• IEC TR 62351-90-1:2018

    Current The latest, up-to-date edition.

    Power systems management and associated information exchange - Data and communications security - Part 90-1: Guidelines for handling role-based access control in power systems

    Available format(s):  Hardcopy, PDF, PDF 3 Users, PDF 5 Users, PDF 9 Users

    Language(s):  English

    Published date:  23-01-2018

    Publisher:  International Electrotechnical Committee

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    FOREWORD
    INTRODUCTION
    1 Scope
    2 Normative references
    3 Terms, definitions and abbreviated terms
    4 Overview
    5 Categorization of actions to ease the definition
      of custom roles
    6 RBAC Operation
    7 Information exchange of defined custom roles
      and associated rights
    Bibliography

    Abstract - (Show below) - (Hide below)

    IEC TR 62351-90-1:2018(E) addresses the handling of access control of users and automated agents to data objects in power systems by means of role-based access control (RBAC) as defined in IEC TS 62351-8. The main focus of this document lies in developing a standardized method for defining and engineering custom roles, their role-to-right mappings and the corresponding infrastructure support needed to utilize these custom roles in power systems. This publication contains attached files in the form of electronic machine readable files, which are intended to be used as a complement.

    General Product Information - (Show below) - (Hide below)

    Committee TC 57
    Development Note Stability date: 2020. (01/2018)
    Document Type Technical Report
    Publisher International Electrotechnical Committee
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    IEC 62351-9:2017 Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment
    IEC TS 62351-6:2007 Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850
    IEC TS 62351-4:2007 Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS
    IEC 61850-6:2009 Communication networks and systems for power utility automation - Part 6: Configuration description language for communication in electrical substations related to IEDs
    IEC 60870-5-104:2006+AMD1:2016 CSV Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standardtransport profiles
    ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    IEC TS 62351-5:2013 Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives
    ANSI X9.69 : 2017 FRAMEWORK FOR KEY MANAGEMENT EXTENSIONS
    IEEE 1686-2013 IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities
    IEC TS 62351-1:2007 Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues
    IEC 61850-7-3:2010 Communication networks and systems for power utility automation - Part 7-3: Basic communication structure - Common data classes
    IEEE 1815-2012 REDLINE IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3)
    ANSI INCITS 359 : 2012 INFORMATION TECHNOLOGY - ROLE BASED ACCESS CONTROL
    IEC TS 62351-8:2011 Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control
    ANSI X9.73 : 2017 CRYPTOGRAPHIC MESSAGE SYNTAX - ASN.1 AND XML
    IEC 62351-7:2017 Power systems management and associated information exchange - Data and communications security - Part 7: Network and System Management (NSM) data object models
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective