SIST EN IEC 62351-4:2019
(Main)Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS and derivatives
Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS and derivatives
1.1 General
This part of IEC 62351 extends the scope of IEC TS 62351-4:2007 [1]1 by specifying a compatibility mode that provides interoperation with implementation based on IEC TS 62351- 4:2007 and by specifying extended capabilities referred to as native mode.
This part of IEC 62351 specifies security requirements both at the transport layer and at the application layer. While IEC TS 62351-4:2007 primarily provided some limited support at the application layer for authentication during handshake for the Manufacturing Message Specification (MMS) based applications, this document also provides support for extended integrity and authentication both for the handshake phase and for the data transfer phase. It provides for shared key management and data transfer encryption at the application layer and it provides security end-to-end (E2E) with zero or more intermediate entities. While IEC TS 62351-4:2007 only provides support for systems based on the MMS, i.e. systems using an Open Systems Interworking (OSI) protocol stack, this document also provides support for application protocols using other protocol stacks, e.g. an Internet protocol suite (see 4.1).
This support is extended to protect application protocols using XML encoding. This extended security at the application layer is referred to as E2E-security.
In addition to E2E security, this part of IEC 62351 also provides mapping to environmental protocols carrying the security related information. Only OSI and XMPP environments are currently considered.
It is intended that this part of IEC 62351 be referenced as a normative part of standards that have a need for using application protocols, e.g., MMS, in a secure manner. It is anticipated that there are implementations, in particular Inter-Control Centre Communications Protocol (ICCP) implementations that are dependent on the IEC TS 62351- 4:2007 specifications of the T-profile and the A-security-profile. The specifications from IEC TS 62351-4:2007 are therefore included in this part of IEC 62351. Implementations supporting these specifications will interwork with implementation based on IEC TS 62351-4:2007.
NOTE The A-security-profile is in the strict sense not a profile, but the term is here kept for historical reasons.
This document represents a set of mandatory and optional security specifications to be implemented to protect application protocols.
The initial audience for this document is the members of the working groups developing or making use of protocols. For the measures described in this part of IEC 62351 to take effect, they shall be accepted and referenced by the specifications for the protocols themselves.
The subsequent audience for this document is the developers of products that implement these protocols and the end user that want to specify requirements for its own environment.
Portions of this document may also be of use to managers and executives in order to understand the purpose and requirements of the work.
Energiemanagementsysteme und zugehöriger Datenaustausch - IT-Sicherheit für Daten und Kommunikation - Teil 4: Profile einschließlich MMS und Ableitungen
Gestion des systèmes de puissance et échanges d'informations associés - Sécurité des communications et des données - Partie 4 : Profils comprenant MMS
IEC 62351:2018 spécifie les exigences de sécurité concernant à la fois la couche transport et la couche application. Alors que l’IEC TS 62351-4:2007 apportait principalement une aide limitée concernant la couche application pour l’authentification lors de l’établissement de liaison des applications fondées sur la messagerie MMS (manufacturing message specification), le présent document fournit également une assistance quant à l’extension de l’intégrité et l’authentification lors des phases d’établissement de liaison et de transfert de données. Il pourvoit à la gestion essentielle partagée et au chiffrement de transfert de données pour la couche application et assure la sécurité bout-à-bout (E2E - end-to-end) avec zéro entité intermédiaire ou plus. Alors que l’IEC TS 62351-4:2007 apporte une assistance uniquement pour les systèmes fondés sur la MMS, c’est-à-dire les systèmes utilisant une pile de protocoles OSI (open systems interworking - interconnexion de systèmes ouverts), le présent document fournit également une assistance quant aux protocoles d’application utilisant d’autres piles de protocoles, par exemple une suite de protocoles Internet (voir 4.1). Cette assistance est étendue afin d’assurer la protection des protocoles d’application utilisant le codage XML. Cette sécurité étendue au niveau de la couche application est appelée sécurité E2E.
En plus de la sécurité E2E, la présente partie de l’IEC 62351 présente également la mise en correspondance avec les protocoles environnementaux comportant les informations concernant la sécurité. Seuls les environnements OSI et XMPP sont actuellement pris en considération.
Upravljanje elektroenergetskega sistema in pripadajoča izmenjava informacij - Varnost podatkov in komunikacij - 4. del: Profili, vključno z MMS in izpeljankami
Ta del standarda IEC 62351 razširja področje uporabe standarda IEC TS 62351-4:2007 [1]1, saj določa način združljivosti, ki zagotavlja interoperabilnost z izvajanjem na podlagi standarda IEC TS 62351-4:2007 in določa razširjene zmogljivosti, imenovane nativni način.
Ta del standarda IEC 62351 določa varnostne zahteve tako na transportni kot na aplikacijski plasti. Medtem ko je IEC TS 62351-4:2007 primarno zagotovil omejeno podporo na aplikacijski plasti za preverjanje pristnosti med rokovanjem z aplikacijami na osnovi MMS (Manufacturing Message Specification), pa ta dokument zagotavlja tudi podporo za razširjeno integriteto in preverjanje pristnosti tako za fazo rokovanja kot za fazo prenosa podatkov. Zagotavlja upravljanje s ključem v skupni rabi, šifriranje prenosa podatkov na aplikacijski plasti in celostno varnost (E2E) z nič ali več vmesnimi enotami. Medtem ko IEC TS 62351-4:2007 zagotavlja podporo samo za sisteme na osnovi MMS, tj. sisteme, ki uporabljajo sklad protokolov OSI (Open Systems Interworking), pa ta dokument zagotavlja tudi podporo za aplikacijske protokole, ki uporabljajo druge sklade protokolov, npr. zbirko internetnih protokolov (glej 4.1)
Ta podpora je razširjena za zaščito aplikacijskih protokolov s kodiranjem XML. Ta razširjena varnost na aplikacijski plasti se imenuje E2E-varnost.
