I.S. EN 62351-9:2017
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT
Hardcopy , PDF
29-07-2023
English
01-01-2017
For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.
Only cited Standards give presumption of conformance to New Approach Directives/Regulations.
Dates of withdrawal of national standards are available from NSAI.
National Foreword
FOREWORD
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations and acronyms
5 Cryptographic applications for power
system implementations
6 Key management concepts and methods in
power system operations
7 General key management requirements
8 Asymmetric key management
9 Symmetric key management
10 Connections to the IEC 62351 parts
and other IEC documents
Annex A (normative) - Protocol Implementation
Conformance Statement (PICS)
Annex B (informative) - Random Number
Generation (RNG)
Annex C (informative) - Certificate enrolment
and renewal flowcharts
Annex D (informative) - Examples of certificate
profiles
Bibliography
Annex ZA (normative) - Normative references to international
publications with their corresponding European
publications
Defines cryptographic key management, namely how to generate, distribute, revoke, and handle public-key certificates and cryptographic keys to protect digital data and its communication.
DocumentType |
Standard
|
Pages |
100
|
PublisherName |
National Standards Authority of Ireland
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
EN 62351-9:2017 | Identical |
IEC TS 62351-3:2007 | Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP |
IEC TS 62351-6:2007 | Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850 |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
IEC TS 62351-4:2007 | Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS |
ISO/IEC 9834-1:2012 | Information technology — Procedures for the operation of object identifier registration authorities — Part 1: General procedures and top arcs of the international object identifier tree |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
ISO/IEC 8802-3:2000 | Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications |
FIPS PUB 140-2 : 0 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
IEC TS 62351-5:2013 | Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives |
IEC TR 62351-12:2016 | Power systems management and associated information exchange - Data and communications security - Part 12: Resilience and security recommendations for power systems with distributed energy resources (DER) cyber-physical systems |
IEEE 1686-2013 | IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities |
IEC TS 62351-1:2007 | Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues |
IEEE 1588-2008 REDLINE | IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
IEC TS 62351-8:2011 | Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.