IEC TR 62351-90-1:2018
Current
The latest, up-to-date edition.
Power systems management and associated information exchange - Data and communications security - Part 90-1: Guidelines for handling role-based access control in power systems
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
English
01-23-2018
FOREWORD
INTRODUCTION
1 Scope
2 Normative references
3 Terms, definitions and abbreviated terms
4 Overview
5 Categorization of actions to ease the definition
of custom roles
6 RBAC Operation
7 Information exchange of defined custom roles
and associated rights
Bibliography
IEC TR 62351-90-1:2018(E) addresses the handling of access control of users and automated agents to data objects in power systems by means of role-based access control (RBAC) as defined in IEC TS 62351-8. The main focus of this document lies in developing a standardized method for defining and engineering custom roles, their role-to-right mappings and the corresponding infrastructure support needed to utilize these custom roles in power systems. This publication contains attached files in the form of electronic machine readable files, which are intended to be used as a complement.
Committee |
TC 57
|
DevelopmentNote |
Stability date: 2020. (01/2018)
|
DocumentType |
Technical Report
|
Pages |
37
|
PublisherName |
International Electrotechnical Committee
|
Status |
Current
|
Standards | Relationship |
PD IEC TR 62351-90-1:2018 | Identical |
IEC 62351-9:2017 | Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment |
IEC TS 62351-6:2007 | Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850 |
IEC TS 62351-4:2007 | Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS |
IEC 61850-6:2009 | Communication networks and systems for power utility automation - Part 6: Configuration description language for communication in electrical substations related to IEDs |
IEC 60870-5-104:2006+AMD1:2016 CSV | Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standardtransport profiles |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
IEC TS 62351-5:2013 | Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives |
ANSI X9.69 : 2017 | FRAMEWORK FOR KEY MANAGEMENT EXTENSIONS |
IEEE 1686-2013 | IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities |
IEC TS 62351-1:2007 | Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues |
IEC 61850-7-3:2010 | Communication networks and systems for power utility automation - Part 7-3: Basic communication structure - Common data classes |
IEEE 1815-2012 REDLINE | IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3) |
ANSI INCITS 359 : 2012 | INFORMATION TECHNOLOGY - ROLE BASED ACCESS CONTROL |
IEC TS 62351-8:2011 | Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control |
ANSI X9.73 : 2017 | CRYPTOGRAPHIC MESSAGE SYNTAX - ASN.1 AND XML |
IEC 62351-7:2017 | Power systems management and associated information exchange - Data and communications security - Part 7: Network and System Management (NSM) data object models |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.