BSI 24/30484649 DC 2024
$24.66
BS EN IEC 63208 Switchgear and controlgear and their assemblies for low voltage – Security aspects
Published By | Publication Date | Number of Pages |
BSI | 2024 | 116 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | 30484649-NC.pdf |
3 | 121_156e_CD.pdf |
12 | FOREWORD |
14 | INTRODUCTION |
16 | 1 Scope |
17 | 2 Normative references 3 Terms, definitions and abbreviated terms 3.1 Terms and definitions |
22 | 3.2 Abbreviated terms |
23 | 4 General 5 Security objectives 6 Security lifecycle management 6.1 General |
25 | 6.2 Security risk assessment 6.2.1 General |
26 | 6.2.2 Relationship between safety and security |
27 | 6.2.3 Impact assessment 6.2.4 Security risk assessment result 6.3 Response to security risk |
28 | 6.4 Security requirement specification 6.5 Roles and responsibilities 6.6 Important data |
29 | 6.7 Control system architecture 6.7.1 Control system 6.7.2 Levels of communication functionalities |
31 | 6.7.3 Levels of connectivity |
33 | 6.7.4 Exposure levels of equipment 6.7.5 Equipment security levels |
34 | 6.7.6 Security protection profile 7 Security requirements 7.1 General 7.2 Physical access and environment 7.2.1 PA – Physical access and environment requirement |
35 | 7.2.2 Physical access and environment rational 7.2.3 PA-e – Physical access and environment enhancement |
36 | 7.2.4 Physical access and environment typical implementation |
37 | 7.3 Equipment requirement 7.3.1 General 7.3.1.1 Safety related functions 7.3.1.2 Compensating countermeasure 7.3.1.3 Security requirements for the equipment |
38 | 7.3.2 FR 1 – Identification and authentication control 7.3.2.1 Purpose 7.3.2.2 Rationale 7.3.2.3 CR 1.1 – Human user identification and authentication 7.3.2.3.1 Applicability 7.3.2.3.2 Requirement 7.3.2.3.3 Requirement rational |
39 | 7.3.2.3.4 Requirement enhancement 7.3.2.4 CR 1.2 – Software and equipment identification and authentication 7.3.2.4.1 Applicability 7.3.2.4.2 Requirement 7.3.2.4.3 Requirement rational 7.3.2.4.4 Requirement enhancement 7.3.2.5 CR 1.5 – Authenticator management 7.3.2.5.1 Applicability 7.3.2.5.2 Requirement 7.3.2.5.3 Requirement rational 7.3.2.6 CR 1.7 – Strength of password-based authentication 7.3.2.6.1 Applicability 7.3.2.6.2 Requirement 7.3.2.6.3 Requirement rational |
40 | 7.3.2.7 CR 1.8 – Public key infrastructure certificates 7.3.2.7.1 Applicability 7.3.2.7.2 Requirement 7.3.2.7.3 Requirement rational 7.3.2.8 CR 1.9 – Strength of public key-based authentication 7.3.2.8.1 Applicability 7.3.2.8.2 Requirement 7.3.2.8.3 Requirement rational 7.3.2.9 CR 1.10 – Authenticator feedback 7.3.2.9.1 Applicability 7.3.2.9.2 Requirement 7.3.2.9.3 Requirement rational 7.3.2.10 CR 1.11 – Unsuccessful login attempts 7.3.2.10.1 Applicability 7.3.2.10.2 Requirement |
41 | 7.3.2.10.3 Requirement rational 7.3.2.11 CR 1.14 – Strength of symmetric key-based authentication 7.3.2.11.1 Applicability 7.3.2.11.2 Requirement 7.3.2.11.3 Requirement rational 7.3.3 FR 2 – Use control 7.3.3.1 Purpose 7.3.3.2 Rationale 7.3.3.3 CR 2.1 – Authorization enforcement 7.3.3.3.1 Applicability 7.3.3.3.2 Requirement 7.3.3.3.3 Requirement rational 7.3.3.3.4 Requirement enhancement 7.3.3.4 CR 2.2 – Wireless use control 7.3.3.4.1 Applicability |
42 | 7.3.3.4.2 Requirement 7.3.3.4.3 Requirement rational 7.3.3.5 EDR 2.4 – Mobile code 7.3.3.5.1 Applicability 7.3.3.5.2 Requirement 7.3.3.5.3 Requirement rational 7.3.3.5.4 Requirement enhancement 7.3.3.6 SAR 2.4 – Mobile code 7.3.3.6.1 Applicability 7.3.3.6.2 Requirement 7.3.3.6.3 Requirement rational 7.3.3.6.4 Requirement enhancement |
