BS EN 62351-7:2017:2018 Edition
$165.47
Power systems management and associated information exchange. Data and communications security – Network and System Management (NSM) data object models
Published By | Publication Date | Number of Pages |
BSI | 2018 | 240 |
IEC 62351-7:2017 defines network and system management (NSM) data object models that are specific to power system operations. These NSM data objects will be used to monitor the health of networks and systems, to detect possible security intrusions, and to manage the performance and reliability of the information infrastructure. The goal is to define a set of abstract objects that will allow the remote monitoring of the health and condition of IEDs (Intelligent Electronic Devices), RTUs (Remote Terminal Units), DERs (Distributed Energy Resources) systems and other systems that are important to power system operations. This new edition constitutes a technical revision and includes the following significant technical changes with respect to IEC TS 62351-7 (2010): NSM object data model reviewed and enriched; UML model adopted for NSM objects description; SNMP protocol MIBs translation included as Code Components. The Code Components included in this IEC standard are also available as electronic machine readable file at: /2.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
9 | CONTENTS |
15 | FOREWORD |
17 | 1 Scope 2 Normative references |
19 | 3 Terms and definitions |
20 | 4 Abbreviated terms and acronyms |
21 | 5 Overview of Network and System Management (NSM) 5.1 Objectives |
22 | 5.2 NSM concepts 5.2.1 Simple Network Management Protocol (SNMP) 5.2.2 ISO NSM categories Figures Figure 1 – Example of a power system SCADA architecture extended with NSM Data Objects |
23 | 5.2.3 NSM “data objects” for power system operations 5.2.4 Other NSM protocols 5.3 Communication network management 5.3.1 Network configuration |
24 | 5.3.2 Network backup 5.3.3 Communications failures and degradation |
25 | 5.4 Communication protocols 5.5 End systems management |
26 | 5.6 Intrusion detection systems (IDS) 5.6.1 IDS guidelines Figure 2 – IDS Information exchange between applications:generic communication topology |
27 | 5.6.2 IDS: Passive observation techniques 5.6.3 IDS: Active security monitoring architecture with NSM data objects |
28 | 5.7 End-to-end security 5.7.1 End-to-end security concepts Figure 3 – Active security monitoring architecture with NSM data objects |
29 | 5.7.2 Role of NSM in end-to-end security |
30 | Figure 4 – Comparison of NSM data objects with IEC 61850 objects Figure 5 – Management of both the power system infrastructure and the information infrastructure |
31 | 5.8 NSM requirements: detection functions 5.8.1 Detecting unauthorized access 5.8.2 Detecting resource exhaustion as a denial of service (DoS) attack |
32 | 5.8.3 Detecting invalid buffer access DoS attacks 5.8.4 Detecting tampered/malformed PDUs 5.8.5 Detecting physical access disruption 5.8.6 Detecting invalid network access |
33 | 5.8.7 Detecting coordinated attacks 5.9 Abstract object and agent UML descriptions 5.9.1 Purpose of UML |
34 | 5.9.2 Abstract types and base types Figure 6 – Abstract types |
35 | 5.9.3 Enumerated Types 5.9.4 Abstract agents Figure 7 – Enumerated types |
36 | Figure 8 – Subagents |
37 | Figure 9 – Environmental agent Figure 10 – Model stereotypes |
38 | 5.9.5 Unsolicited Event Notification 5.9.6 UML Model extension 5.10 Abstract Object UML translation to SNMP 5.10.1 Simple Network Management Protocol (SNMP) |
39 | 5.10.2 Management information bases (MIBs) Figure 11 – Object identifier structure |
40 | 5.11 SNMP mapping of UML model Objects |
41 | 5.12 SNMP Security Figure 12 – SNMP table |
42 | Figure 13 – SNMP RFCs map and security |
43 | 6 Abstract objects 6.1 General Figure 14 – SNMP Entity |
