1、 IEC/TR 62351-10 Edition 1.0 2012-10 TECHNICAL REPORT Power systems management and associated information exchange Data and communications security Part 10:Security architecture guidelines IEC/TR 62351-10:2012(E)colourinsideCopyrighted material licensed to BR Demo by Thomson Reuters(Scientific),Inc.
2、,downloaded on Nov-27-2014 by James Madison.No further reproduction or distribution is permitted.Uncontrolled when printed.THIS PUBLICATION IS COPYRIGHT PROTECTED Copyright 2012 IEC,Geneva,Switzerland All rights reserved.Unless otherwise specified,no part of this publication may be reproduced or uti
3、lized in any form or by any means,electronic or mechanical,including photocopying and microfilm,without permission in writing from either IEC or IECs member National Committee in the country of the requester.If you have any questions about IEC copyright or have an enquiry about obtaining additional
4、rights to this publication,please contact the address below or your local IEC member National Committee for further information.IEC Central Office Tel.:+41 22 919 02 11 3,rue de Varemb Fax:+41 22 919 03 00 CH-1211 Geneva 20 infoiec.ch Switzerland www.iec.ch About the IEC The International Electrotec
5、hnical Commission(IEC)is the leading global organization that prepares and publishes International Standards for all electrical,electronic and related technologies.About IEC publications The technical content of IEC publications is kept under constant review by the IEC.Please make sure that you have
6、 the latest edition,a corrigenda or an amendment might have been published.Useful links:IEC publications search-www.iec.ch/searchpub The advanced search enables you to find IEC publications by a variety of criteria(reference number,text,technical committee,).It also gives information on projects,rep
7、laced and withdrawn publications.IEC Just Published-webstore.iec.ch/justpublished Stay up to date on all new IEC publications.Just Published details all new publications released.Available on-line and also once a month by email.Electropedia-www.electropedia.org The worlds leading online dictionary o
8、f electronic and electrical terms containing more than 30 000 terms and definitions in English and French,with equivalent terms in additional languages.Also known as the International Electrotechnical Vocabulary(IEV)on-line.Customer Service Centre-webstore.iec.ch/csc If you wish to give us your feed
9、back on this publication or need further assistance,please contact the Customer Service Centre:csciec.ch.Copyrighted material licensed to BR Demo by Thomson Reuters(Scientific),Inc.,downloaded on Nov-27-2014 by James Madison.No further reproduction or distribution is permitted.Uncontrolled when prin
10、ted.IEC/TR 62351-10 Edition 1.0 2012-10 TECHNICAL REPORT Power systems management and associated information exchange Data and communications security Part 10:Security architecture guidelines INTERNATIONAL ELECTROTECHNICAL COMMISSION X ICS 33.200 PRICE CODE ISBN 978-2-83220-419-1 Registered trademar
11、k of the International Electrotechnical Commission Warning!Make sure that you obtained this publication from an authorized distributor.colourinsideCopyrighted material licensed to BR Demo by Thomson Reuters(Scientific),Inc.,downloaded on Nov-27-2014 by James Madison.No further reproduction or distri
12、bution is permitted.Uncontrolled when printed.2 TR 62351-10 IEC:2012(E)CONTENTS FOREWORD.4 INTRODUCTION.6 1 Scope.7 2 Normative references.7 3 Terms,definitions and abbreviations.7 Terms and definitions.7 3.1 Abbreviations.7 3.24 Power systems specifics and related standardization.8 Overview.8 4.1 S
13、ecurity specifics.9 4.2 Relevant regulation and standardization activities.11 4.3 Reference architecture for TC 57.15 4.45 Security architecture in power systems.18 General.18 5.1 Security domains and their mapping to power system domains.19 5.2 System interface categories and their mapping to power
14、 systems.21 5.3 Security controls.26 5.4 General.26 5.4.1 Domain mapping of security controls.28 5.4.2 Determination of necessary security controls.30 5.4.3 Network-based security controls.31 5.4.46 Mapping security controls to the TC 57 architecture.34 General.34 6.1 Security domains within a gener
15、ic power system architecture.34 6.2 Application of security controls to a generic power system architecture.35 6.3 Application of security controls to specific power system scenarios.38 6.4 General.38 6.4.1 Substation automation.39 6.4.2 Control center substation communication.41 6.4.3 Advanced mete
16、ring.42 6.4.4 Identified gaps.44 6.5Annex A(informative)Further related material.45 Bibliography.47 Figure 1 Power systems Management of two infrastructures(see Figure 11 of 40).9 Figure 2 Comparison office/power system security requirements.10 Figure 3 Graphical representation of scope and completeness of selected standards(enhanced version of Figure 1 in 4.1 of 4).15 Figure 4 TC 57 reference architecture(see 29).16 Figure 5 Application of TC 57 standards to a power system (see 29,enhanced a