IEC TS 62351-3:2007
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
10-28-2014
English
06-22-2007
FOREWORD
1 Scope and object
1.1 Scope
1.2 Object
2 Normative references
3 Terms and definitions
4 Security issues addressed by this technical
specification
4.1 Operational requirements affecting the use
of TLS in the telecontrol environment
4.2 Security threats countered
4.3 Attack methods countered
5 Mandatory requirements
5.1 Deprecation of non-encrypting cipher suites
5.2 Negotiation of versions
5.3 Cipher renegotiation
5.4 Message authentication code
5.5 Certificate support
5.5.1 Multiple Certificate Authorities (CAs)
5.5.2 Certificate size
5.5.3 Certificate exchange
5.5.4 Certificate comparison
5.6 Co-existence with non-secure protocol traffic
6 TC 57 referencing standard requirements
7 Conformance
Specifies how to provide confidentiality, tamper detection, and message level authentication for SCADA and telecontrol protocols that make use of TCP/IP as a message transport layer.
This publication is of core relevance for Smart Grid.
Committee |
TC 57
|
DevelopmentNote |
Stability Date: 2013. (10/2012)
|
DocumentType |
Technical Specification
|
Pages |
10
|
PublisherName |
International Electrotechnical Committee
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
DD IEC TS 62351-3 : DRAFT JUL 2007 | Identical |
NEN NPR IEC/TS 62351-3 : 2007 | Identical |
BIS IS/IEC/TS 62351-3 : 2007(R2016) | Identical |
I.S. EN 62351-9:2017 | POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT |
PD IEC/TS 60870-5-7:2013 | Telecontrol equipment and systems Transmission protocols. Security extensions to IEC 60870-5-101 and IEC 60870-5-104 protocols (applying IEC 62351) |
IEC 62351-9:2017 | Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment |
DD IEC/TS 62351-6:2007 | Power systems management and associated information exchange. Data and communication security Security for IEC 61850 profiles |
PD IEC/TR 62351-10:2012 | Power systems management and associated information exchange. Data and communications security Security architecture guidelines |
BS EN 62351-9:2017 | Power systems management and associated information exchange. Data and communications security Cyber security key management for power system equipment |
NEMA CPSP 1 : 2015 | SUPPLY CHAIN BEST PRACTICES |
BIS IS/IEC/TS 62351-5 : 2009(R2016) | POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES |
PD IEC/TS 62351-5:2013 | Power systems management and associated information exchange. Data and communications security Security for IEC 60870-5 and derivatives |
DD IEC/TS 62351-4:2007 | Power systems management and associated information exchange. Data and communications security Profiles including MMS |
IEC TS 62351-6:2007 | Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850 |
IEC TR 62351-10:2012 | Power systems management and associated information exchange - Data and communications security - Part 10: Security architecture guidelines |
IEC TS 62351-5:2013 | Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives |
DD IEC/TS 62351-8:2011 | Power systems management and associated information exchange. Data and communications security Role-based access control |
DD IEC TS 62351-5 : DRAFT OCT 2009 | POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES |
IEC TS 62351-8:2011 | Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control |
IEC TS 62351-4:2007 | Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS |
16/30343872 DC : DRAFT JUNE 2016 | BS EN 62351-9 ED1 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA ANDCOMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT |
BIS IS/IEC/TS 62351-4 : 2007(R2016) | POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 4: PROFILES INCLUDING MMS |
IEEE 1815.1-2015 | IEEE Standard for Exchanging Information Between Networks Implementing IEC 61850 and IEEE Std 1815(TM) [Distributed Network Protocol (DNP3)] |
08/30187449 DC : DRAFT AUG 2008 | BS EN 62541-2 - OPC UNIFIED ARCHITECTURE - PART 2: SECURITY MODEL |
IEEE 1815-2012 REDLINE | IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3) |
EN 62351-9:2017 | Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment |
IEC TS 62351-1:2007 | Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.