44 | 6.2 Package Abstract Types 6.2.1 General 6.2.2 BooleanValue 6.2.3 BooleanValueTs 6.2.4 CounterTs Tables Table 1 – Attributes of Abstract Types::BooleanValue Table 2 – Attributes of Abstract Types::BooleanValueTs |
45 | 6.2.5 CntRs 6.2.6 Floating 6.2.7 FloatingTs Table 3 – Attributes of Abstract Types::CounterTs Table 4 – Attributes of Abstract Types::CntRs Table 5 – Attributes of Abstract Types::Floating |
46 | 6.2.8 EntityIndex 6.2.9 Integer 6.2.10 IntegerTs Table 6 – Attributes of Abstract Types::FloatingTs Table 7 – Attributes of Abstract Types::EntityIndex Table 8 – Attributes of Abstract Types::Integer Table 9 – Attributes of Abstract Types::IntegerTs |
47 | 6.2.11 InetAddress 6.2.12 InetAddressType 6.2.13 MacAddress 6.2.14 Selector Table 10 – Attributes of Abstract Types::InetAddress Table 11 – Attributes of Abstract Types::InetAddressType Table 12 – Attributes of Abstract Types::MacAddress |
48 | 6.2.15 Timestamp 6.2.16 CharString 6.2.17 CharStringTs 6.2.18 AbstractBaseType root class Table 13 – Attributes of Abstract Types::Selector Table 14 – Attributes of Abstract Types::Timestamp Table 15 – Attributes of Abstract Types::CharString Table 16 – Attributes of Abstract Types::CharStringTs |
49 | 6.2.19 AbstractAgent root class 6.3 Package EnumeratedTypes 6.3.1 General 6.3.2 AppDatStKind enumeration 6.3.3 PhyHealthKind enumeration 6.3.4 ExtKind enumeration Table 17 – Literals of EnumeratedTypes::AppDatStKind Table 18 – Literals of EnumeratedTypes::PhyHealthKind |
50 | 6.3.5 IntKind enumeration 6.3.6 LnkKind enumeration 6.3.7 PSPAccKind enumeration 6.3.8 ProtIdKind enumeration Table 19 – Literals of EnumeratedTypes::ExtKind Table 20 – Literals of EnumeratedTypes::IntKind Table 21 – Literals of EnumeratedTypes::LnkKind Table 22 – Literals of EnumeratedTypes::PSPAccKind |
51 | 6.3.9 EventKind enumeration 6.3.10 TimSyncIssueKind enumeration Table 23 – Literals of EnumeratedTypes::ProtIdKind Table 24 – Literals of EnumeratedTypes::EventKind Table 25 – Literals of EnumeratedTypes::TimSyncIssueKind |
52 | 6.3.11 SecurityProfileKind enumeration 6.3.12 TimSyncSrcKind enumeration 6.3.13 AppDatStType Table 26 – Literals of EnumeratedTypes::SecurityProfileKind Table 27 – Literals of EnumeratedTypes::TimSyncSrcKind |
53 | 6.3.14 PhyHealthType 6.3.15 ExtType 6.3.16 IntType 6.3.17 EventType Table 28 – Attributes of EnumeratedTypes::AppDatStType Table 29 – Attributes of EnumeratedTypes::PhyHealthType Table 30 – Attributes of EnumeratedTypes::ExtType Table 31 – Attributes of EnumeratedTypes::IntType |
54 | 6.3.18 PSPAccType 6.3.19 ProtIdType 6.3.20 TimSyncIssueType 6.3.21 SecurityProfileType Table 32 – Attributes of EnumeratedTypes::EventType Table 33 – Attributes of EnumeratedTypes::PSPAccType Table 34 – Attributes of EnumeratedTypes::ProtIdType Table 35 – Attributes of EnumeratedTypes::TimSyncIssueType |
55 | 6.3.22 TimSyncSrcType 6.3.23 LnkType 7 Agents 7.1 Package Overview Table 36 – Attributes of EnumeratedTypes::SecurityProfileType Table 37 – Attributes of EnumeratedTypes::TimSyncSrcType Table 38 – Attributes of EnumeratedTypes::LnkType |
56 | Figure 15 – Class diagram Overview::Part7 Classes Overview |
57 | 7.2 Package Environmental Agent 7.2.1 General Figure 16 – Class diagram Environmental Agent::Environmental |
58 | 7.2.2 Environmental 7.2.3 PSUPEntry Table 39 – Attributes of Environmental Agent::Environmental Table 40 – Attributes of Environmental Agent::PSUPEntry |
59 | 7.2.4 Notification 7.2.5 SecurityNotification Table 41 – Attributes of Environmental Agent::Notification Table 42 – Attributes of Environmental Agent::SecurityNotification |
60 | 7.3 Package IED Agent 7.3.1 General Figure 17 – Class diagram IED Agent::IED |
61 | 7.3.2 IED Table 43 – Attributes of IED Agent::IED |
62 | 7.3.3 CPUEntry Table 44 – Attributes of IED Agent::CPUEntry |
63 | 7.3.4 EXTEntry 7.3.5 STOREEntry Table 45 – Attributes of IED Agent::EXTEntry Table 46 – Attributes of IED Agent::STOREEntry |
