BSI PD IEC TS 62351-100-4:2023
$215.11
Power systems management and associated information exchange. Data and communication security – Cybersecurity conformance testing for IEC 62351-4
Published By | Publication Date | Number of Pages |
BSI | 2023 | 112 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
4 | CONTENTS |
8 | FOREWORD |
10 | INTRODUCTION |
11 | 1 Scope 2 Normative references |
12 | 3 Terms, definitions, and abbreviated terms 3.1 Terms and definitions |
13 | 3.2 Abbreviated terms 4 Application structure and information flow 4.1 Overview |
14 | 4.2 Application entity structure Figures Figure 1 – Application entity structure and information flow Figure 2 – Relationships between APDUs |
15 | 4.3 Relationship to test structure Figure 3 – Structure for test specifications |
16 | 5 General 5.1 General guidelines 5.2 Test methodology 5.2.1 General 5.2.2 Normal procedure tests and resiliency tests 5.2.3 SubClass descriptions |
17 | 5.3 Conformance testing requirements 5.3.1 Testing within the context of an application 5.3.2 Requirements for the device under test 5.3.3 Requirements for the test facility |
18 | 5.3.4 Test Validation 5.4 PICS |
19 | 5.5 PIXIT Tables Table 1 – PIXIT for Base Profile |
20 | 5.6 Tests cases Table 2 – PIXIT for Secure Communication |
21 | Table 3 – IEC 62351-4:2018/AMD1:2020 E2E Compliancy Testing (IEC 61850-8-1 and ICCP) |
23 | Table 4 – IEC 62351-4:2018/AMD1:2020 E2E Compliancy Testing (IEC 61850-8-2) |
24 | 6 E2E conformity testing in an OSI environment 6.1 Conformance tables for E2E OSI-security profile |
25 | Table 5 – Base Profile – E2E Security Table 6 – Protocol Handshake – E2E Security Table 7 – IEC 61850 Application Association – E2E Security Table 8 – OSI EnvPDU Supported – E2E Security Table 9 – OSI EnvPDU Subclass Supported – E2E Security |
26 | Table 10 – E2E SecPDU Subclass Supported Table 11 – OSI Mode of encryption – E2E Security Table 12 – Cryptographic algorithms – E2E Security |
27 | 6.2 E2E Test Procedures for OSI environment 6.2.1 Association Management Table 13 – ASN.1 Objects – E2E Security |
28 | Table 14 – Verification of Client handshake request procedure in OSI environment |
29 | Table 15 – Verification of Server handshake request procedure in OSI environment |
30 | Table 16 – Handshake request resiliency procedure in OSI environment – Client |
31 | 6.2.2 Clear Data Transfer Table 17 – Handshake request resiliency procedure in OSI environment – Server |
32 | Table 18 – Verification of requirements for OSI environment security – Clear Data transfer Table 19 – Clear Data Transfer resiliency procedure in OSI environment – Client |
33 | 6.2.3 Encrypted Data Transfer Table 20 – Clear Data Transfer resiliency procedure in OSI environment – Server |
34 | Table 21 – Verification of requirements for OSI environment security – Encrypted data transfer |
35 | Table 22 – Resiliency testing for client – Encrypted data transfer |
36 | 6.2.4 Rekey Table 23 – Resiliency testing for server – Encrypted data transfer |
37 | Table 24 – Verification of requirements for OSI environment security – Rekey initiated by the client |
38 | Table 25 – Verification of requirements for OSI environment security – Rekey initiated by the Server |
40 | 7 E2E conformity testing in the XMPP environment 7.1 Conformance tables for E2E-XMPP security profile Table 26 – Base Profile – E2E XMPP Security Table 27 – Protocol Handshake – E2E XMPP Security Table 28 – IEC 61850 Application Association – E2E XMPP Security |
41 | Table 29 – EnvPDU Parameters– E2E XMPP Security Table 30 – EnvPDU Supported– E2E XMPP Security Table 31 – SecPDU Subclasses– E2E XMPP Security |