Poleg E2E-varnosti zagotavlja ta del standarda IEC 62351 tudi preslikavo v okoljske protokole, ki vsebujejo informacije v zvezi z varnostjo. Trenutno so obravnavana samo okolja OSI in XMPP.
Ta del standarda IEC 62351 naj bi bil normativni del standardov, v katerih je zahtevana varna uporaba aplikacijskih protokolov, npr. MMS.
Predvidoma obstajajo izvedbe, zlasti izvedbe komunikacijskega protokola ICCP (Inter-Control Centre Communications Protocol), ki so odvisne od specifikacij T-profila in A-varnostnega profila iz standarda IEC TS 62351- 4:2007. Specifikacije iz standarda IEC TS 62351-4:2007 so zato vključene v ta del standarda IEC 62351. Izvedbe, ki podpirajo te specifikacije, se bodo lahko povezovale z izvedbami na podlagi standarda IEC TS 62351-4:2007.
OPOMBA: A-varnostni profil v strogem pomenu besede ni profil, ampak je izraz, ohranjen zaradi zgodovinskih razlogov.
Ta dokument predstavlja niz obveznih in neobveznih varnostnih specifikacij, ki jih je treba uporabiti za zaščito aplikacijskih protokolov.
Namembni uporabniki tega dokumenta so člani delovnih skupin, ki razvijajo ali uporabljajo protokole. Ukrepi, opisani v tem delu standarda IEC 62351, stopijo v veljavo, ko so sprejeti in sklicevani v samih specifikacijah protokolov.
Drugi uporabniki tega dokumenta so lahko tudi razvijalci izdelkov, ki uvajajo te protokole, in končni uporabnik, ki želi določiti zahteve za lastno okolje.
Deli tega dokumenta lahko pomagajo tudi direktorjem in vodjem pri razumevanju namena in zahtev dela.
General Information
- Status
- Published
- Public Enquiry End Date
- 30-Sep-2017
- Publication Date
- 10-Feb-2019
- Technical Committee
- PSE - Power systems management
- Current Stage
- 6060 - National Implementation/Publication (Adopted Project)
- Start Date
- 10-Jan-2019
- Due Date
- 17-Mar-2019
- Completion Date
- 11-Feb-2019
Relations
- Effective Date
- 01-Nov-2020
Overview
EN IEC 62351-4:2018 (IEC 62351-4:2018) defines security profiles and requirements for protecting application and transport communications used in power systems management and associated information exchange. It extends IEC TS 62351-4:2007 by adding a compatibility mode (for interoperation with the 2007 T‑profile/A‑security-profile) and a more capable native mode that provides extended integrity, authentication and end-to-end (E2E) security for Manufacturing Message Specification (MMS) and other application protocols (including XML-encoded protocols). The standard covers security at both the transport layer (T-security) and the application layer (A-security/E2E-security), plus mappings for operational environments such as OSI and XMPP.
Key Topics and Requirements
- Transport security (TLS): guidance for applying TLS for secure sessions, including session resumption, renegotiation, cipher suite considerations, ports and disabling options.
- Application-layer (E2E) security: authentication and integrity for both handshake and data transfer phases; support for shared key management and application-layer encryption.
- Compatibility and native modes: ensures interoperability with implementations based on IEC TS 62351-4:2007 while offering enhanced native capabilities.
- Protocols supported: MMS-based OSI stacks and also protocols running over Internet stacks (TCP/IP), including protection for XML-encoded application protocols.
- Certificate and key handling: public-key certificate validation, trust anchors, certificate size and revocation evaluation periods are considered.
- Profiles and mappings: includes the historic A‑security‑profile and T‑profile (for legacy ICCP/IEC 60870-6 implementations) and mapping to environmental protocols (OSI, XMPP).
- Security controls and logging: threat/attack countermeasures, required logging and event handling to support secure operation and incident response.
- Audience & normative use: intended for standards that reference secure application protocols and for implementers and end users specifying security requirements.
Applications and Who Uses It
EN IEC 62351-4:2018 is used to secure communications in electrical utilities and industrial automation:
- Secure ICCP / IEC 60870-6 communications between control centers
- MMS-based substation automation and IEC 61850-related systems
- SCADA, EMS, and DMS vendor implementations requiring application-layer E2E security
- System integrators, product developers, cybersecurity engineers and utility security managers who must implement or specify robust data and communications security
Related Standards
- IEC 62351 series (Parts 1, 2, 3, 8, 9)
- IEC TS 62351-4:2007 (legacy compatibility)
- IEC 61850, ICCP / IEC 60870-6
- Relevant IETF and ITU-T standards for TLS, XMPP and ASN.1/XER encoding
This standard is essential for anyone implementing or specifying secure power‑system communication profiles, ensuring interoperability and robust application- and transport-level protection.