43 | 7.3.3.7 CR 2.5 – Session lock 7.3.3.7.1 Applicability 7.3.3.7.2 Requirement 7.3.3.7.3 Requirement rational 7.3.3.8 CR 2.6 – Remote session termination 7.3.3.8.1 Applicability 7.3.3.8.2 Requirement 7.3.3.8.3 Requirement rational 7.3.3.9 CR 2.7 – Concurrent session control 7.3.3.9.1 Applicability 7.3.3.9.2 Requirement 7.3.3.9.3 Requirement rational 7.3.3.10 CR 2.8 – Auditable events 7.3.3.10.1 Applicability |
44 | 7.3.3.10.2 Requirement 7.3.3.10.3 Requirement rational 7.3.3.11 CR 2.9 – Audit storage capacity 7.3.3.11.1 Applicability 7.3.3.11.2 Requirement 7.3.3.11.3 Requirement rational 7.3.3.12 CR 2.10 – Response to audit processing failures 7.3.3.12.1 Applicability 7.3.3.12.2 Requirement 7.3.3.12.3 Requirement rational 7.3.3.13 CR 2.11 Timestamp 7.3.3.13.1 Applicability 7.3.3.13.2 Requirement |
45 | 7.3.3.13.3 Requirement rational 7.3.3.13.4 Requirement enhancement 7.3.3.14 CR 2.12 – Non-repudiation 7.3.3.14.1 Applicability 7.3.3.14.2 Requirement 7.3.3.14.3 Requirement rational 7.3.3.15 EDR 2.13 – Use of physical diagnostic and test interfaces 7.3.3.15.1 Applicability 7.3.3.15.2 Requirement 7.3.3.15.3 Requirement rational 7.3.4 FR 3 – System integrity 7.3.4.1 Purpose 7.3.4.2 Rationale 7.3.4.3 CR 3.1 – Communication integrity 7.3.4.3.1 Applicability |
46 | 7.3.4.3.2 Requirement 7.3.4.3.3 Requirement rational 7.3.4.3.4 Requirement enhancement 7.3.4.4 EDR 3.2 – Protection from malicious code 7.3.4.4.1 Applicability 7.3.4.4.2 Requirement 7.3.4.4.3 Requirement rational 7.3.4.4.4 Additional requirement 7.3.4.4.5 Additional requirement rational |
47 | 7.3.4.5 SAR 3.2 – Protection from malicious code 7.3.4.5.1 Applicability 7.3.4.5.2 Requirement 7.3.4.5.3 Requirement rational 7.3.4.6 CR 3.3 – Security functionality verification 7.3.4.6.1 Applicability 7.3.4.6.2 Requirement 7.3.4.6.3 Requirement rational 7.3.4.6.4 Requirement enhancement 7.3.4.7 CR 3.4 – Software and information integrity 7.3.4.7.1 Applicability 7.3.4.7.2 Requirement 7.3.4.7.3 Requirement rational |
48 | 7.3.4.7.4 Requirement enhancement 7.3.4.7.5 Additional requirement 7.3.4.7.6 Additional requirement rational 7.3.4.8 CR 3.5 – Input validation 7.3.4.8.1 Applicability 7.3.4.8.2 Requirement 7.3.4.8.3 Requirement rational 7.3.4.9 CR 3.6 – Deterministic output 7.3.4.9.1 Applicability 7.3.4.9.2 Requirement |
49 | 7.3.4.9.3 Requirement rational 7.3.4.10 CR 3.7 – Error handling 7.3.4.10.1 Applicability 7.3.4.10.2 Requirement 7.3.4.10.3 Requirement rational 7.3.4.11 CR 3.8 – Session Integrity 7.3.4.11.1 Applicability 7.3.4.11.2 Requirement 7.3.4.11.3 Requirement rational 7.3.4.12 CR 3.9 – Protection of audit information 7.3.4.12.1 Applicability 7.3.4.12.2 Requirement 7.3.4.12.3 Requirement rational 7.3.4.13 EDR 3.10 – Support for Updates 7.3.4.13.1 Applicability |
50 | 7.3.4.13.2 Requirement 7.3.4.13.3 Requirement rational 7.3.4.13.4 Requirement enhancement 7.3.4.14 EDR 3.11 – Physical tamper resistance and detection 7.3.4.14.1 Applicability 7.3.4.14.2 Requirement 7.3.4.14.3 Requirement rational 7.3.4.15 EDR 3.12 – Provisioning product supplier roots of trust 7.3.4.15.1 Applicability 7.3.4.15.2 Requirement 7.3.4.15.3 Requirement rational 7.3.4.16 EDR 3.13 – Provisioning asset owner roots of trust 7.3.4.16.1 Applicability 7.3.4.16.2 Requirement 7.3.4.16.3 Requirement rational |
