Shopping Cart

No products in the cart.

IEEE 1547.3-2023

$91.00

IEEE Guide for Cybersecurity of Distributed Energy Resources Interconnected with Electric Power Systems (Published)

Published By Publication Date Number of Pages
IEEE 2023 183
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

Revision Standard – Active. Guidelines for cybersecurity of distributed energy resources (DER) interconnection with electric power systems (EPS) are provided in this guide.

PDF Catalog

PDF Pages PDF Title
1 1547.3™-2023 Front cover
4 Important Notices and Disclaimers Concerning IEEE Standards Documents
8 Participants
10 Introduction
11 Contents
13 1. Overview
1.1 Scope
1.2 Purpose
1.3 Need for cybersecurity guidelines for DER
14 1.4 Word usage
2. Normative references
15 3. Definitions, acronyms, and abbreviations
3.1 Definitions
17 3.2 Acronyms and abbreviations
19 4. Cybersecurity considerations for DER interconnected to the electric power system
4.1 Overview
4.2 Need for DER cybersecurity guidance
24 4.3 Basics of cybersecurity for “cyber-physical” power systems
30 4.4 Cybersecurity for the DER domain
43 4.5 Elements of NIST Cybersecurity Framework for DER
46 5. Technical cybersecurity recommendations for DER operations
5.1 Overview of the structure of this clause
47 5.2 Risk assessment (RA) and management recommendations
50 5.3 Communication network engineering (NE) recommendations
55 5.4 Access control (AC) recommendations
58 5.5 Data security (DS) recommendations
62 5.6 Security management (SM) recommendations
68 5.7 Coping with and recovering from security events recommendations
71 6. Testing and commissioning for cybersecurity and conformance with IEEE Std 1547.3 recommendations
6.1 General
6.2 Audience description
73 6.3 DER lifecycle testing recommendations
78 Annex A (informative)Bibliography
82 Annex B (informative)Overview of DER communications protocols in IEEE Std 1547
B.1 Overview comparison of key DER communication protocols
83 B.2 IEEE Std 1815 (DNP3)
84 B.3 IEC 61850
B.4 IEEE Std 2030.5
86 B.5 SunSpec Modbus
87 B.6 MESA-DER and MESA-device specifications
90 Annex C (informative)Overview of other DER-related standards
C.1 IEC 60870-5-101 and IEC 60870-5-104
C.2 Open Platform Communications United Architecture
91 C.3 IEC 61968-5
92 C.4 OpenADR 2.0
C.5 Open Filed Message Bus (FMB)
93 C.6 ASHRAE 201
C.7 ASHRAE 135
94 C.8 IEEE Std 2030.2™
C.9 LonTalk STACK
95 Annex D (informative)Brief descriptions of key cybersecurity standards
D.1 ISO/IEC 27000 cybersecurity standards
96 D.2 NIST Cybersecurity Framework
D.3 ISO 31000 and ISO 22301
97 D.4 NISTIR 7628
98 D.5 IEC 62443 series for industrial automation
99 D.6 IEC 62351 cybersecurity standards and guidelines for the smart grid
102 D.7 IEC 60870-5-7 Cybersecurity for IEC 60870-5-101/104 applying IEC 62351-5
D.8 IEEE Std 1815 (DNP3) Cybersecurity—Secure Authentication Version 5 and Version 6
103 D.9 NERC critical infrastructure protection (CIP)
104 D.10 Internet cybersecurity standards
108 D.11 IEEE Std 1686
D.12 IEEE Std C37.240™
109 D.13 SAE J2931/7 cybersecurity for electric vehicles
110 Annex E (informative)Guideline recommendations based on NIST Cybersecurity Framework
E.1 Scope of guidelines
E.2 Overview of NIST Cybersecurity Framework
113 E.3 Identify (ID)
126 E.4 Protect (PR)
145 E.5 Detect (DE)
155 E.6 Respond (RS)
164 E.7 Recover (RC)
167 Annex F (informative)DER stakeholder roles and responsibilities recommendations
F.1 General
168 F.2 DER manufacturer (StkM) recommendations: DER system design for security and resilience
171 F.3 DER integrator and installer (StkI) recommendations: DER setup for meeting resilience requirements
172 F.4 DER testing (StkT) recommendations: Resilient DER system interconnection testing
173 F.5 DER users (facility/utility/aggregator operators) (StkU) recommendations: access requirements
174 F.6 DER facility ICT configuration (StkC) developer recommendations: Requirements for DER facilities
176 F.7 DER security managers (StkS) recommendations: Alarming, logging, and reporting cybersecurity requirements
F.8 DER maintenance personnel (StkE) recommendations: Requirements for DER maintenance, updating and re-testing
177 F.9 DER operator coping action (StkP) recommendations: actions during an attack or failure
179 F.10 DER recovery and analysis action (StkR) recommendations: After an attack or failure
180 Annex G (informative)Cloud computing
G.1 Managed hosting of upstream applications
G.2 Managed hosting of large-scale upstream applications
181 Annex H (informative)Questionnaire for implementors
H.1 What are the functional requirements, configuration, and data flows of your system? (ID.AM, ID.BE, ID.GV)
H.2 What are the security requirements for the system? (ID.RA, ID.RM, ID.SC)
182 H.3 How do you handle communication security? (PR.AC, PR.DS, PR.IP)
H.4 How do you manage your system?
183 Back cover
IEEE 1547.3-2023
$91.00