Shopping Cart

No products in the cart.

BSI PD IEC/TR 62351-10:2012

$198.66

Power systems management and associated information exchange. Data and communications security – Security architecture guidelines

Published By Publication Date Number of Pages
BSI 2012 54
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of IEC 62351, which is a Technical Report, targets the description of security architecture guidelines for power systems based on essential security controls, i.e. on security-related components and functions and their interaction. Furthermore, the relation and mapping of these security controls to the general system architecture of power systems is provided as a guideline to support system integrators to securely deploy power generation, transmission, and distribution systems applying available standards.

PDF Catalog

PDF Pages PDF Title
4 CONTENTS
6 FOREWORD
8 INTRODUCTION
9 1 Scope
2 Normative references
3 Terms, definitions and abbreviations
3.1 Terms and definitions
3.2 Abbreviations
10 4 Power systems – specifics and related standardization
4.1 Overview
11 4.2 Security specifics
Figure 1 – Power systems – Management of two infrastructures (see Figure 11 of [40])
12 Figure 2 – Comparison office / power system security requirements
13 4.3 Relevant regulation and standardization activities
Table 1 – IEC 62351 parts
17 4.4 Reference architecture for TC 57
Figure 3 – Graphical representation of scope and completeness of selected standards (enhanced version of Figure 1 in 4.1 of [4])
18 Figure 4 – TC 57 reference architecture (see [29])
19 Figure 5 – Application of TC 57 standards to a power system (see [29], enhanced according to IEC/TR 61850-1)
20 5 Security architecture in power systems
5.1 General
21 5.2 Security domains and their mapping to power system domains
Table 2 – Security domains (see also [35])
22 Figure 6 – Mapping of information security domains to power system domains
23 5.3 System interface categories and their mapping to power systems
24 Table 3 – Mapping of logical interface categories to TC 57 reference architecture
25 Figure 7 – Mapping of IEC TC 57 communication standards to IEC 62351 parts
27 Figure 8 – Mapping of IEC 62351 protocol related parts to the IEC 61850 stack
28 5.4 Security controls
5.4.1 General
29 Figure 9 – Security controls overview
30 5.4.2 Domain mapping of security controls
Table 4 – Security controls applicable to the different security domains
32 5.4.3 Determination of necessary security controls
Figure 10 – Generic system security assessment approach covering design and implementation
33 5.4.4 Network-based security controls
Figure 11 – Secure design, development, and operation process
35 Table 5 – General security standards applicable to network security
36 6 Mapping security controls to the TC 57 architecture
6.1 General
6.2 Security domains within a generic power system architecture
37 6.3 Application of security controls to a generic power system architecture
Figure 12 – Generic power systems architecture
38 Figure 13 – Power systems architecture with security controls
40 6.4 Application of security controls to specific power system scenarios
6.4.1 General
Table 6 – Example security approaches to power system communication protocols
41 6.4.2 Substation automation
Figure 14 – Example substation automation deployment with security controls
43 6.4.3 Control center – substation communication
Figure 15 – Example control center substation communication with security controls
44 6.4.4 Advanced metering
45 Figure 16 – Example advanced metering infrastructure deployment with security controls
46 6.5 Identified gaps
47 Annex A (informative) Further related material
Table A.1 – NERC CIP overview
48 Table A.2 – The SABSA matrix for security architecture development
49 Bibliography
BSI PD IEC/TR 62351-10:2012
$198.66