Shopping Cart

No products in the cart.

BS EN 62351-7:2017:2018 Edition

$165.47

Power systems management and associated information exchange. Data and communications security – Network and System Management (NSM) data object models

Published By Publication Date Number of Pages
BSI 2018 240
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

IEC 62351-7:2017 defines network and system management (NSM) data object models that are specific to power system operations. These NSM data objects will be used to monitor the health of networks and systems, to detect possible security intrusions, and to manage the performance and reliability of the information infrastructure. The goal is to define a set of abstract objects that will allow the remote monitoring of the health and condition of IEDs (Intelligent Electronic Devices), RTUs (Remote Terminal Units), DERs (Distributed Energy Resources) systems and other systems that are important to power system operations. This new edition constitutes a technical revision and includes the following significant technical changes with respect to IEC TS 62351-7 (2010): NSM object data model reviewed and enriched; UML model adopted for NSM objects description; SNMP protocol MIBs translation included as Code Components. The Code Components included in this IEC standard are also available as electronic machine readable file at: /2.

PDF Catalog

PDF Pages PDF Title
2 undefined
9 CONTENTS
15 FOREWORD
17 1 Scope
2 Normative references
19 3 Terms and definitions
20 4 Abbreviated terms and acronyms
21 5 Overview of Network and System Management (NSM)
5.1 Objectives
22 5.2 NSM concepts
5.2.1 Simple Network Management Protocol (SNMP)
5.2.2 ISO NSM categories
Figures
Figure 1 – Example of a power system SCADA architecture extended with NSM Data Objects
23 5.2.3 NSM “data objects” for power system operations
5.2.4 Other NSM protocols
5.3 Communication network management
5.3.1 Network configuration
24 5.3.2 Network backup
5.3.3 Communications failures and degradation
25 5.4 Communication protocols
5.5 End systems management
26 5.6 Intrusion detection systems (IDS)
5.6.1 IDS guidelines
Figure 2 – IDS Information exchange between applications:generic communication topology
27 5.6.2 IDS: Passive observation techniques
5.6.3 IDS: Active security monitoring architecture with NSM data objects
28 5.7 End-to-end security
5.7.1 End-to-end security concepts
Figure 3 – Active security monitoring architecture with NSM data objects
29 5.7.2 Role of NSM in end-to-end security
30 Figure 4 – Comparison of NSM data objects with IEC 61850 objects
Figure 5 – Management of both the power system infrastructure and the information infrastructure
31 5.8 NSM requirements: detection functions
5.8.1 Detecting unauthorized access
5.8.2 Detecting resource exhaustion as a denial of service (DoS) attack
32 5.8.3 Detecting invalid buffer access DoS attacks
5.8.4 Detecting tampered/malformed PDUs
5.8.5 Detecting physical access disruption
5.8.6 Detecting invalid network access
33 5.8.7 Detecting coordinated attacks
5.9 Abstract object and agent UML descriptions
5.9.1 Purpose of UML
34 5.9.2 Abstract types and base types
Figure 6 – Abstract types
35 5.9.3 Enumerated Types
5.9.4 Abstract agents
Figure 7 – Enumerated types
36 Figure 8 – Subagents
37 Figure 9 – Environmental agent
Figure 10 – Model stereotypes
38 5.9.5 Unsolicited Event Notification
5.9.6 UML Model extension
5.10 Abstract Object UML translation to SNMP
5.10.1 Simple Network Management Protocol (SNMP)
39 5.10.2 Management information bases (MIBs)
Figure 11 – Object identifier structure
40 5.11 SNMP mapping of UML model Objects
41 5.12 SNMP Security
Figure 12 – SNMP table
42 Figure 13 – SNMP RFCs map and security
43 6 Abstract objects
6.1 General
Figure 14 – SNMP Entity
44 6.2 Package Abstract Types
6.2.1 General
