BSI PD IEC/TR 62351-13:2016
$167.15
Power systems management and associated information exchange. Data and communications security – Guidelines on security topics to be covered in standards and specifications
Published By | Publication Date | Number of Pages |
BSI | 2016 | 38 |
This part of IEC 62351, which is a Technical Report, provides guidelines on what security topics could or should be covered in standards and specifications (IEC or otherwise) that are to be used in the power industry, and the audience is therefore the developers of standards and specifications.
These guidelines cannot be prescriptive for every standard, since individual standards and specifications may legitimately have very different focuses, but it should be expected that the combination of such standards and specifications used in any implementation should cover these security topics. These guidelines are therefore to be used as a checklist for the combination of standards and specifications used in implementations of systems.
Out-of-scope are explicit methods for cyber security in product development, implementations, or operations.
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | CONTENTS |
6 | FOREWORD |
8 | INTRODUCTION |
9 | Figures Figure 1 – Security requirements, threats, and possible attacks |
10 | 1 Scope 2 Normative references 3 Terms and definitions |
11 | 4 Abbreviated terms and acronyms 5 Security requirements for users and applications interacting with automation systems 5.1 Risk assessment, security policies and security requirements |
12 | Figure 2 – Focus of different security standards and guidelines |
14 | 5.2 User-focused cybersecurity procedures and techniques |
16 | 6 Information and communication technology (ICT) cryptographic techniques 6.1 General 6.2 Best practices for specifying cryptography |
17 | 6.3 Cryptographic methods 6.4 Internet cryptography |
18 | 6.5 Wireless cryptography 6.6 Key management using public key cryptography |
19 | 6.7 Multicast and group keys |
20 | 6.8 Device and platform integrity 6.9 Design secure network configurations 6.10 Network and system management (NSM) 6.11 Defence-in-depth |
21 | 6.12 Security testing and validation procedures 6.13 Security interoperability 6.14 Additional cybersecurity techniques |
22 | 7 Engineering design and configuration management for grid resilience 7.1 Intertwining of cyber security and engineering to provide grid resilience 7.2 Security planning Figure 3 – General security process – Continuous cycle |
23 | 7.3 Engineering strategies for security 7.4 System engineering practices and configurations |
24 | 7.5 Power system equipment monitoring, analysis, and control 7.6 Centralized monitoring and control |
25 | 7.7 Centralized power system analysis and control 7.8 Testing |
26 | 7.9 Training 8 Correlation of cyber security with information exchange standards 8.1 Concepts for correlating cyber security with information exchange standards |
27 | Figure 4 – ISO/OSI 7-Layer reference model and GWAC Stack reference model |
28 | Figure 5 – Core Smart Grid standards for utilities Figure 6 – Customer-focused Smart Grid standards |
29 | 8.2 Security for different OSI reference model layers |
30 | 8.3 Interrelationships between the IEC 62351 security standards and IEC communication standards Figure 7 – Interrelationships between the IEC 62351 security standards and certain IEC communication standards |
31 | Bibliography |