PRICES include / exclude VAT
Homepage>BS Standards>33 TELECOMMUNICATIONS. AUDIO AND VIDEO ENGINEERING>33.200 Telecontrol. Telemetering>BS EN IEC 62351-9:2023 Power systems management and associated information exchange. Data and communications security Cyber security key management for power system equipment
Sponsored link
immediate downloadReleased: 2023-08-02
BS EN IEC 62351-9:2023 Power systems management and associated information exchange. Data and communications security Cyber security key management for power system equipment

BS EN IEC 62351-9:2023

Power systems management and associated information exchange. Data and communications security Cyber security key management for power system equipment

Format
Availability
Price and currency
English Secure PDF
Immediate download
376.80 EUR
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
37.68 EUR
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
113.04 EUR
English Hardcopy
In stock
376.80 EUR
Standard number:BS EN IEC 62351-9:2023
Pages:150
Released:2023-08-02
ISBN:978 0 539 13656 2
Status:Standard

BS EN IEC 62351-9:2023 Power Systems Management and Associated Information Exchange

Introducing the BS EN IEC 62351-9:2023, a comprehensive guide to data and communications security, specifically designed for power system equipment. This standard is a must-have for any professional in the power systems industry, providing crucial information on cyber security key management. With its release in August 2023, it is the most up-to-date resource available, ensuring you stay ahead of the curve in this rapidly evolving field.

Key Features

The BS EN IEC 62351-9:2023 is a comprehensive 150-page guide that covers all aspects of data and communications security for power system equipment. It provides detailed guidelines on cyber security key management, ensuring that your power systems are secure and protected from potential cyber threats.

With its unique focus on power systems, this standard is an invaluable resource for professionals in the industry. Whether you're a system operator, a security analyst, or a network engineer, this standard will provide you with the knowledge and tools you need to ensure the security of your systems.

Latest Edition

This is the latest edition of the standard, released on August 2, 2023. It reflects the most recent developments in the field of power systems management and associated information exchange. By purchasing this standard, you're ensuring that you have the most current information at your fingertips.

ISBN and Standard Number

The standard number for this publication is BS EN IEC 62351-9:2023, and the ISBN is 978 0 539 13656 2. These identifiers ensure that you're purchasing the correct edition of the standard, and they can be used to easily locate this publication in any library or database.

Status: Standard

The status of this publication is "Standard", indicating that it is an officially recognized and widely accepted guide in the field of power systems management and associated information exchange. This status is a testament to the quality and reliability of the information contained within this standard.

Conclusion

In the rapidly evolving field of power systems management and associated information exchange, staying up-to-date with the latest information is crucial. The BS EN IEC 62351-9:2023 provides you with the most current guidelines on data and communications security, ensuring that your power systems are secure and protected from potential cyber threats. Don't miss out on this invaluable resource - purchase your copy today!

DESCRIPTION

BS EN IEC 62351-9:2023


This standard BS EN IEC 62351-9:2023 Power systems management and associated information exchange. Data and communications security is classified in these ICS categories:
  • 33.200 Telecontrol. Telemetering
IEC 62351-9:2023 specifies cryptographic key management, primarily focused on the management of long-term keys, which are most often asymmetric key pairs, such as public-key certificates and corresponding private keys. As certificates build the base this document builds a foundation for many IEC 62351 services (see also Annex A). Symmetric key management is also considered but only with respect to session keys for group-based communication as applied in IEC 62351-6. The objective of this document is to define requirements and technologies to achieve interoperability of key management by specifying or limiting key management options to be used. This document assumes that an organization (or group of organizations) has defined a security policy to select the type of keys and cryptographic algorithms that will be utilized, which may have to align with other standards or regulatory requirements. This document therefore specifies only the management techniques for these selected key and cryptography infrastructures. This document assumes that the reader has a basic understanding of cryptography and key management principles. The requirements for the management of pairwise symmetric (session) keys in the context of communication protocols is specified in the parts of IEC 62351 utilizing or specifying pairwise communication such as: • IEC 62351-3 for TLS by profiling the TLS options • IEC 62351-4 for the application layer end-to-end security • IEC TS 62351-5 for the application layer security mechanism for IEC 60870-5-101/104 and IEEE 1815 (DNP3) The requirements for the management of symmetric group keys in the context of power system communication protocols is specified in IEC 62351-6 for utilizing group security to protect GOOSE and SV communication. IEC 62351-9 utilizes GDOI as already IETF specified group-based key management protocol to manage the group security parameter and enhances this protocol to carry the security parameter for GOOSE, SV, and PTP. This document also defines security events for specific conditions which could identify issues which might require error handling. However, the actions of the organisation in response to these error conditions are beyond the scope of this document and are expected to be defined by the organizations security policy. In the future, as public-key cryptography becomes endangered by the evolution of quantum computers, this document will also consider post-quantum cryptography to a certain extent. Note that at this time being no specific measures are provided. This second edition cancels and replaces the first edition published in 2017. This edition constitutes a technical revision. This edition includes the following significant technical changes with respect to the previous edition: a) Certificate components and verification of the certificate components have been added; b) GDOI has been updated to include findings from interop tests; c) GDOI operation considerations have been added; d) GDOI support for PTP (IEEE 1588) support has been added as specified by IEC/IEEE 61850-9-3 Power Profile; e) Cyber security event logging has been added as well as the mapping to IEC 62351-14; f) Annex B with background on utilized cryptographic algorithms and mechanisms has been added.