Frequently Asked Questions
SIST EN IEC 62351-4:2019 is a standard published by the Slovenian Institute for Standardization (SIST). Its full title is "Power systems management and associated information exchange - Data and communications security - Part 4: Profiles including MMS and derivatives". This standard covers: 1.1 General This part of IEC 62351 extends the scope of IEC TS 62351-4:2007 [1]1 by specifying a compatibility mode that provides interoperation with implementation based on IEC TS 62351- 4:2007 and by specifying extended capabilities referred to as native mode. This part of IEC 62351 specifies security requirements both at the transport layer and at the application layer. While IEC TS 62351-4:2007 primarily provided some limited support at the application layer for authentication during handshake for the Manufacturing Message Specification (MMS) based applications, this document also provides support for extended integrity and authentication both for the handshake phase and for the data transfer phase. It provides for shared key management and data transfer encryption at the application layer and it provides security end-to-end (E2E) with zero or more intermediate entities. While IEC TS 62351-4:2007 only provides support for systems based on the MMS, i.e. systems using an Open Systems Interworking (OSI) protocol stack, this document also provides support for application protocols using other protocol stacks, e.g. an Internet protocol suite (see 4.1). This support is extended to protect application protocols using XML encoding. This extended security at the application layer is referred to as E2E-security. In addition to E2E security, this part of IEC 62351 also provides mapping to environmental protocols carrying the security related information. Only OSI and XMPP environments are currently considered. It is intended that this part of IEC 62351 be referenced as a normative part of standards that have a need for using application protocols, e.g., MMS, in a secure manner. It is anticipated that there are implementations, in particular Inter-Control Centre Communications Protocol (ICCP) implementations that are dependent on the IEC TS 62351- 4:2007 specifications of the T-profile and the A-security-profile. The specifications from IEC TS 62351-4:2007 are therefore included in this part of IEC 62351. Implementations supporting these specifications will interwork with implementation based on IEC TS 62351-4:2007. NOTE The A-security-profile is in the strict sense not a profile, but the term is here kept for historical reasons. This document represents a set of mandatory and optional security specifications to be implemented to protect application protocols. The initial audience for this document is the members of the working groups developing or making use of protocols. For the measures described in this part of IEC 62351 to take effect, they shall be accepted and referenced by the specifications for the protocols themselves. The subsequent audience for this document is the developers of products that implement these protocols and the end user that want to specify requirements for its own environment. Portions of this document may also be of use to managers and executives in order to understand the purpose and requirements of the work.
1.1 General This part of IEC 62351 extends the scope of IEC TS 62351-4:2007 [1]1 by specifying a compatibility mode that provides interoperation with implementation based on IEC TS 62351- 4:2007 and by specifying extended capabilities referred to as native mode. This part of IEC 62351 specifies security requirements both at the transport layer and at the application layer. While IEC TS 62351-4:2007 primarily provided some limited support at the application layer for authentication during handshake for the Manufacturing Message Specification (MMS) based applications, this document also provides support for extended integrity and authentication both for the handshake phase and for the data transfer phase. It provides for shared key management and data transfer encryption at the application layer and it provides security end-to-end (E2E) with zero or more intermediate entities. While IEC TS 62351-4:2007 only provides support for systems based on the MMS, i.e. systems using an Open Systems Interworking (OSI) protocol stack, this document also provides support for application protocols using other protocol stacks, e.g. an Internet protocol suite (see 4.1). This support is extended to protect application protocols using XML encoding. This extended security at the application layer is referred to as E2E-security. In addition to E2E security, this part of IEC 62351 also provides mapping to environmental protocols carrying the security related information. Only OSI and XMPP environments are currently considered. It is intended that this part of IEC 62351 be referenced as a normative part of standards that have a need for using application protocols, e.g., MMS, in a secure manner. It is anticipated that there are implementations, in particular Inter-Control Centre Communications Protocol (ICCP) implementations that are dependent on the IEC TS 62351- 4:2007 specifications of the T-profile and the A-security-profile. The specifications from IEC TS 62351-4:2007 are therefore included in this part of IEC 62351. Implementations supporting these specifications will interwork with implementation based on IEC TS 62351-4:2007. NOTE The A-security-profile is in the strict sense not a profile, but the term is here kept for historical reasons. This document represents a set of mandatory and optional security specifications to be implemented to protect application protocols. The initial audience for this document is the members of the working groups developing or making use of protocols. For the measures described in this part of IEC 62351 to take effect, they shall be accepted and referenced by the specifications for the protocols themselves. The subsequent audience for this document is the developers of products that implement these protocols and the end user that want to specify requirements for its own environment. Portions of this document may also be of use to managers and executives in order to understand the purpose and requirements of the work.
SIST EN IEC 62351-4:2019 is classified under the following ICS (International Classification for Standards) categories: 29.240.30 - Control equipment for electric power systems; 35.240.50 - IT applications in industry. The ICS classification helps identify the subject area and facilitates finding related standards.
SIST EN IEC 62351-4:2019 has the following relationships with other standards: It is inter standard links to SIST EN IEC 62351-4:2019/A1:2020. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase SIST EN IEC 62351-4:2019 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of SIST standards.
Standards Content (Sample)
SLOVENSKI STANDARD
01-marec-2019
8SUDYOMDQMHHOHNWURHQHUJHWVNHJDVLVWHPDLQSULSDGDMRþDL]PHQMDYDLQIRUPDFLM
9DUQRVWSRGDWNRYLQNRPXQLNDFLMGHO3URILOLYNOMXþQR]006LQL]SHOMDQNDPL
Power systems management and associated information exchange - Data and
communications security - Part 4: Profiles including MMS and derivatives
Energiemanagementsysteme und zugehöriger Datenaustausch - IT-Sicherheit für Daten
und Kommunikation - Teil 4: Profile einschließlich MMS und Ableitungen
Gestion des systèmes de puissance et échanges d'informations associés - Sécurité des
communications et des données - Partie 4 : Profils comprenant MMS
Ta slovenski standard je istoveten z: EN IEC 62351-4:2018
ICS:
29.240.30 Krmilna oprema za Control equipment for electric
elektroenergetske sisteme power systems
35.240.50 Uporabniške rešitve IT v IT applications in industry
industriji
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
EUROPEAN STANDARD EN IEC 62351-4
NORME EUROPÉENNE
EUROPÄISCHE NORM
December 2018
ICS 33.200
English Version
Power systems management and associated information
exchange - Data and communications security - Part 4: Profiles
including MMS and derivatives
(IEC 62351-4:2018)
Gestion des systèmes de puissance et échanges Energiemanagementsysteme und zugehöriger
d'informations associés - Sécurité des communications et Datenaustausch - IT-Sicherheit für Daten und
des données - Partie 4 : Profils comprenant MMS Kommunikation - Teil 4: Profile einschließlich MMS und
(IEC 62351-4:2018) Ableitungen
(IEC 62351-4:2018)
This European Standard was approved by CENELEC on 2018-12-20. CENELEC members are bound to comply with the CEN/CENELEC
Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration.
Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC
Management Centre or to any CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by translation
under the responsibility of a CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the
same status as the official versions.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,
Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia,
Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden,
Switzerland, Turkey and the United Kingdom.
European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2018 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.
Ref. No. EN IEC 62351-4:2018 E
European foreword
The text of document 57/2032/FDIS, future edition 1 of IEC 62351-4, prepared by IEC/TC 57 "Power
systems management and associated information exchange" was submitted to the IEC-CENELEC
parallel vote and approved by CENELEC as EN IEC 62351-4:2018.
The following dates are fixed:
• latest date by which the document has to be implemented at national (dop) 2019-09-20
level by publication of an identical national standard or by endorsement
• latest date by which the national standards conflicting with the (dow) 2021-12-20
document have to be withdrawn
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CENELEC shall not be held responsible for identifying any or all such patent rights.
Endorsement notice
The text of the International Standard IEC 62351-4:2018 was approved by CENELEC as a European
Standard without any modification.
In the official version, for Bibliography, the following notes have to be added for the standards
indicated:
IEC 60870-6-503:2014 NOTE Harmonized as EN 60870-6-503:2014 (not modified)
IEC 60870-6-702:2014 NOTE Harmonized as EN 60870-6-702:2014 (not modified)
IEC 60870-6-802:2014 NOTE Harmonized as EN 60870-6-802:2014 (not modified)
Annex ZA
(normative)
Normative references to international publications
with their corresponding European publications
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments)
applies.
NOTE 1 Where an International Publication has been modified by common modifications, indicated by (mod), the relevant
EN/HD applies.
NOTE 2 Up-to-date information on the latest versions of the European Standards listed in this annex is available here:
www.cenelec.eu.
Publication Year Title EN/HD Year
IEC/TS 62351-1 - Power systems management and associated - -
information exchange - Data and communications
security - Part 1: Communication network and
system security - Introduction to security issues
IEC/TS 62351-2 - Power systems management and associated - -
information exchange - Data and communications
security - Part 2: Glossary of terms
IEC 62351-3 2014 Power systems management and associated EN 62351-3 2014
information exchange - Data and communications
security - Part 3: Communication network and
system security - Profiles including TCP/IP
+A1 2018 +A1 2018
IEC/TS 62351-8 2011 Power systems management and associated - -
information exchange - Data and communications
security - Part 8: Role-based access control
IEC 62351-9 2017 Power systems management and associated EN 62351-9 2017
information exchange - Data and communications
security - Part 9: Cyber security key management for
power system equipment
ISO/IEC 8073 1997 Information technology - Open Systems - -
Interconnection - Protocol for providing the
connection-mode transport service