6.2.2 BooleanValue
6.2.3 BooleanValueTs
6.2.4 CounterTs
Tables
Table 1 – Attributes of Abstract Types::BooleanValue
Table 2 – Attributes of Abstract Types::BooleanValueTs
45 6.2.5 CntRs
6.2.6 Floating
6.2.7 FloatingTs
Table 3 – Attributes of Abstract Types::CounterTs
Table 4 – Attributes of Abstract Types::CntRs
Table 5 – Attributes of Abstract Types::Floating
46 6.2.8 EntityIndex
6.2.9 Integer
6.2.10 IntegerTs
Table 6 – Attributes of Abstract Types::FloatingTs
Table 7 – Attributes of Abstract Types::EntityIndex
Table 8 – Attributes of Abstract Types::Integer
Table 9 – Attributes of Abstract Types::IntegerTs
47 6.2.11 InetAddress
6.2.12 InetAddressType
6.2.13 MacAddress
6.2.14 Selector
Table 10 – Attributes of Abstract Types::InetAddress
Table 11 – Attributes of Abstract Types::InetAddressType
Table 12 – Attributes of Abstract Types::MacAddress
48 6.2.15 Timestamp
6.2.16 CharString
6.2.17 CharStringTs
6.2.18 AbstractBaseType root class
Table 13 – Attributes of Abstract Types::Selector
Table 14 – Attributes of Abstract Types::Timestamp
Table 15 – Attributes of Abstract Types::CharString
Table 16 – Attributes of Abstract Types::CharStringTs
49 6.2.19 AbstractAgent root class
6.3 Package EnumeratedTypes
6.3.1 General
6.3.2 AppDatStKind enumeration
6.3.3 PhyHealthKind enumeration
6.3.4 ExtKind enumeration
Table 17 – Literals of EnumeratedTypes::AppDatStKind
Table 18 – Literals of EnumeratedTypes::PhyHealthKind
50 6.3.5 IntKind enumeration
6.3.6 LnkKind enumeration
6.3.7 PSPAccKind enumeration
6.3.8 ProtIdKind enumeration
Table 19 – Literals of EnumeratedTypes::ExtKind
Table 20 – Literals of EnumeratedTypes::IntKind
Table 21 – Literals of EnumeratedTypes::LnkKind
Table 22 – Literals of EnumeratedTypes::PSPAccKind
51 6.3.9 EventKind enumeration
6.3.10 TimSyncIssueKind enumeration
Table 23 – Literals of EnumeratedTypes::ProtIdKind
Table 24 – Literals of EnumeratedTypes::EventKind
Table 25 – Literals of EnumeratedTypes::TimSyncIssueKind
52 6.3.11 SecurityProfileKind enumeration
6.3.12 TimSyncSrcKind enumeration
6.3.13 AppDatStType
Table 26 – Literals of EnumeratedTypes::SecurityProfileKind
Table 27 – Literals of EnumeratedTypes::TimSyncSrcKind
53 6.3.14 PhyHealthType
6.3.15 ExtType
6.3.16 IntType
6.3.17 EventType
Table 28 – Attributes of EnumeratedTypes::AppDatStType
Table 29 – Attributes of EnumeratedTypes::PhyHealthType
Table 30 – Attributes of EnumeratedTypes::ExtType
Table 31 – Attributes of EnumeratedTypes::IntType
54 6.3.18 PSPAccType
6.3.19 ProtIdType
6.3.20 TimSyncIssueType
6.3.21 SecurityProfileType
Table 32 – Attributes of EnumeratedTypes::EventType
Table 33 – Attributes of EnumeratedTypes::PSPAccType
Table 34 – Attributes of EnumeratedTypes::ProtIdType
Table 35 – Attributes of EnumeratedTypes::TimSyncIssueType
55 6.3.22 TimSyncSrcType
6.3.23 LnkType
7 Agents
7.1 Package Overview
Table 36 – Attributes of EnumeratedTypes::SecurityProfileType
Table 37 – Attributes of EnumeratedTypes::TimSyncSrcType
Table 38 – Attributes of EnumeratedTypes::LnkType
56 Figure 15 – Class diagram Overview::Part7 Classes Overview
57 7.2 Package Environmental Agent
7.2.1 General
Figure 16 – Class diagram Environmental Agent::Environmental
58 7.2.2 Environmental
7.2.3 PSUPEntry
Table 39 – Attributes of Environmental Agent::Environmental
Table 40 – Attributes of Environmental Agent::PSUPEntry
59 7.2.4 Notification
7.2.5 SecurityNotification
Table 41 – Attributes of Environmental Agent::Notification
Table 42 – Attributes of Environmental Agent::SecurityNotification
60 7.3 Package IED Agent
7.3.1 General
Figure 17 – Class diagram IED Agent::IED
61 7.3.2 IED
Table 43 – Attributes of IED Agent::IED
62 7.3.3 CPUEntry
Table 44 – Attributes of IED Agent::CPUEntry
63 7.3.4 EXTEntry
7.3.5 STOREEntry
Table 45 – Attributes of IED Agent::EXTEntry
Table 46 – Attributes of IED Agent::STOREEntry
64 7.3.6 Notification
