16/30343872 DC : DRAFT JUNE 2016
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
BS EN 62351-9 ED1 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA ANDCOMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT
31-07-2017
13-06-2016
1 Scope and purpose
2 Normative references
3 Terms and definitions
4 Abbreviations and acronyms
5 Cryptographic applications for power system
implementations (informative)
6 Key management concepts and methods in power
system operations (informative)
7 General key management requirements (normative)
8 Asymmetric key management (normative)
9 Symmetric key management (normative)
10 Connections to the IEC 62351 parts and other
IEC documents (Informative)
11 References and bibliography
Annex A - Protocol Implementation Conformance
Statement (PICS)
Annex B (informative) - Random Number Generation (RNG)
Annex C - Certificate enrolment and renewal flowcharts
Annex D - Certificate profile
BS EN 62351-9 Ed1.
Committee |
PEL/57
|
DocumentType |
Draft
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy |
IEC TS 62351-3:2007 | Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP |
IEC TS 62351-6:2007 | Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850 |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
IEC TS 62351-4:2007 | Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
IEC TS 62351-5:2013 | Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives |
IEEE 1686-2013 | IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities |
IEC TS 62351-1:2007 | Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues |
IEEE 1588-2008 REDLINE | IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
IEC TS 62351-8:2011 | Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.