PD IEC TR 62210:2003
Current
The latest, up-to-date edition.
Power system control and associated communications. Data and communication security
Hardcopy , PDF
English
04-07-2003
FOREWORD
1 Scope and object
2 Overview
3 Reference documents
4 Terms, definitions and abbreviations
4.1 Terms and definitions
4.2 Abbreviations
5 Introduction to security
5.1 How to use this report
6 The security analysis process
6.1 Network topologies
6.2 User consequence based analysis
6.2.1 Stakeholders
6.3 Consequences to be considered
6.3.1 Financial
6.3.2 Asset destruction/degradation
6.3.3 Inability to restore service
6.4 Consequences and security threats
7 Focus of security work within this report
7.1 Justification of application level security focus
7.2 Security analysis technique
7.2.1 Security objectives
7.2.2 General threats
7.2.3 Specific threats to be considered in PP
8 Vulnerabilities
8.1 Threats to topologies
8.2 Current IEC Technical Committee 57 protocols
8.2.1 TASE.1
8.2.2 TASE.2
8.2.3 IEC 60870-5
8.2.4 IEC 61334
8.2.5 IEC 61850
9 Recommendations for future IEC Technical Committee 57
security work
Annex A (informative) What is a protection profile?
Annex B (informative) Protection profile for TASE.2
Annex C (Informative) Example of consequence diagrams
Applies to computerised supervision, control, metering, and protection systems in electrical utilities. Deals with security aspects related to communication protocols used within and between such systems, the access to, and use of the systems.
Committee |
PEL/57
|
DocumentType |
Standard
|
Pages |
46
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Applies to computerised supervision, control, metering, and protection systems in electrical utilities. Deals with security aspects related to communication protocols used within and between such systems, the access to, and use of the systems. Discusses realistic threats to the system and its operation, the vulnerability and the consequences of intrusion, actions and countermeasures to improve the current situation.
Standards | Relationship |
IEC TR 62210:2003 | Identical |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 10181-7:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Security audit and alarms framework |
ISO/IEC 7498-1:1994 | Information technology — Open Systems Interconnection — Basic Reference Model: The Basic Model |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
ISO/IEC 10181-1:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Overview |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.