ISO/IEC 8823-1 1994 Information technology - Open Systems - -
Interconnection - Connection-oriented presentation
protocol: Protocol specification
ISO/IEC 8824-1 - Information technology - Abstract Syntax Notation - -
One (ASN.1): Specification of basic notation
ISO/IEC 8825-1 - Information technology - ASN.1 encoding rules: - -
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER)
ISO/IEC 8825-4 - Information technology - ASN.1 encoding rules: XML - -
Encoding Rules (XER)
ISO 8601 2004 Data elements and interchange formats - - -
Information interchange - Representation of dates
and times
ISO 9506-2 2003 Industrial automation systems - Manufacturing - -
Message Specification - Part 2: Protocol
specification
ISO/IEC 9594-8 - Information technology - Open Systems - -
Interconnection - The Directory - Part 8: Public-key
and attribute certificate frameworks
ITU-T - Information technology - Open Systems - -
Recommendation Interconnection - Connection-oriented protocol for
X.227 the Association Control Service Element: Protocol
specification
+ A1 - - -
IETF RFC 1006 1987 ISO Transport Service on top of the TCP, Version: 3 - -
IETF RFC 2104 1997 HMAC: Keyed-Hashing for Message Authentication - -
IETF RFC 3526 2003 More Modular Exponential (MODP) Diffie-Hellman - -
groups for Internet Key Exchange (IKE)
IETF RFC 5114 2003 Additional Diffie-Hellman Groups for Use with IETF - -
Standards
IETF RFC 5246 2008 The Transport Layer Security (TLS) Protocol Version - -
1.2
IETF RFC 5480 2009 Elliptic Curve Cryptography Subject Public Key - -
Information
IETF RFC 5639 2010 Elliptic Curve Cryptography (ECC) Brainpool - -
Standard Curves and Curve Generation
IETF RFC 5869 2010 HMAC-based Extract-and-Expand Key Derivation - -
Function
IETF RFC 6120 2011 Extensible Messaging and Presence Protocol - -
(XMPP): Core
IETF RFC 6122 2011 Extensible Messaging and Presence Protocol - -
(XMPP): Address Format
IEC 62351-4 ®
Edition 1.0 2018-11
INTERNATIONAL
STANDARD
colour
inside
Power systems management and associated information exchange – Data and
communications security –
Part 4: Profiles including MMS and derivatives
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
ICS 33.200 ISBN 978-2-8322-6262-7
– 2 – IEC 62351-4:2018 © IEC 2018
CONTENTS
FOREWORD . 8
1 Scope . 10
1.1 General . 10
1.2 Code components . 11
2 Normative references . 11
3 Terms, definitions and abbreviated terms . 12
3.1 General . 12
3.2 Terms and definitions . 13
3.3 Abbreviated terms . 16
4 Security issues addressed by this part of IEC 62351 . 17
4.1 Communications reference models . 17
4.2 Security for application and transport profiles . 18
4.3 Compatibility and native modes. 19
4.4 Security threats countered . 19
4.4.1 General . 19
4.4.2 Threats countered in compatibility mode . 20
4.4.3 Threats countered in native mode . 20
4.5 Attack methods countered . 20
4.5.1 General . 20
4.5.2 Attacks countered in compatibility mode . 20
4.5.3 Attacks countered in native mode . 20
4.6 Logging . 21
5 Specific requirements . 21
5.1 Specific requirements for ICCP/IEC 60870-6-x communication stack . 21
5.2 Specific requirements for IEC 61850 . 22
6 Transport Security . 22
6.1 General . 22
6.2 Application of transport layer security (TLS) . 22
6.2.1 General . 22
6.2.2 The TLS cipher suite concept . 23
6.2.3 TLS session resumption . 23
6.2.4 TLS session renegotiation . 23
6.2.5 Supported number of trust anchors . 23
6.2.6 Public-key certificate size . 23
6.2.7 Evaluation period for revocation state of public-key certificates . 23
6.2.8 Public-key certificate validation . 24
6.2.9 Security events handling . 24
6.3 T-security in an OSI operational environment . 24
6.3.1 General . 24
6.3.2 TCP ports . 24
6.3.3 Disabling of TLS . 25
6.3.4 TLS cipher suites support . 25
6.4 T-security in an XMPP operational environment . 26
7 Application layer security overview (informative) . 26
7.1 General . 26
7.2 Description techniques . 27
IEC 62351-4:2018 © IEC 2018 – 3 –
7.2.1 General . 27
7.2.2 ASN.1 as an XML schema definition . 27
7.2.3 W3C XML Schema Definition (W3C XSD) . 28
7.2.4 XML namespace . 28
8 Use of cryptographic algorithms . 28
8.1 General . 28
8.2 Basic cryptographic definitions . 28
8.3 Public-key algorithms . 29
8.4 Hash algorithms . 30
8.5 Signature algorithms . 30
8.6 Symmetric encryption algorithms used for encryption only . 30
8.7 Authenticated encryption algorithms . 31
8.8 Integrity check value algorithms . 31
9 Object identifier allocation (normative) . 32
10 General OSI upper layer requirements (normative) . 32
10.1 Overview. 32
10.2 General on OSI upper layer requirements . 33
10.3 Session protocol requirements . 33
10.4 Presentation protocol requirements . 34
10.4.1 Context list . 34
10.4.2 Abstract syntaxes . 34
10.4.3 Presentation user data . 34
10.4.4 ASN.1 encoding requirements . 35
10.5 Association control service element (ACSE) protocol requirements . 36
10.5.1 General . 36
10.5.2 Protocol version . 36
10.5.3 Titles . 36
10.5.4 Use of ASN.1 EXTERNAL data type . 36
11 A-security-profile (normative) . 37
11.1 OSI requirements specific to A-security profile . 37
