• BS EN 62351-9:2017

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    Power systems management and associated information exchange. Data and communications security Cyber security key management for power system equipment

    Available format(s):  Hardcopy, PDF

    Superseded date:  02-08-2023

    Language(s):  English

    Published date:  14-07-2017

    Publisher:  British Standards Institution

    Add To Cart

    Scope - (Show below) - (Hide below)

    This part of IEC62351 specifies cryptographic key management, namely how to generate, distribute, revoke, and handle public-key certificates and cryptographic keys to protect digital data and its communication. Included in the scope is the handling of asymmetric keys (e.g. private keys and public-key certificates), as well as symmetric keys for groups (GDOI). This part of IEC62351 assumes that other standards have already chosen the type of keys and cryptography that will be utilized, since the cryptography algorithms and key materials chosen will be typically mandated by an organization’s own local security policies and by the need to be compliant with other international standards. This document therefore specifies only the management techniques for these selected key and cryptography infrastructures. The objective is to define requirements and technologies to achieve interoperability of key management. The purpose of this part of IEC62351 is to guarantee interoperability among different vendors by specifying or limiting key management options to be used. This document assumes that the reader understands cryptography and PKI principles.

    General Product Information - (Show below) - (Hide below)

    Committee PEL/57
    Development Note Supersedes 16/30343872 DC. (07/2017)
    Document Type Standard
    Publisher British Standards Institution
    Status Superseded
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    FIPS PUB 140 : 0001 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
    IEC TS 62351-3:2007 Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP
    IEC TS 62351-6:2007 Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850
    ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
    IEC TS 62351-4:2007 Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS
    IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
    ISO/IEC 8802-3:2000 Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications
    ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    IEC TS 62351-5:2013 Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives
    IEC TR 62351-12:2016 Power systems management and associated information exchange - Data and communications security - Part 12: Resilience and security recommendations for power systems with distributed energy resources (DER) cyber-physical systems
    IEEE 1686-2013 IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities
    IEC TS 62351-1:2007 Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues
    IEEE 1588-2008 REDLINE IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    IEC TS 62351-8:2011 Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective