{"id":255083,"date":"2024-10-19T16:51:35","date_gmt":"2024-10-19T16:51:35","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-tr-62351-102012\/"},"modified":"2024-10-25T12:17:59","modified_gmt":"2024-10-25T12:17:59","slug":"bsi-pd-iec-tr-62351-102012","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-tr-62351-102012\/","title":{"rendered":"BSI PD IEC\/TR 62351-10:2012"},"content":{"rendered":"

This part of IEC 62351, which is a Technical Report, targets the description of security architecture guidelines for power systems based on essential security controls, i.e. on security-related components and functions and their interaction. Furthermore, the relation and mapping of these security controls to the general system architecture of power systems is provided as a guideline to support system integrators to securely deploy power generation, transmission, and distribution systems applying available standards.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
4<\/td>\nCONTENTS <\/td>\n<\/tr>\n
6<\/td>\nFOREWORD <\/td>\n<\/tr>\n
8<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms, definitions and abbreviations
3.1 Terms and definitions
3.2 Abbreviations <\/td>\n<\/tr>\n
10<\/td>\n4 Power systems \u2013 specifics and related standardization
4.1 Overview <\/td>\n<\/tr>\n
11<\/td>\n4.2 Security specifics
Figure 1 \u2013 Power systems \u2013 Management of two infrastructures (see Figure\u00a011 of [40]) <\/td>\n<\/tr>\n
12<\/td>\nFigure 2 \u2013 Comparison office \/ power system security requirements <\/td>\n<\/tr>\n
13<\/td>\n4.3 Relevant regulation and standardization activities
Table 1 \u2013 IEC\u00a062351 parts <\/td>\n<\/tr>\n
17<\/td>\n4.4 Reference architecture for TC 57
Figure 3 \u2013 Graphical representation of scope and completeness of selected standards (enhanced version of Figure 1 in 4.1 of [4]) <\/td>\n<\/tr>\n
18<\/td>\nFigure 4 \u2013 TC 57 reference architecture (see [29]) <\/td>\n<\/tr>\n
19<\/td>\nFigure 5 \u2013 Application of TC 57 standards to a power system (see [29], enhanced according to IEC\/TR\u00a061850-1) <\/td>\n<\/tr>\n
20<\/td>\n5 Security architecture in power systems
5.1 General <\/td>\n<\/tr>\n
21<\/td>\n5.2 Security domains and their mapping to power system domains
Table 2 \u2013 Security domains (see also [35]) <\/td>\n<\/tr>\n
22<\/td>\nFigure 6 \u2013 Mapping of information security domains to power system domains <\/td>\n<\/tr>\n
23<\/td>\n5.3 System interface categories and their mapping to power systems <\/td>\n<\/tr>\n
24<\/td>\nTable 3 \u2013 Mapping of logical interface categories to TC 57 reference architecture <\/td>\n<\/tr>\n
25<\/td>\nFigure 7 \u2013 Mapping of IEC TC 57 communication standards to IEC\u00a062351 parts <\/td>\n<\/tr>\n
27<\/td>\nFigure 8 \u2013 Mapping of IEC\u00a062351 protocol related parts to the IEC\u00a061850 stack <\/td>\n<\/tr>\n
28<\/td>\n5.4 Security controls
5.4.1 General <\/td>\n<\/tr>\n
29<\/td>\nFigure 9 \u2013 Security controls overview <\/td>\n<\/tr>\n
30<\/td>\n5.4.2 Domain mapping of security controls
Table 4 \u2013 Security controls applicable to the different security domains <\/td>\n<\/tr>\n
32<\/td>\n5.4.3 Determination of necessary security controls
Figure 10 \u2013 Generic system security assessment approach covering design and implementation <\/td>\n<\/tr>\n
33<\/td>\n5.4.4 Network-based security controls
Figure 11 \u2013 Secure design, development, and operation process <\/td>\n<\/tr>\n
35<\/td>\nTable 5 \u2013 General security standards applicable to network security <\/td>\n<\/tr>\n
36<\/td>\n6 Mapping security controls to the TC\u00a057 architecture
6.1 General
6.2 Security domains within a generic power system architecture <\/td>\n<\/tr>\n
37<\/td>\n6.3 Application of security controls to a generic power system architecture
Figure 12 \u2013 Generic power systems architecture <\/td>\n<\/tr>\n
38<\/td>\nFigure 13 \u2013 Power systems architecture with security controls <\/td>\n<\/tr>\n
40<\/td>\n6.4 Application of security controls to specific power system scenarios
6.4.1 General
Table 6 \u2013 Example security approaches to power system communication protocols <\/td>\n<\/tr>\n
41<\/td>\n6.4.2 Substation automation
Figure 14 \u2013 Example substation automation deployment with security controls <\/td>\n<\/tr>\n
43<\/td>\n6.4.3 Control center \u2013 substation communication
Figure 15 \u2013 Example control center substation communication with security controls <\/td>\n<\/tr>\n
44<\/td>\n6.4.4 Advanced metering <\/td>\n<\/tr>\n
45<\/td>\nFigure 16 \u2013 Example advanced metering infrastructure deployment with security controls <\/td>\n<\/tr>\n
46<\/td>\n6.5 Identified gaps <\/td>\n<\/tr>\n
47<\/td>\nAnnex A (informative) Further related material
Table A.1 \u2013 NERC CIP overview <\/td>\n<\/tr>\n
48<\/td>\nTable A.2 \u2013 The SABSA matrix for security architecture development <\/td>\n<\/tr>\n
49<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Power systems management and associated information exchange. Data and communications security – Security architecture guidelines<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2012<\/td>\n54<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":255088,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-255083","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/255083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/255088"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=255083"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=255083"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=255083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}