11.1.1 General . 37
11.1.2 Additional session protocol requirements . 37
11.1.3 Additional presentation protocol requirement . 37
11.1.4 Additional ACSE requirements . 37
11.2 MMS Authentication value . 39
11.2.1 General . 39
11.2.2 MMS-Authentication value data type . 39
11.2.3 Handling of the association request (AARQ-apdu) . 40
11.2.4 Handling of the association result (AARE-apdu) . 40
12 End-to-end application security model . 41
12.1 Introduction and general architecture . 41
12.2 Abstract syntax specifications . 42
12.2.1 General . 42
13 End-to-end application security (normative) . 43
13.1 Association management . 43
13.1.1 General concept . 43
13.1.2 UTC time specification . 43
13.1.3 Handshake request . 43
– 4 – IEC 62351-4:2018 © IEC 2018
13.1.4 Handshake accept . 44
13.1.5 Association reject by the protected protocol . 45
13.1.6 Association reject due to security issues. 45
13.1.7 Handshake security abort . 46
13.1.8 Data transfer security abort . 46
13.1.9 Abort by protected protocol . 46
13.1.10 Association release request . 47
13.1.11 Association release response . 47
13.2 Data transfer phase . 47
13.2.1 General . 47
13.2.2 Clear data transfer . 48
13.2.3 Encrypted data transfer . 48
13.3 ClearToken data types . 49
13.3.1 The ClearToken1 data type . 49
13.3.2 The ClearToken2 data type . 53
13.3.3 The ClearToken3 data type . 54
13.4 Authentication and integrity specifications . 55
13.4.1 The Signature data type . 55
13.4.2 The authenticator data type . 55
14 E2E security error handling (normative) . 56
14.1 General . 56
14.2 Specification of diagnostics . 56
14.2.1 Handshake diagnostics . 56
14.2.2 The data transfer diagnostics . 57
14.3 Checking of E2E-security handshake request and accept . 58
14.3.1 General . 58
14.3.2 Signature checking . 58
14.3.3 Protected protocol identity checking . 59
14.3.4 ClearToken1 checking . 59
14.4 Checking of security protocol control information during data transfer . 60
14.4.1 General . 60
14.4.2 Authenticator checking . 60
14.4.3 Checks of the ClearToken2 value . 60
15 E2E security used in an OSI operational environment . 61
15.1 General . 61
15.2 Additional upper layer requirements . 61
15.2.1 Additional presentation layer requirements . 61
15.2.2 Additional ACSE requirements . 61
15.3 Association management in an OSI operational environment . 62
15.3.1 General . 62
15.3.2 Mapping to ACSE association request . 62
15.3.3 Mapping to ACSE association response . 62
15.3.4 Mapping to ACSE abort . 63
15.3.5 Mapping to ACSE release request . 64
15.3.6 Mapping to ACSE release response . 64
15.4 Data transfer in OSI operational environment . 64
15.4.1 General . 64
15.4.2 Mapping of the clear data transfer SecPDU . 64
15.4.3 Mapping of the encrypted data transfer SecPDU . 65
IEC 62351-4:2018 © IEC 2018 – 5 –
15.5 OSI upper layer routing . 65
15.6 OSI operational environment checking . 66
15.6.1 General checking . 66
15.6.2 Environment mapping checking . 66
15.6.3 OSI operational environment diagnostics . 67
16 E2E security used in in an XMPP operational environment . 67
16.1 General on wrapping to an XMPP operational environment . 67
16.2 Mapping of SecPDUs to iq stanzas . 68
16.3 Mapping of SecPDUs to message stanzas . 69
16.4 XMPP stanza error handling . 69
16.5 XML namespaces . 70
16.6 Encoding of EnvPDUs within XMPP stanzas . 70
16.7 Multiple associations . 71
16.8 Release collision consideration . 71
17 Conformance to this document . 71
17.1 General . 71
17.2 Notation . 71
17.3 Conformance to operational environment . 71
17.4 Conformance to modes of operation . 72
17.5 Conformance to compatibility mode . 72
17.6 Conformance to native mode . 73
Annex A (normative) Formal ASN.1 specification for the A-security-profile . 75
Annex B (normative) Formal ASN.1 specification for the End-to-End security. 76
Annex C (normative) Formal W3C XSD specification for the end-to-end security . 82
Annex D (normative) ASN.1 module for OSI operational environment . 89
D.1 Scope of annex . 89
D.2 ASN.1 module . 89
Annex E (normative) ASN.1 modules and W3C XSDs for an XMPP operational
environment . 91
E.1 Scope of Annex . 91
E.2 ASN.1 modules for the XMPP operational environment . 91
E.2.1 ASN.1 module for the urn:ietf:params:xml:ns:xmpp-stanzas XML
namespace . 91
E.2.2 ASN.1 module for the http://www.iec.ch/62351/2018/ENV_4 XML
namespace . 91
E.3 W3C XSDs for the XMPP operational environment . 93
E.3.1 W3C XSD for the urn:ietf:params:xml:ns:xmpp-stanzas XML namespace . 93
E.3.2 W3C XSD for the http://www.iec.ch/62351/2018/ENV_4 XML
namespace . 94
Annex F (normative) Template for virtual API specifications . 96
F.1 General . 96
F.2 ASN.1 virtual API specification . 97
F.3 W3C XSD virtual API specification . 97
Annex G (normative) End-entity public-key certificate specification . 98
G.1 Scope of annex . 98
G.2 General requirement . 98
G.3 Length considerations . 98
G.4 Basic Structure requirement and recommendations . 98
G.4.1 Version component . 98
– 6 – IEC 62351-4:2018 © IEC 2018
G.4.2 Serial number component . 98
G.4.3 Issuer signature algorithm component . 98
