16/30343872 DC : DRAFT JUNE 2016
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
BS EN 62351-9 ED1 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA ANDCOMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT
13-06-2016
31-07-2017
1 Scope and purpose
2 Normative references
3 Terms and definitions
4 Abbreviations and acronyms
5 Cryptographic applications for power system
implementations (informative)
6 Key management concepts and methods in power
system operations (informative)
7 General key management requirements (normative)
8 Asymmetric key management (normative)
9 Symmetric key management (normative)
10 Connections to the IEC 62351 parts and other
IEC documents (Informative)
11 References and bibliography
Annex A - Protocol Implementation Conformance
Statement (PICS)
Annex B (informative) - Random Number Generation (RNG)
Annex C - Certificate enrolment and renewal flowcharts
Annex D - Certificate profile
BS EN 62351-9 Ed1.
| Committee |
PEL/57
|
| DocumentType |
Draft
|
| PublisherName |
British Standards Institution
|
| Status |
Superseded
|
| SupersededBy |
| IEC TS 62351-3:2007 | Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP |
| IEC TS 62351-6:2007 | Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850 |
| ISO/IEC 11770-2:2008 | Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques |
| IEC TS 62351-4:2007 | Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS |
| IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
| ISO/IEC 9594-8:2017 | Information technology — Open Systems Interconnection — The Directory — Part 8: Public-key and attribute certificate frameworks |
| IEC TS 62351-5:2013 | Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives |
| IEEE 1686-2013 | IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities |
| IEC TS 62351-1:2007 | Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues |
| IEEE 1588-2008 REDLINE | IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems |
| ISO/IEC 11770-1:2010 | Information technology — Security techniques — Key management — Part 1: Framework |
| IEC TS 62351-8:2011 | Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control |
| ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.