7.3.7 SecurityNotification
7.4 Package Application Protocols Agents
7.4.1 General
Table 47 – Attributes of IED Agent::Notification
Table 48 – Attributes of IED Agent::SecurityNotification
65 7.4.2 Package Common objects
Figure 18 – Class diagram Common objects::Application Protocol common objects
Table 49 – Attributes of Common objects::CommonProtocolInfo
66 7.4.3 Package IEEE 1815 and IEC 60870-5 Agent
67 Figure 19 – Class diagram IEEE 1815 and IEC 60870-5 Agent::IEEE 1815 and IEC 60870 Agent Relationships
68 Table 50 – Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPProtocolInfo
69 Table 51 – Attributes of IEEE 1815 and IEC 60870-5 Agent::Association
71 Table 52 – Attributes of IEEE 1815 and IEC 60870-5 Agent::Summary
72 Table 53 – Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPSecurityNotification
Table 54 – Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPNotification
73 Table 55 – Attributes of IEEE 1815 and IEC 60870-5 Agent::MasterAssociation
74 Table 56 – Attributes of IEEE 1815 and IEC 60870-5 Agent::OutstationAssociation
75 7.4.4 Package IEC61850 Agent
76 Figure 20 – Class diagram ACSI::ACSI
77 Table 57 – Attributes of ACSI::ACSISummary
78 Figure 21 – Class diagram MMS::MMS
79 Table 58 – Attributes of MMS::MMSProtocolInfo
80 Table 59 – Attributes of MMS::MMSProvider
81 Table 60 – Attributes of MMS::MMSAssociation
82 Table 61 – Attributes of MMS::MMSSecurityNotification
Table 62 – Attributes of MMS::MMSNotification
83 Figure 22 – Class diagram SV and GSE common objects::SV and GSE common objects
Table 63 – Attributes of SV and GSE common objects::GSEandSVCommon
84 Table 64 – Attributes of SV and GSE common objects::GSEandSVPublisherAssociation
Table 65 – Attributes of SV and GSE common objects::GSEandSVSubscriberAssociation
85 Figure 23 – Class diagram SV::SV
86 Table 66 – Attributes of SV::SVProvider
Table 67 – Attributes of SV::SVPublisherAssociationIP
87 Table 68 – Attributes of SV::SVPublisherAssociationL2
Table 69 – Attributes of SV::SVSubcriberAssociationIP
88 Table 70 – Attributes of SV::SVSubcriberAssociationL2
Table 71 – Attributes of SV::SVNotification
89 Figure 24 – Class diagram GSE::GSE
90 Table 72 – Attributes of GSE::GSESubscriberAssociation
Table 73 – Attributes of GSE::GSEProvider
91 Table 74 – Attributes of GSE::GSEPublisherAssociationIP
Table 75 – Attributes of GSE::GSEPublisherAssociationL2
92 Table 76 – Attributes of GSE::GSESubcriberAssociationIP
Table 77 – Attributes of GSE::GSESubscriberAssociationL2
93 Table 78 – Attributes of GSE::GSENotification
94 7.5 Package Interfaces Agent
7.5.1 General
Figure 25 – Class diagram Interfaces Agent::Interfaces
95 7.5.2 Interface
7.5.3 Interfaces
Table 79 – Attributes of Interfaces Agent::Interface
96 Table 80 – Attributes of Interfaces Agent::Interfaces
97 7.5.4 ETHEntry
7.5.5 KEYEntry
Table 81 – Attributes of Interfaces Agent::ETHEntry
Table 82 – Attributes of Interfaces Agent::KEYEntry
98 7.5.6 SEREntry
7.5.7 ALGEntry
Table 83 – Attributes of Interfaces Agent::SEREntry
Table 84 – Attributes of Interfaces Agent::ALGEntry
99 7.5.8 USBEntry
7.5.9 Notification
Table 85 – Attributes of Interfaces Agent::USBEntry
Table 86 – Attributes of Interfaces Agent::Notification
100 7.6 Package Clocks Agent
7.6.1 General
7.6.2 Clock
Figure 26 – Class diagram Clocks Agent::Clocks Agent
Table 87 – Attributes of Clocks Agent::Clock
101 7.6.3 ClockEntry
Table 88 – Attributes of Clocks Agent::ClockEntry
102 7.6.4 SecurityNotification
7.7 Network and Transport Agents
7.7.1 TCP
7.7.2 User Datagram Protocol (UDP)
7.7.3 IP
Table 89 – Attributes of Clocks Agent::SecurityNotification
103 8 SNMP security
9 Secured time synchronization
104 Annex A (normative) SNMP MIB Mapping
236 Annex B (informative) Mapping of relevant IEC 61850 Objects
Table B.1 – IEC 61850-7-4 objects mapping
237 Bibliography
BS EN 62351-7:2017
$165.47