.15