IEC TR 62351-10:2012
Current
The latest, up-to-date edition.
Power systems management and associated information exchange - Data and communications security - Part 10: Security architecture guidelines
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
12-10-2012
FOREWORD
INTRODUCTION
1 Scope
2 Normative references
3 Terms, definitions and abbreviations
4 Power systems - specifics and related standardization
5 Security architecture in power systems
6 Mapping security controls to the TC 57 architecture
Annex A (informative) - Further related material
Bibliography
IEC/TR 62351-10:2012(E) targets the description of security architecture guidelines for power systems based on essential security controls, i.e. on security-related components and functions and their interaction. Furthermore, the relation and mapping of these security controls to the general system architecture of power systems is provided as a guideline to support system integrators to securely deploy power generation, transmission, and distribution systems applying available standards.
DevelopmentNote |
Stability Date: 2017. (09/2017)
|
DocumentType |
Technical Report
|
Pages |
49
|
PublisherName |
International Electrotechnical Committee
|
Status |
Current
|
Standards | Relationship |
PD IEC/TR 62351-10:2012 | Identical |
IS/IEC/TR 62351 : Part 10 : 2012 | Identical |
PD IEC/TR 62357-1:2016 | Power systems management and associated information exchange Reference architecture |
BS EN 62769-1:2015 | Field device integration (FDI) Overview |
SAE J2931/7_201802 | Security for Plug-In Electric Vehicle Communications |
IEC TR 62351-13:2016 | Power systems management and associated information exchange - Data and communications security - Part 13: Guidelines on security topics to be covered in standards and specifications |
EN 62769-1:2015 | Field device integration (FDI) - Part 1: Overview |
PD IEC/TR 61850-90-12:2015 | Communication networks and systems for power utility automation Wide area network engineering guidelines |
I.S. EN 62769-1:2015 | FIELD DEVICE INTEGRATION (FDI) - PART 1: OVERVIEW |
IEC TR 62357-1:2016 | Power systems management and associated information exchange - Part 1: Reference architecture |
PD IEC/TR 61850-90-2:2016 | Communication networks and systems for power utility automation Using IEC 61850 for communication between substations and control centres |
IEC TR 61850-90-2:2016 | Communication networks and systems for power utility automation - Part 90-2: Using IEC 61850 for communication between substations and control centres |
CEI EN IEC 62769-1:2023 | Field Device Integration (FDI®) Part 1: Overview |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
IEC TS 62351-3:2007 | Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP |
IEC TS 62351-6:2007 | Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850 |
IEC TS 62351-4:2007 | Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS |
IEC 60870-5-104:2006+AMD1:2016 CSV | Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standardtransport profiles |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
IEC 61400-25-4:2016 | Wind energy generation systems - Part 25-4: Communications for monitoring and control of wind power plants - Mapping to communication profile |
IEC 60870-5-101:2003+AMD1:2015 CSV | Telecontrol equipment and systems - Part 5-101: Transmissionprotocols - Companion standard for basic telecontrol tasks |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
IEC TS 62351-5:2013 | Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives |
IEC TR 61850-90-5:2012 | Communication networks and systems for power utility automation - Part 90-5: Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118 |
IEC TS 62351-7:2010 | Power systems management and associated information exchange - Data and communications security - Part 7: Network and system management (NSM) data object models |
ISO/IEC 17799:2005 | Information technology Security techniques Code of practice for information security management |
IEEE 1686-2013 | IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities |
IEC TS 62351-1:2007 | Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues |
DIN SPEC 27009:2012-04 | GUIDANCE FOR INFORMATION SECURITY MANAGEMENT OF POWER SUPPLY CONTROL SYSTEMS BASED ON ISO/IEC 27002 |
IEC TR 62357:2003 | Power system control and associated communications - Reference architecture for object models, services and protocols |
ISA 99 CD : 2010 | SECURITY GUIDELINES AND USER RESOURCES FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
IEC TS 62351-8:2011 | Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control |
ISO/IEC 42010:2007 | Systems and software engineering Recommended practice for architectural description of software-intensive systems |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.