Showing posts with label key management. Show all posts
Showing posts with label key management. Show all posts

Tuesday, June 7, 2016

CDV of IEC 61850-6 Amendment 1 and IEC 62351-9 available for comments


IEC TC 57 has published the following documents for review:

57/1697/CDV
IEC 61850-6 A1: Amendment 1 to IEC 61850-6 Ed.2:Communication networks and systems for power utility automation -
Part 6: Configuration description language for communication in electrical substations related to IEDs

The Amendment incorporates 60 Tissues - listed in the CDV document. You can find easily what has been revised.

57/1699/CDV
IEC 62351-9: Power systems management and associated information exchange - Data and communications security -
Part 9: Cyber security key management for power system equipment

Please take some time to review both documents.
The documents should be available online for reading and for comments.
Check HERE for the access and for providing comments.

Tuesday, March 31, 2015

IEC 62351-9: Cyber Security Key Management for Power System Equipment

IEC TC 57 has published the following draft standard:

IEC 62351-9 Ed.1 (57/1565/CD):
Power systems management and associated information exchange – Data and communications security – Part 9: Cyber security key management for power system equipment

Closing date for comments is 2015-07-03.

IEC 62351-9 specifies how to generate, distribute, revoke, and handle digital certificates and cryptographic keys to protect digital data and its communication. Included in the scope is the handling of asymmetric keys (e.g. private keys and X.509 certificates), as well as symmetric keys (e.g. session keys).
This part assumes that other standards have already chosen the type of keys and cryptography that will be utilized, since the cryptography algorithms and key materials chosen will be typically mandated by an organization’s own local security policies and by the need to be compliant with other international standards. This document therefore specifies only the management techniques for these selected key and cryptography infrastructures. The objective is to define requirements and technologies to achieve interoperability of key management.

Data and communications security are very crucial for the future power delivery system – take the various documents of the series IEC 62351 very serious!

Friday, August 23, 2013

Cyber security key management for power system equipment

IEC TC 57 has just published a new committee draft:57/1388A/CD

IEC 62351-9:
Power systems management and associated information exchange – Data and communications security – Part 9: Cyber security key management for power system equipment

Closing date for comments is: 2013-11-15

Please contact your TC 57 national body to get a copy of the CD.

The present document cancels and replaces the previous document 57/1388/CD and differs merely by the project number IEC 62351-9 (previously IEC TS 62351-9); the document is intended to be issued as an IEC International Standard (IS) and no longer as an IEC Technical Specification (TS).

The normative clauses are:

7 General key management requirements
8 Asymmetric key management
9 Symmetric key management

I highly recommend to review that document to make sure to get a consistent set of requirements applicable for all IEDs in the whole energy market – not only in the electric power delivery system.