51 | 7.3.4.17 EDR 3.14 – Integrity of the boot process 7.3.4.17.1 Applicability 7.3.4.17.2 Requirement 7.3.4.17.3 Requirement rational 7.3.4.17.4 Requirement enhancement 7.3.5 FR 4 – Data confidentiality 7.3.5.1 Purpose 7.3.5.2 Rationale 7.3.5.3 CR 4.3 – Use of cryptography 7.3.5.3.1 Applicability 7.3.5.3.2 Requirement 7.3.5.3.3 Requirement rational 7.3.6 FR 5 – Restricted data flow |
52 | 7.3.7 FR 6 – Timely response to events 7.3.7.1 Purpose 7.3.7.2 Rationale 7.3.7.3 CR 6.1 – Audit log accessibility 7.3.7.3.1 Applicability 7.3.7.3.2 Requirement 7.3.7.3.3 Requirement rational 7.3.8 FR 7 – Resource availability 7.3.8.1 Purpose 7.3.8.2 Rationale 7.3.8.3 CR 7.1 – Denial of service protection |
53 | 7.3.8.3.1 Applicability 7.3.8.3.2 Requirement 7.3.8.3.3 Requirement rational 7.3.8.3.4 Additional requirement 7.3.8.4 CR 7.2 – Resource management 7.3.8.4.1 Applicability 7.3.8.4.2 Requirement 7.3.8.4.3 Requirement rational 7.3.8.5 CR 7.3 – Control system backup 7.3.8.5.1 Applicability 7.3.8.5.2 Requirement |
54 | 7.3.8.5.3 Requirement rational 7.3.8.5.4 Requirement enhancement 7.3.8.6 CR 7.4 – Control system recovery and reconstitution 7.3.8.6.1 Applicability 7.3.8.6.2 Requirement 7.3.8.6.3 Requirement rational 7.3.8.7 CR 7.6 – Network and security configuration settings 7.3.8.7.1 Applicability 7.3.8.7.2 Requirement 7.3.8.7.3 Requirement rational 7.3.8.8 CR 7.7 – Least functionality 7.3.8.8.1 Applicability 7.3.8.8.2 Requirement 7.3.8.8.3 Requirement rational |
55 | 7.3.8.9 CR 7.8 – Control system inventory 7.3.8.9.1 Applicability 7.3.8.9.2 Requirement 7.3.8.9.3 Requirement rational 8 Instructions for installation, operation and maintenance 8.1 User instruction requirement |
56 | 8.2 User instruction rational 8.3 User instruction enhancement 8.4 User instruction implementation 9 Conformance verification and testing 9.1 General 9.2 Life cycle management 9.3 Physical access 9.3.1 Verification of physical access and environment |
57 | 9.3.2 Physical access and environment enhancement 9.4 FR 1 – Identification and authentication control 9.4.1 CR 1.1 – Human user identification and authentication 9.4.1.1 Requirement verification 9.4.1.2 Requirement enhancement verification 9.4.2 CR 1.2 – Software and equipment identification and authentication 9.4.2.1 Requirement verification |
58 | 9.4.2.2 Requirement enhancement verification 9.4.3 CR 1.5 – Authenticator management 9.4.3.1 Requirement verification 9.4.4 CR 1.7 – Strength of password-based authentication 9.4.4.1 Requirement verification 9.4.5 CR 1.8 – Public key infrastructure certificates 9.4.5.1 Requirement verification |
59 | 9.4.6 CR 1.9 – Strength of public key-based authentication 9.4.6.1 Requirement verification 9.4.7 CR 1.10 – Authenticator feedback 9.4.7.1 Requirement verification 9.4.8 CR 1.11 – Unsuccessful login attempts 9.4.8.1 Requirement verification 9.4.9 CR 1.14 – Strength of symmetric key-based authentication 9.4.9.1 Requirement verification |
60 | 9.5 FR 2 – Use control 9.5.1 CR 2.1 – Authorization enforcement 9.5.1.1 Requirement verification 9.5.1.2 Requirement enhancement verification 9.5.2 CR 2.2 – Wireless use control 9.5.2.1 Requirement verification 9.5.3 EDR 2.4 – Mobile code 9.5.3.1 Requirement verification |
61 | 9.5.3.2 Requirement enhancement verification 9.5.4 SAR 2.4 – Mobile code 9.5.4.1 Requirement verification 9.5.4.2 Requirement enhancement verification 9.5.5 CR 2.5 – Session lock 9.5.5.1 Requirement verification 9.5.6 CR 2.6 – Remote session termination 9.5.6.1 Requirement verification |
