{"id":423419,"date":"2024-10-20T06:46:23","date_gmt":"2024-10-20T06:46:23","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-tr-61850-90-162021-2\/"},"modified":"2024-10-26T12:42:33","modified_gmt":"2024-10-26T12:42:33","slug":"bsi-pd-iec-tr-61850-90-162021-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-tr-61850-90-162021-2\/","title":{"rendered":"BSI PD IEC TR 61850-90-16:2021"},"content":{"rendered":"
This part of IEC 61850, which is a technical report, specifies the mechanisms for the system management of Smart Grid Devices as IEC 61850 equipment in power utility automation as well as telecommunication and cybersecurity equipment.<\/p>\n
System Management of Smart Grid Devices or Smart Grid Device Management refers to functionalities that are not directly linked to the operational role of the equipment (which for grid automation equipment would be to protect and allow remote supervision and control on the grid) but allow it to perform its operational functions in the best conditions possible.<\/p>\n
The main functions of Smart Grid Device Management can be categorized as illustrated in Figure 1 and described below. These actions being available from remote information systems, they affect system automation functions, telecommunication functions and cybersecurity functions as these three categories are interacting in a Smart grid Device or system.<\/p>\n
The Smart Grid domain has been chosen for these use cases, including distributed energy resources. This content is expected to be applicable to other domains, such as industrial automation domain and grid user domain.<\/p>\n
IEC TR 62351-10, Power systems management and associated information exchange – Data and communications security – Part 10: Security architecture guidelines.<\/i> The main five functions for System Management are listed below:<\/p>\n IEC TR 62351-90-1, Power systems management and associated information exchange – Data and communications security – Part 90-1: Guidelines for handling role-based access control in power systems<\/i><\/p>\n<\/li>\n Managing the software (administration): download, update and manage the firmware versions of automation equipment;<\/p>\n<\/li>\n Supervising: active supervision of Smart Grid devices in order to ensure the required quality of service of the system, to diagnose potential problems and if possible to suggest resiliency solutions in case of deficiency;<\/p>\n<\/li>\n Maintaining the system: collect data concerning the operational state of the equipment in order to be able to initiate predictive analysis, perform maintenance actions and reduce failure probabilities;<\/p>\n<\/li>\n Managing one\u2019s assets: collect and transfer patrimonial data to the information systems in charge of asset management and maintenance.<\/p>\n<\/li>\n<\/ol>\n This part of IEC 61850 specifies these functions through use cases associated state machines, requirements and processes necessary for their implementation.<\/p>\n Since the outcome of that work will affect several parts of IEC 61850, in a first step, this technical report has been prepared, which addresses the topic from an application specific viewpoint across all affected parts of IEC 61850. That approach is similar to what is done for example with IEC 61850-90-1 for the communication between substations. Once the report is approved, the affected parts of the standard can be amended with the results from the report.<\/p>\n The major part of the work consists in designing the use cases with the appropriate requirements.<\/p>\n Smart Grid Devices Management Use Cases will also be used for extracting requirements on cybersecurity:<\/p>\n These steps and requirements will “surround” the Use Case functional steps for the most part, but may require some validation steps within the procedures as well.<\/p>\n<\/li>\n The IEC 62351 series should address those requirements (For example: modifying RBAC parameters in an IED, install RBAC parameters inside the IED).<\/p>\n<\/li>\n Those cybersecurity workflows and requirements will be considered as pre-requisites in Smart Grid Devices Management Use Cases.<\/p>\n<\/li>\n<\/ul>\n Communication networks and systems in power utility automations – Requirements of system management for Smart Energy Automation<\/b><\/p>\n\n
\n
PDF Catalog<\/h4>\n
\n
\n PDF Pages<\/th>\n PDF Title<\/th>\n<\/tr>\n \n 2<\/td>\n undefined <\/td>\n<\/tr>\n \n 4<\/td>\n CONTENTS <\/td>\n<\/tr>\n \n 6<\/td>\n FOREWORD <\/td>\n<\/tr>\n \n 8<\/td>\n INTRODUCTION <\/td>\n<\/tr>\n \n 9<\/td>\n 1 Scope
Figures
Figure 1 \u2013 Scope of the functions and objects covered bythe Smart Grid Device Management <\/td>\n<\/tr>\n\n 10<\/td>\n 2 Normative references <\/td>\n<\/tr>\n \n 11<\/td>\n 3 Terms and definitions <\/td>\n<\/tr>\n \n 12<\/td>\n 4 Smart Grid System life cycle
4.1 Overview
Tables