G.4.4 Issuer component . 99
G.4.5 Validity component . 99
G.4.6 Subject component . 99
G.4.7 Subject public key Information component . 99
G.4.8 Issuer unique ID and subject unique ID components . 100
G.5 Extensions . 100
G.5.1 General . 100
G.5.2 Key usage extension . 100
G.5.3 Revocation checking . 100
G.5.4 IEC user role information extension . 101
G.6 Specific requirements for operational environments . 101
G.6.1 General . 101
G.6.2 OSI operational environment . 101
G.6.3 XMPP operational environment . 101
Annex H (normative) Lower layer requirements for the OSI operational environment . 102
H.1 Scope of annex . 102
H.2 Transport protocol class 0 . 102
H.2.1 Enforcement of maximum lengths . 102
H.2.2 Response to Class 0 unsupported TPDUs . 102
H.2.3 Transport selectors . 102
H.3 IETF RFC 1006 . 103
H.3.1 General . 103
H.3.2 Version number . 103
H.3.3 Length . 103
H.3.4 Keep-alive . 103
Annex I (informative) ASN.1 definition of ACSE . 104
Bibliography . 108
Figure 1 – Application and transport profiles (informative) . 18
Figure 2 – T-profiles without and with TLS protection . 24
Figure 3 – Association establishment . 33
Figure 4 – Inclusion of User-data in SESSION DATA TRANFER SPDU . 35
Figure 5 – E2E security building blocks . 41
Figure 6 – Relationship between environment, E2E-security and protected protocol . 41
Figure 7 – Relationships between APDUs . 42
Figure 8 – The scope of E2E-security specification . 42
Figure 9 – Upper layer routing . 65
Figure F.1 – Virtual API concept . 96
Table 1 – Relationship between security and security measure combinations . 19
Table 2 – Commented recommended cipher suites from IEC TS 62351-4:2007 . 25
Table 3 – Cipher suites combinations in the context of this document . 26
Table 4 – Mapping of SecPDUs to ACSE APDUs . 62
Table 5 – Mapping of SecPDUs to XMPP stanzas . 68
IEC 62351-4:2018 © IEC 2018 – 7 –
Table 6 – Conformance to operational environment . 72
Table 7 – Conformance to modes of operation . 72
Table 8 – Conformance to compatibility mode . 72
Table 9 – Conformance to TLS cipher suites in compatibility mode . 73
Table 10 – Conformance to native mode . 73
Table 11 – Conformance to mode of encryption . 73
Table 12 – Conformance to TLS cipher suites in native mode . 74
Table 13 – Conformance to cryptographic algorithms for E2E-security . 74
Table H.1 – TP class 0 maximum sizes . 102
– 8 – IEC 62351-4:2018 © IEC 2018
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
POWER SYSTEMS MANAGEMENT AND
ASSOCIATED INFORMATION EXCHANGE –
DATA AND COMMUNICATIONS SECURITY –
Part 4: Profiles including MMS and derivatives
FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
International Standard IEC 62351-4 has been prepared by IEC technical committee 57: Power
systems management and associated exchange.
The text of this standard is based on the following documents:
FDIS Report on voting
57/2032/FDIS 57/2053/RVD
Full information on the voting for the approval of this standard can be found in the report on
voting indicated in the above table.
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2.
IEC 62351-4:2018 © IEC 2018 – 9 –
A list of all parts in the IEC 62351 series, published under the general title Power systems
management and associated information exchange – Data and communications security, can
be found on the IEC website.
This IEC standard includes Code Components i.e. components that are intended to be directly
processed by a computer. Such content is any text found between the markers
BEGINS> and , or otherwise is clearly labelled in this standard as a Code
Component.
The purchase of this IEC standard carries a copyright license for the purchaser to sell
software containing Code Components from this standard to end users either directly or via
distributors, subject to IEC software licensing conditions, which can be found at:
www.iec.ch/CCv1.
In this document the following print types are used:
– Abstract Syntax Notation One (ASN.1) and W3C XML Schema Definition (W3C XSD)
notions are presented in bold Courier New typeface; and
– when ASN.1 types and values are referenced in normal text, they are differentiated from
normal text by presenting them in bold Courier New typeface.
A list of all parts in the IEC 62351 series, published under the general title Power systems
management and associated information exchange – Data and communications security, can
be found on the IEC website.
The committee has decided that the contents of this publication will remain unchanged until
the stability date indicated on the IEC web site under "http://webstore.iec.ch" in the data
related to the specific publication. At this date, the publication will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
A bilingual version of this publication may be issued at a later date.
IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates
that it contains colours which are considered to be useful for the correct
understanding of its contents. Users should therefore print this document using a
colour printer.
– 10 – IEC 62351-4:2018 © IEC 2018
POWER SYSTEMS MANAGEMENT AND
ASSOCIAT
...
