BS EN 62351-3:2014+A2:2020
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Power systems management and associated information exchange. Data and communications security Communication network and system security. Profiles including TCP/IP
Hardcopy , PDF
02-08-2023
English
13-05-2020
Committee |
PEL/57
|
DocumentType |
Standard
|
ISBN |
9780539034820
|
Pages |
26
|
ProductNote |
THIS STANDARD IS ALSO REFERS TO: RFC 5746:2010; RFC 5746:2010; RFC 5280:2008; RFC 6066:2006; RFC 5246:2008; RFC 4492:2006; RFC 6176:2011
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
1.1 Scope
This part of IEC 62351 specifies how to provide confidentiality, integrity protection, and message level authentication for SCADA and telecontrol protocols that make use of TCP/IP as a message transport layer when cyber-security is required.
Although there are many possible solutions to secure TCP/IP, the particular scope of this part is to provide security between communicating entities at either end of a TCP/IP connection within the end communicating entities. The use and specification of intervening external security devices (e.g. “bump-in-the-wire”) are considered out-of-scope.
This part of IEC 62351 specifies how to secure TCP/IP-based protocols through constraints on the specification of the messages, procedures, and algorithms of Transport Layer Security (TLS) (defined in RFC 5246) so that they are applicable to the telecontrol environment of the IEC. TLS is applied to protect the TCP communication. It is intended that this standard be referenced as a normative part of other IEC standards that have the need for providing security for their TCP/IP-based protocol. However, it is up to the individual protocol security initiatives to decide if this standard is to be referenced.
This part of IEC 62351 reflects the security requirements of the IEC power systems management protocols. Should other standards bring forward new requirements, this standard may need to be revised.
1.2 Intended Audience
The initial audience for this specification is intended to be experts developing or making use of IEC protocols in the field of power systems management and associated information exchange. For the measures described in this specification to take effect, they must be accepted and referenced by the specifications for the protocols themselves, where the protocols make use of TCP/IP security. This document is written to enable that process.
The subsequent audience for this specification is intended to be the developers of products that implement these protocols.
Portions of this specification may also be of use to managers and executives in order to understand the purpose and requirements of the work.
Standards | Relationship |
IEC 62351-3:2014+AMD1:2018+AMD2:2020 CSV | Identical |
IEC 62351-3:2014/AMD2:2020 | Identical |
EN 62351-3:2014/A2:2020 | Identical |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.