62 | 9.5.7 CR 2.7 – Concurrent session control 9.5.7.1 Requirement verification 9.5.8 CR 2.8 – Auditable events 9.5.8.1 Requirement verification 9.5.9 CR 2.9 – Audit storage capacity 9.5.9.1 Requirement verification 9.5.10 CR 2.10 – Response to audit processing failures 9.5.10.1 Requirement verification |
63 | 9.5.11 CR 2.11 – Timestamps 9.5.11.1 Requirement verification 9.5.11.2 Requirement enhancement verification 9.5.12 CR 2.12 – Non-repudiation 9.5.12.1 Requirement verification 9.5.13 EDR 2.13 – Use of physical diagnostic and test interfaces 9.5.13.1 Requirement verification 9.6 FR 3 – System integrity 9.6.1 CR 3.1 – Communication integrity 9.6.1.1 Requirement verification |
64 | 9.6.1.2 Requirement enhancement verification 9.6.2 EDR 3.2 – Protection from malicious code 9.6.2.1 Requirement verification 9.6.3 SAR 3.2 – Protection from malicious code 9.6.3.1 Requirement verification 9.6.4 CR 3.3 – Security functionality verification 9.6.4.1 Requirement verification |
65 | 9.6.4.2 Requirement enhancement verification 9.6.5 CR 3.4 – Software and information integrity 9.6.5.1 Requirement verification 9.6.5.2 Requirement enhancement verification 9.6.6 CR 3.5 – Input validation 9.6.6.1 Requirement verification 9.6.7 CR 3.6 – Deterministic output 9.6.7.1 Requirement verification |
66 | 9.6.8 CR 3.7 – Error handling 9.6.8.1 Requirement verification 9.6.9 CR 3.8 – Session Integrity 9.6.9.1 Requirement verification 9.6.10 CR 3.9 – Protection of audit information 9.6.10.1 Requirement verification 9.6.11 EDR 3.10 – Support for updates 9.6.11.1 Requirement verification |
67 | 9.6.11.2 Requirement enhancement verification 9.6.12 EDR 3.11 – Physical tamper resistance and detection 9.6.12.1 Requirement verification 9.6.13 EDR 3.12 – Provisioning product supplier roots of trust 9.6.13.1 Requirement verification 9.6.14 EDR 3.13 – Provisioning asset owner roots of trust 9.6.14.1 Requirement verification |
68 | 9.6.15 EDR 3.14 – Integrity of the boot process 9.6.15.1 Requirement verification 9.6.15.2 Requirement enhancement verification 9.7 FR 4 – Data confidentiality 9.7.1 CR 4.3 – Use of cryptography 9.7.1.1 Requirement verification 9.8 FR 6 – Timely response to events 9.8.1 CR 6.1 – Audit log accessibility 9.8.1.1 Requirement verification |
69 | 9.8.1.2 Requirement enhancement verification 9.9 FR 7 – Resource availability 9.9.1 CR 7.1 – Denial of service protection 9.9.1.1 Requirement verification 9.9.1.2 Requirement enhancement verification 9.9.2 CR 7.2 – Resource management 9.9.2.1 Requirement verification 9.9.3 CR 7.3 – Control system backup 9.9.3.1 Requirement verification |
70 | 9.9.3.2 Requirement enhancement verification 9.9.4 CR 7.4 – Control system recovery and reconstitution 9.9.4.1 Requirement verification 9.9.5 CR 7.6 – Network and security configuration settings 9.9.5.1 Requirement verification 9.9.6 CR 7.7 – Least functionality 9.9.6.1 Requirement verification 9.9.7 CR 7.8 – Control system inventory 9.9.7.1 Requirement verification |
72 | Annex A (informative) Cybersecurity and electrical system architecture A.1 General A.2 Typical architecture involving switchgear and controlgear and their assembly A.2.1 Building |
73 | A.2.2 Manufacturing |
75 | Annex B (informative) Use case studies B.1 General |
76 | B.2 Use case 1 – Protection against Denial of Service (DoS) attack |
77 | B.3 Use case 2 – Protection against unauthorized modification of sensing device |
78 | B.4 Use case 3 – Protection against unauthorized modification of wireless equipment |
