Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

16/30343872 DC : DRAFT JUNE 2016

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

BS EN 62351-9 ED1 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA ANDCOMMUNICATIONS SECURITY - PART 9: CYBER SECURITY KEY MANAGEMENT FOR POWER SYSTEM EQUIPMENT
Superseded date

31-07-2017

Published date

13-06-2016

1 Scope and purpose
2 Normative references
3 Terms and definitions
4 Abbreviations and acronyms
5 Cryptographic applications for power system
   implementations (informative)
6 Key management concepts and methods in power
   system operations (informative)
7 General key management requirements (normative)
8 Asymmetric key management (normative)
9 Symmetric key management (normative)
10 Connections to the IEC 62351 parts and other
   IEC documents (Informative)
11 References and bibliography
Annex A - Protocol Implementation Conformance
          Statement (PICS)
Annex B (informative) - Random Number Generation (RNG)
Annex C - Certificate enrolment and renewal flowcharts
Annex D - Certificate profile

BS EN 62351-9 Ed1.

Committee
PEL/57
DocumentType
Draft
PublisherName
British Standards Institution
Status
Superseded
SupersededBy

IEC TS 62351-3:2007 Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP
IEC TS 62351-6:2007 Power systems management and associated information exchange - Data and communications security - Part 6: Security for IEC 61850
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
IEC TS 62351-4:2007 Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS
IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
IEC TS 62351-5:2013 Power systems management and associated information exchange - Data and communications security - Part 5: Security for IEC 60870-5 and derivatives
IEEE 1686-2013 IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities
IEC TS 62351-1:2007 Power systems management and associated information exchange - Data and communications security - Part 1: Communication network and system security - Introduction to security issues
IEEE 1588-2008 REDLINE IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
IEC TS 62351-8:2011 Power systems management and associated information exchange - Data and communications security - Part 8: Role-based access control
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more