Table 1 \u2013 Differences between Business and System Use Cases <\/td>\n<\/tr>\n\n 13<\/td>\n 4.2 IED life-cycle
4.2.1 Software
4.2.2 Hardware
4.2.3 Main life-cycle stages
Figure 2 \u2013 Smart Grid Systems and system management <\/td>\n<\/tr>\n\n 14<\/td>\n 4.2.4 Cybersecurity lifecycle for system management
Figure 3 \u2013 Different Use Cases through the lifecycle of a smart grid system <\/td>\n<\/tr>\n\n 16<\/td>\n 4.3 System management roles identified
4.3.1 Business roles
Table 2 \u2013 System management business roles <\/td>\n<\/tr>\n\n 17<\/td>\n 4.3.2 System roles
Table 3 \u2013 System management system roles <\/td>\n<\/tr>\n\n 19<\/td>\n 4.4 System management architecture
Figure 4 \u2013 Illustration of system management architecture on SGAM <\/td>\n<\/tr>\n\n 20<\/td>\n Figure 5 \u2013 Interactions between Information System and IEDs
Figure 6 \u2013 General architecture of key roles involved in system management <\/td>\n<\/tr>\n\n 21<\/td>\n 5 System management Business Use Cases
5.1 General
5.2 BUC: Enable Automation System to perform operational functions in best conditions
5.2.1 Description of the use case <\/td>\n<\/tr>\n\n 22<\/td>\n 5.2.2 Diagrams of use case <\/td>\n<\/tr>\n \n 23<\/td>\n 5.2.3 Technical details
6 System management system Use Cases
6.1 General
Figure 7 \u2013 Overview of BUC Enable Automation System to perform operational functions in best conditions <\/td>\n<\/tr>\n\n 24<\/td>\n 6.2 Configuration and administration system Use Cases
6.2.1 System Use Cases identified
6.2.2 SUC: Deploy a Power System Function
Table 4 \u2013 Identified configuration and administration system Use Cases <\/td>\n<\/tr>\n\n 29<\/td>\n Figure 8 \u2013 Scenario diagram of SUC Deploy a Power System function <\/td>\n<\/tr>\n \n 33<\/td>\n Figure 9 \u2013 Deploy firmware state machine
Table 5 \u2013 Deploy firmware state machine transitions <\/td>\n<\/tr>\n\n 35<\/td>\n Figure 10 \u2013 Update and activate power system configuration state machine
Table 6 \u2013 Update and activate power system configuration state machine transitions <\/td>\n<\/tr>\n\n 37<\/td>\n 6.2.3 SUC: Synchronize multiple automation-system-devices updates <\/td>\n<\/tr>\n \n 40<\/td>\n Figure 11 \u2013 Overview of SUC: Synchronize multiple automation-system-devices updates <\/td>\n<\/tr>\n \n 41<\/td>\n Figure 12 \u2013 Overview of SUC: scenario flow chart of “Synchronizing multiple IED updates” <\/td>\n<\/tr>\n \n 42<\/td>\n 6.3 Asset management, supervision and maintenance system Use Cases
6.3.1 System Use Cases identified <\/td>\n<\/tr>\n\n 43<\/td>\n 6.3.2 SUC: Replace an IED of an automation-system with an identical one
Table 7 \u2013 Identified asset management, supervision and maintenance System Use Cases <\/td>\n<\/tr>\n\n 45<\/td>\n Figure 13 \u2013 Overview of SUC: Replace an IED of an automation-system with an identical one <\/td>\n<\/tr>\n \n 46<\/td>\n Figure 14 \u2013 Scenario diagram of SUC: Replace an IED of an automation-system with an identical one <\/td>\n<\/tr>\n \n 48<\/td>\n 6.3.3 SUC: Store and provide electrical network asset information during its lifecycle <\/td>\n<\/tr>\n \n 50<\/td>\n Figure 15 \u2013 Overview of SUC: Store and provide electrical network asset information during its lifecycle <\/td>\n<\/tr>\n \n 51<\/td>\n Figure 16 \u2013 Scenario diagram of SUC: Store and provide electrical network asset information during its lifecycle
Figure 17 \u2013 Asset information business objects <\/td>\n<\/tr>\n\n 52<\/td>\n 6.4 Cybersecurity system Use Cases for system management
6.4.1 System Use Cases identified <\/td>\n<\/tr>\n\n 53<\/td>\n Table 8 \u2013 List of cyber security Use Cases <\/td>\n<\/tr>\n \n 61<\/td>\n 6.4.2 Cybersecurity SUC diagrams descriptions
Figure 18 \u2013 Key cybersecurity roles <\/td>\n<\/tr>\n\n 62<\/td>\n Figure 19 \u2013 Manufacturer manufacturers a new IED use case actors <\/td>\n<\/tr>\n \n 63<\/td>\n Figure 20 \u2013 Manufacturer manufacturers a new IED activity diagram <\/td>\n<\/tr>\n \n 64<\/td>\n Figure 21 \u2013 New owner purchases new IED use case actors <\/td>\n<\/tr>\n \n 65<\/td>\n Figure 22 \u2013 New owner purchases new IED activity diagram <\/td>\n<\/tr>\n \n 67<\/td>\n Annex A (informative)Short description of complementary Use Cases <\/td>\n<\/tr>\n \n 68<\/td>\n Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" \n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n BSI<\/b><\/a><\/td>\n 2021<\/td>\n 70<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":423422,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-423419","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/423419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/423422"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=423419"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=423419"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=423419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}