{"id":255083,"date":"2024-10-19T16:51:35","date_gmt":"2024-10-19T16:51:35","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-tr-62351-102012\/"},"modified":"2024-10-25T12:17:59","modified_gmt":"2024-10-25T12:17:59","slug":"bsi-pd-iec-tr-62351-102012","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-tr-62351-102012\/","title":{"rendered":"BSI PD IEC\/TR 62351-10:2012"},"content":{"rendered":"
This part of IEC 62351, which is a Technical Report, targets the description of security architecture guidelines for power systems based on essential security controls, i.e. on security-related components and functions and their interaction. Furthermore, the relation and mapping of these security controls to the general system architecture of power systems is provided as a guideline to support system integrators to securely deploy power generation, transmission, and distribution systems applying available standards.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
4<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions and abbreviations 3.1 Terms and definitions 3.2 Abbreviations <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Power systems \u2013 specifics and related standardization 4.1 Overview <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2 Security specifics Figure 1 \u2013 Power systems \u2013 Management of two infrastructures (see Figure\u00a011 of [40]) <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Figure 2 \u2013 Comparison office \/ power system security requirements <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.3 Relevant regulation and standardization activities Table 1 \u2013 IEC\u00a062351 parts <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4.4 Reference architecture for TC 57 Figure 3 \u2013 Graphical representation of scope and completeness of selected standards (enhanced version of Figure 1 in 4.1 of [4]) <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Figure 4 \u2013 TC 57 reference architecture (see [29]) <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Figure 5 \u2013 Application of TC 57 standards to a power system (see [29], enhanced according to IEC\/TR\u00a061850-1) <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5 Security architecture in power systems 5.1 General <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.2 Security domains and their mapping to power system domains Table 2 \u2013 Security domains (see also [35]) <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Figure 6 \u2013 Mapping of information security domains to power system domains <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.3 System interface categories and their mapping to power systems <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Table 3 \u2013 Mapping of logical interface categories to TC 57 reference architecture <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Figure 7 \u2013 Mapping of IEC TC 57 communication standards to IEC\u00a062351 parts <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Figure 8 \u2013 Mapping of IEC\u00a062351 protocol related parts to the IEC\u00a061850 stack <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.4 Security controls 5.4.1 General <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Figure 9 \u2013 Security controls overview <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.4.2 Domain mapping of security controls Table 4 \u2013 Security controls applicable to the different security domains <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.4.3 Determination of necessary security controls Figure 10 \u2013 Generic system security assessment approach covering design and implementation <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 5.4.4 Network-based security controls Figure 11 \u2013 Secure design, development, and operation process <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Table 5 \u2013 General security standards applicable to network security <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 6 Mapping security controls to the TC\u00a057 architecture 6.1 General 6.2 Security domains within a generic power system architecture <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 6.3 Application of security controls to a generic power system architecture Figure 12 \u2013 Generic power systems architecture <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Figure 13 \u2013 Power systems architecture with security controls <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 6.4 Application of security controls to specific power system scenarios 6.4.1 General Table 6 \u2013 Example security approaches to power system communication protocols <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 6.4.2 Substation automation Figure 14 \u2013 Example substation automation deployment with security controls <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 6.4.3 Control center \u2013 substation communication Figure 15 \u2013 Example control center substation communication with security controls <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 6.4.4 Advanced metering <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Figure 16 \u2013 Example advanced metering infrastructure deployment with security controls <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 6.5 Identified gaps <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Annex A (informative) Further related material Table A.1 \u2013 NERC CIP overview <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Table A.2 \u2013 The SABSA matrix for security architecture development <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Power systems management and associated information exchange. Data and communications security – Security architecture guidelines<\/b><\/p>\n |