BSI PD IEC/TR 62351-10:2012
$198.66
Power systems management and associated information exchange. Data and communications security – Security architecture guidelines
Published By | Publication Date | Number of Pages |
BSI | 2012 | 54 |
This part of IEC 62351, which is a Technical Report, targets the description of security architecture guidelines for power systems based on essential security controls, i.e. on security-related components and functions and their interaction. Furthermore, the relation and mapping of these security controls to the general system architecture of power systems is provided as a guideline to support system integrators to securely deploy power generation, transmission, and distribution systems applying available standards.
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | CONTENTS |
6 | FOREWORD |
8 | INTRODUCTION |
9 | 1 Scope 2 Normative references 3 Terms, definitions and abbreviations 3.1 Terms and definitions 3.2 Abbreviations |
10 | 4 Power systems – specifics and related standardization 4.1 Overview |
11 | 4.2 Security specifics Figure 1 – Power systems – Management of two infrastructures (see Figure 11 of [40]) |
12 | Figure 2 – Comparison office / power system security requirements |
13 | 4.3 Relevant regulation and standardization activities Table 1 – IEC 62351 parts |
17 | 4.4 Reference architecture for TC 57 Figure 3 – Graphical representation of scope and completeness of selected standards (enhanced version of Figure 1 in 4.1 of [4]) |
18 | Figure 4 – TC 57 reference architecture (see [29]) |
19 | Figure 5 – Application of TC 57 standards to a power system (see [29], enhanced according to IEC/TR 61850-1) |
20 | 5 Security architecture in power systems 5.1 General |
21 | 5.2 Security domains and their mapping to power system domains Table 2 – Security domains (see also [35]) |
22 | Figure 6 – Mapping of information security domains to power system domains |
23 | 5.3 System interface categories and their mapping to power systems |
24 | Table 3 – Mapping of logical interface categories to TC 57 reference architecture |
25 | Figure 7 – Mapping of IEC TC 57 communication standards to IEC 62351 parts |
27 | Figure 8 – Mapping of IEC 62351 protocol related parts to the IEC 61850 stack |
28 | 5.4 Security controls 5.4.1 General |
29 | Figure 9 – Security controls overview |
30 | 5.4.2 Domain mapping of security controls Table 4 – Security controls applicable to the different security domains |
32 | 5.4.3 Determination of necessary security controls Figure 10 – Generic system security assessment approach covering design and implementation |
33 | 5.4.4 Network-based security controls Figure 11 – Secure design, development, and operation process |
35 | Table 5 – General security standards applicable to network security |
36 | 6 Mapping security controls to the TC 57 architecture 6.1 General 6.2 Security domains within a generic power system architecture |
37 | 6.3 Application of security controls to a generic power system architecture Figure 12 – Generic power systems architecture |
38 | Figure 13 – Power systems architecture with security controls |
40 | 6.4 Application of security controls to specific power system scenarios 6.4.1 General Table 6 – Example security approaches to power system communication protocols |
41 | 6.4.2 Substation automation Figure 14 – Example substation automation deployment with security controls |
43 | 6.4.3 Control center – substation communication Figure 15 – Example control center substation communication with security controls |
44 | 6.4.4 Advanced metering |
45 | Figure 16 – Example advanced metering infrastructure deployment with security controls |
46 | 6.5 Identified gaps |
47 | Annex A (informative) Further related material Table A.1 – NERC CIP overview |
48 | Table A.2 – The SABSA matrix for security architecture development |
49 | Bibliography |