PD IEC/TR 62351-10:2012
Current
The latest, up-to-date edition.
Power systems management and associated information exchange. Data and communications security Security architecture guidelines
Hardcopy , PDF
English
12-10-2012
FOREWORD
INTRODUCTION
1 Scope
2 Normative references
3 Terms, definitions and abbreviations
4 Power systems - specifics and related standardization
5 Security architecture in power systems
6 Mapping security controls to the TC 57 architecture
Annex A (informative) - Further related material
Bibliography
Defines the description of security architecture guidelines for power systems based on essential security controls, i.e. on security-related components and functions and their interaction.
Committee |
PEL/57
|
DocumentType |
Standard
|
Pages |
54
|
PublisherName |
British Standards Institution
|
Status |
Current
|
This part of IEC 62351, which is a Technical Report, targets the description of security architecture guidelines for power systems based on essential security controls, i.e. on security-related components and functions and their interaction. Furthermore, the relation and mapping of these security controls to the general system architecture of power systems is provided as a guideline to support system integrators to securely deploy power generation, transmission, and distribution systems applying available standards.
Standards | Relationship |
IEC TR 62351-10:2012 | Identical |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
IEC TS 62351-3:2007 | Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP |
IEC TS 62351-6:2007 | Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850 |
IEC TS 62351-4:2007 | Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS |
IEC 60870-5-104:2006+AMD1:2016 CSV | Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standardtransport profiles |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
IEC 61400-25-4:2016 | Wind energy generation systems - Part 25-4: Communications for monitoring and control of wind power plants - Mapping to communication profile |
IEC 60870-5-101:2003+AMD1:2015 CSV | Telecontrol equipment and systems - Part 5-101: Transmissionprotocols - Companion standard for basic telecontrol tasks |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
IEC TS 62351-5:2013 | Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives |
IEC TR 61850-90-5:2012 | Communication networks and systems for power utility automation - Part 90-5: Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118 |
IEC TS 62351-7:2010 | Power systems management and associated information exchange - Data and communications security - Part 7: Network and system management (NSM) data object models |
ISO/IEC 17799:2005 | Information technology Security techniques Code of practice for information security management |
IEEE 1686-2013 | IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities |
IEC TS 62351-1:2007 | Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues |
DIN SPEC 27009:2012-04 | GUIDANCE FOR INFORMATION SECURITY MANAGEMENT OF POWER SUPPLY CONTROL SYSTEMS BASED ON ISO/IEC 27002 |
IEC TR 62357:2003 | Power system control and associated communications - Reference architecture for object models, services and protocols |
ISA 99 CD : 2010 | SECURITY GUIDELINES AND USER RESOURCES FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
IEC TS 62351-8:2011 | Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control |
ISO/IEC 42010:2007 | Systems and software engineering Recommended practice for architectural description of software-intensive systems |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.