제목: SIST EN IEC 62351-4:2019 - 전력 시스템 관리 및 연결된 정보 교환 - 데이터와 통신 보안 - 부분 4: MMS 및 파생물을 포함한 프로파일 내용: 이 IEC 62351의 일부는 IEC TS 62351-4:2007 [1]1 의 범위를 확장하여, IEC TS 62351-4:2007을 기반으로 한 구현과의 상호 운용성을 제공하는 호환성 모드를 지정하고, 내장된 모드에 해당하는 확장 기능을 지정함으로써 범위를 확장시킵니다. 이 IEC 62351의 일부는 전송 레이어 및 응용 레이어의 보안 요구 사항을 지정합니다. IEC TS 62351-4:2007은 제조 메시지 사양 (MMS) 기반 응용 프로그램의 핸드셰이크를 위한 인증의 제한적인 지원을 주로 제공했으나, 이 문서는 핸드셰이크 단계와 데이터 전송 단계 모두에 대한 확장 무결성 및 인증을 지원합니다. 응용 레이어에서 공유 키 관리 및 데이터 전송 암호화를 제공하며, 0개 이상의 중간 엔티티를 통해 엔드 투 엔드 (E2E) 보안을 제공합니다. IEC TS 62351-4:2007은 MMS를 기반으로 하는 시스템에만 지원을 제공하며, OSI (Open Systems Interworking) 프로토콜 스택을 사용하는 시스템에 대한 지원도 제공합니다. 이러한 지원은 XML 인코딩을 사용하는 응용 프로토콜의 보호도 확장됩니다. 이 응용 레이어에서의 확장된 보안은 E2E 보안이라고 합니다. 이 IEC 62351의 일부는 환경 프로토콜에 대한 보안 관련 정보의 매핑도 제공합니다. 현재는 OSI 및 XMPP 환경만 고려되고 있습니다. 이 IEC 62351의 일부는 응용 프로토콜 (예: MMS)을 안전하게 사용하기 위해 필요한 표준의 일부로 참조되도록 의도되었습니다. 기존 IEC TS 62351-4:2007 사양에 의존하는 구현 (특히 Inter-Control Centre Communications Protocol (ICCP) 구현)이 예상되므로, IEC TS 62351-4:2007의 T-프로파일 및 A-보안-프로파일 사양이 이 IEC 62351의 일부에 포함되었습니다. 이러한 사양을 지원하는 구현은 IEC TS 62351-4:2007을 기반으로 한 구현과 상호 운용할 수 있습니다. 참고로, A-보안-프로파일은 엄밀히 말해 프로파일이 아니지만, 역사적인 이유로 여기에 이 용어를 사용하고 있습니다. 이 문서는 응용 프로토콜을 보호하기 위해 구현해야 할 필수 및 선택적인 보안 사양의 집합을 나타냅니다. 이 문서의 초기 대상은 프로토콜을 개발하거나 사용하는 워킹 그룹의 구성원입니다. 이 IEC 62351의 조치가 적용되기 위해서는 프로토콜 자체의 사양에서 받아들여지고 참조되어야 합니다. 이 문서의 후속 대상은 해당 프로토콜을 구현하는 제품 개발자와 자신의 환경에 대한 요구 사항을 지정하려는 최종 사용자입니다. 이 작업의 목적과 요구 사항을 이해하기 위해 관리자 및 임원에게도 이 문서의 일부가 유용할 수 있습니다.
The article discusses the SIST EN IEC 62351-4:2019 standard, which is related to power systems management and data and communications security. It extends the scope of a previous version of the standard by providing interoperation with older implementations and specifying extended security capabilities. The standard specifies security requirements at both the transport layer and application layer. It supports authentication, integrity, and encryption during the handshake and data transfer phases. The standard also provides security for application protocols using different protocol stacks, including XML encoding. It includes mappings to environmental protocols such as OSI and XMPP. The standard is intended to be referenced in other standards that require secure usage of application protocols. It includes specifications from a previous version of the standard to ensure compatibility with existing implementations. The target audience for this document includes working groups developing or using protocols, developers of products implementing the protocols, end users specifying requirements, and managers and executives seeking to understand the purpose and requirements of the standard.
記事タイトル: SIST EN IEC 62351-4:2019 - 電力システム管理と関連情報交換 - データと通信のセキュリティ - パート4:MMSおよび派生物を含むプロファイル 記事内容: 本記事では、IEC 62351の一部であるSIST EN IEC 62351-4:2019の標準について説明しています。この標準は、IEC TS 62351-4:2007 [1]1の範囲を拡張し、IEC TS 62351-4:2007に基づいた既存の実装との相互運用性を提供する互換性モードを指定し、ネイティブモードと呼ばれる拡張機能も指定しています。 このIEC 62351の一部は、輸送層およびアプリケーション層のセキュリティ要件を指定しています。IEC TS 62351-4:2007は、主に製造メッセージ仕様(MMS)ベースのアプリケーションのハンドシェイク時の認証に限定的なサポートを提供していましたが、本文書ではハンドシェイクフェーズとデータ転送フェーズの両方での拡張された整合性と認証をサポートしています。アプリケーション層での共有鍵管理とデータ転送の暗号化を提供し、ゼロまたは複数の中間エンティティを介してエンドツーエンド(E2E)のセキュリティを提供します。IEC TS 62351-4:2007は、OSI(オープンシステムインターワーキング)プロトコルスタックを使用するシステムにしか対応していませんでしたが、本文書では他のプロトコルスタック(例:インターネットプロトコルスイート)を使用するアプリケーションプロトコルにも対応しています。このサポートは、XMLエンコーディングを使用するアプリケーションプロトコルの保護も拡張されます。このアプリケーション層での拡張セキュリティはE2Eセキュリティと呼ばれています。 IEC 62351のこの一部は、セキュリティ関連情報を保持する環境プロトコルへのマッピングも提供します。現在はOSIとXMPPの環境のみを考慮しています。 このIEC 62351の一部は、安全なアプリケーションプロトコルの使用を必要とする他の標準で参照されることを意図しています。既存の実装との互換性を確保するため、IEC TS 62351-4:2007の仕様も含まれています。これらの仕様をサポートする実装は、IEC TS 62351-4:2007に基づいた実装とも相互運用します。 このドキュメントは、アプリケーションプロトコルを保護するために実装すべき必須およびオプションのセキュリティ仕様のセットを表しています。 このドキュメントの最初の対象者は、プロトコルを開発または使用する作業グループのメンバーです。本IEC 62351の対策が効果を上げるためには、プロトコルの仕様自体がこれらの対策を受け入れて参照する必要があります。 その後の対象者は、これらのプロトコルを実装する製品の開発者と、独自の環境の要件を指定したいエンドユーザーです。本作業の目的と要件を理解するために、マネージャーや幹部にとってもこのドキュメントの一部が役に立つ場合があります。










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...