64 | 7.3.6 Notification 7.3.7 SecurityNotification 7.4 Package Application Protocols Agents 7.4.1 General Table 47 – Attributes of IED Agent::Notification Table 48 – Attributes of IED Agent::SecurityNotification |
65 | 7.4.2 Package Common objects Figure 18 – Class diagram Common objects::Application Protocol common objects Table 49 – Attributes of Common objects::CommonProtocolInfo |
66 | 7.4.3 Package IEEE 1815 and IEC 60870-5 Agent |
67 | Figure 19 – Class diagram IEEE 1815 and IEC 60870-5 Agent::IEEE 1815 and IEC 60870 Agent Relationships |
68 | Table 50 – Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPProtocolInfo |
69 | Table 51 – Attributes of IEEE 1815 and IEC 60870-5 Agent::Association |
71 | Table 52 – Attributes of IEEE 1815 and IEC 60870-5 Agent::Summary |
72 | Table 53 – Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPSecurityNotification Table 54 – Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPNotification |
73 | Table 55 – Attributes of IEEE 1815 and IEC 60870-5 Agent::MasterAssociation |
74 | Table 56 – Attributes of IEEE 1815 and IEC 60870-5 Agent::OutstationAssociation |
75 | 7.4.4 Package IEC61850 Agent |
76 | Figure 20 – Class diagram ACSI::ACSI |
77 | Table 57 – Attributes of ACSI::ACSISummary |
78 | Figure 21 – Class diagram MMS::MMS |
79 | Table 58 – Attributes of MMS::MMSProtocolInfo |
80 | Table 59 – Attributes of MMS::MMSProvider |
81 | Table 60 – Attributes of MMS::MMSAssociation |
82 | Table 61 – Attributes of MMS::MMSSecurityNotification Table 62 – Attributes of MMS::MMSNotification |
83 | Figure 22 – Class diagram SV and GSE common objects::SV and GSE common objects Table 63 – Attributes of SV and GSE common objects::GSEandSVCommon |
84 | Table 64 – Attributes of SV and GSE common objects::GSEandSVPublisherAssociation Table 65 – Attributes of SV and GSE common objects::GSEandSVSubscriberAssociation |
85 | Figure 23 – Class diagram SV::SV |
86 | Table 66 – Attributes of SV::SVProvider Table 67 – Attributes of SV::SVPublisherAssociationIP |
87 | Table 68 – Attributes of SV::SVPublisherAssociationL2 Table 69 – Attributes of SV::SVSubcriberAssociationIP |
88 | Table 70 – Attributes of SV::SVSubcriberAssociationL2 Table 71 – Attributes of SV::SVNotification |
89 | Figure 24 – Class diagram GSE::GSE |
90 | Table 72 – Attributes of GSE::GSESubscriberAssociation Table 73 – Attributes of GSE::GSEProvider |
91 | Table 74 – Attributes of GSE::GSEPublisherAssociationIP Table 75 – Attributes of GSE::GSEPublisherAssociationL2 |
92 | Table 76 – Attributes of GSE::GSESubcriberAssociationIP Table 77 – Attributes of GSE::GSESubscriberAssociationL2 |
93 | Table 78 – Attributes of GSE::GSENotification |
94 | 7.5 Package Interfaces Agent 7.5.1 General Figure 25 – Class diagram Interfaces Agent::Interfaces |
95 | 7.5.2 Interface 7.5.3 Interfaces Table 79 – Attributes of Interfaces Agent::Interface |
96 | Table 80 – Attributes of Interfaces Agent::Interfaces |
97 | 7.5.4 ETHEntry 7.5.5 KEYEntry Table 81 – Attributes of Interfaces Agent::ETHEntry Table 82 – Attributes of Interfaces Agent::KEYEntry |
98 | 7.5.6 SEREntry 7.5.7 ALGEntry Table 83 – Attributes of Interfaces Agent::SEREntry Table 84 – Attributes of Interfaces Agent::ALGEntry |
99 | 7.5.8 USBEntry 7.5.9 Notification Table 85 – Attributes of Interfaces Agent::USBEntry Table 86 – Attributes of Interfaces Agent::Notification |
100 | 7.6 Package Clocks Agent 7.6.1 General 7.6.2 Clock Figure 26 – Class diagram Clocks Agent::Clocks Agent Table 87 – Attributes of Clocks Agent::Clock |
101 | 7.6.3 ClockEntry Table 88 – Attributes of Clocks Agent::ClockEntry |
102 | 7.6.4 SecurityNotification 7.7 Network and Transport Agents 7.7.1 TCP 7.7.2 User Datagram Protocol (UDP) 7.7.3 IP Table 89 – Attributes of Clocks Agent::SecurityNotification |
103 | 8 SNMP security 9 Secured time synchronization |
104 | Annex A (normative) SNMP MIB Mapping |
236 | Annex B (informative) Mapping of relevant IEC 61850 Objects Table B.1 – IEC 61850-7-4 objects mapping |
237 | Bibliography |