79 | B.5 Use case 4 – Protection against threat actor remotely taking control of a “Managing” intelligent assembly |
81 | Annex C (Informative) Development methods of cybersecurity aspects |
82 | Annex D (informative) Instructions to be provided to the user of the equipment and for integration into an assembly D.1 General D.2 Risk assessment and security planning D.2.1 Risk assessment D.2.2 Security plan |
83 | D.3 Recommendations for design and installation of the system integrating switchgear and controlgear and their assemblies D.3.1 General access control D.3.2 Recommendations for local access |
84 | D.3.3 Recommendations for remote access D.3.4 Recommendations for firmware upgrades |
85 | D.3.5 Recommendations for the end of life D.4 Instructions for an assembly |
86 | Annex E (normative) Security protection profile of soft-starter, motor starter and semiconductor controller E.1 Introduction E.1.1 Protection profile reference E.1.2 Target of evaluation overview E.1.3 General mission objectives |
87 | E.1.4 Features E.1.5 Product usage E.1.6 Users |
88 | E.2 Assumptions E.3 Conformance claims and conformance statement E.4 Security problem definition E.4.1 Critical assets of the environment |
89 | E.4.2 ToE critical assets E.4.3 Threat Model E.4.3.1 Attackers E.4.3.2 Threats |
90 | E.5 Security objectives E.6 Security requirements E.6.1 Security functional requirements E.6.2 Security assurance requirements |
92 | Annex F (normative) Security protection profiles of circuit-breaker F.1 Introduction F.1.1 Protection profile reference F.1.2 Target of evaluation overview F.1.3 General mission objectives |
93 | F.1.4 Features F.1.5 Product usage F.1.6 Users F.2 Assumptions |
94 | F.3 Conformance claims and conformance statement F.4 Security problem definition F.4.1 Critical assets of the environment F.4.2 ToE critical assets |
95 | F.4.3 Threat Model F.4.3.1 Attackers F.4.3.2 Threats |
96 | F.5 Security objectives F.6 Security requirements F.6.1 Security functional requirements F.6.2 Security assurance requirements |
97 | Annex G (normative) Protection profile of transfer switch equipment G.1 Introduction G.1.1 Protection profile reference G.1.2 Target of evaluation overview G.1.2.1 Overview |
98 | G.1.3 General mission objectives G.1.4 Features G.1.5 Product usage G.1.6 Users G.2 Assumptions G.3 Conformance claims and conformance statement |
99 | G.4 Security problem definition G.4.1 Critical assets of the environment G.4.2 ToE critical assets |
100 | G.4.3 Threat Model G.4.3.1 Attackers G.4.3.2 Threats G.5 Security objectives G.6 Security requirements G.6.1 Security functional requirements |
101 | G.6.2 Security assurance requirements |
102 | Annex H (normative) Protection profile for wireless controlgear with its communication interface H.1 Introduction H.1.1 Protection profile reference H.1.2 Target of evaluation overview |
103 | H.1.3 General mission objectives H.1.4 Features H.1.5 Product usage H.1.6 Users H.2 Assumptions |
104 | H.3 Conformance claims and conformance statement H.4 Security problem definition H.4.1 Critical assets of the environment H.4.2 ToE critical assets |
105 | H.4.3 Threat Model H.4.3.1 Attackers H.4.3.2 Threats |
106 | H.5 Security objectives H.6 Security requirements H.6.1 Security functional requirements H.6.2 Security assurance requirements |
107 | Annex I (informative) Equipment requirements by level of exposure |
108 | Annex J (informative) Bridging references to cybersecurity management systems |
114 | Bibliography |