42 | Table 32 – Encryption – E2E XMPP Security Table 33 – Cryptographic algorithms – E2E XMPP Security Table 34 – XMPP – E2E XMPP Security |
43 | 7.2 E2E Test Procedures for XMPP environment 7.2.1 Association Management Table 35 – XMPP– E2E XMPP Security Table 36 – XMPP T-profile – E2E XMPP Security |
44 | Table 37 – Verification of client handshake request procedure in XMPP environment |
45 | Table 38 – Verification of server handshake request procedure in XMPP environment Table 39 – Handshake request resiliency procedure in XMPP environment – Client |
46 | 7.2.2 Clear Data Transfer Table 40 – Handshake request resiliency procedure in XMPP environment – Server Table 41 – Verification of requirements for XMPP environment security – Clear Data transfer |
47 | 7.2.3 Encrypted Data Transfer Table 42 – Clear Data Transfer resiliency procedure in XMPP environment – Server Table 43 – Clear Data Transfer resiliency procedure in XMPP environment – Client Table 44 – Verification of requirements for XMPP environment security – Encrypted data transfer |
48 | 7.2.4 Rekey Table 45 – Resiliency testing for client – Encrypted data transfer Table 46 – Resiliency testing for server – Encrypted data transfer |
49 | Table 47 – Verification of requirements for XMPP environment security – Rekey initiated by the client |
50 | Table 48 – Verification of requirements for XMPP environment security – Rekey initiated by the server |
51 | 8 E2E Resiliency test procedures 8.1 General |
52 | 8.2 Association Management Resiliency Testing Table 49 – Handshake request resiliency procedure – Client |
57 | Table 50 – Handshake request resiliency procedure – Server |
61 | 8.3 Clear Data Transfer Resiliency Table 51 – Clear Data Transfer resiliency – Server |
63 | Table 52 – Clear Data Transfer resiliency – Client |
66 | 8.4 Encrypted Data Transfer Resiliency Table 53 – Resiliency testing for client – Encrypted data transfer |
68 | Table 54 – Resiliency testing for server – Encrypted data transfer |
70 | 9 E2E security subclass (SecPDU) 9.1 E2E Handshake request subclass |
71 | Table 55 – E2E handshake request subclass |
73 | 9.2 E2E handshake accept subclass Table 56 – E2E handshake accept subclass. |
76 | 9.3 E2E Application reject subclass |
77 | Table 57 – E2E Application reject subclass |
78 | 9.4 E2E Handshake reject subclass |
79 | Table 58 – Server reject of association due to security issues |
80 | 9.5 E2E Handshake security abort subclass |
81 | Table 59 – Test of client submitted handshake security abort |
82 | 9.6 E2E Data transfer security abort subclass |
83 | Table 60 – Client or server emitted data transfer security abort |
84 | 9.7 E2E Abort by protected protocol subclass |
85 | Table 61 – Client or server emitted abort by protected protocol |
86 | 9.8 E2E Clear data transfer subclass |
87 | Table 62 – Client initiated clear data transfer |
89 | Table 63 – Server initiated clear data transfer |
90 | 9.9 E2E Encrypted data transfer subclass |
91 | Table 64 – Client initiated encrypted data transfer |
93 | Table 65 – Server initiated encrypted data transfer |
94 | 9.10 E2E Association release request subclass |
95 | Table 66 – Client or server issued association release request. |
96 | 9.11 E2E Association release response subclass |
97 | Table 67 – Client or server association release response |
98 | 10 OSI subclass (EnvPDU) 10.1 OSI association request subclass |
99 | Table 68 – OSI association request subclass |
100 | 10.2 OSI association response subclass |
101 | Table 69 – OSI association response subclass |
102 | 10.3 OSI abort subclass |
103 | Table 70 – Client OSI abort subclass |
104 | Table 71 – Server OSI abort subclass |
105 | 10.4 OSI clear data transfer subclass 10.5 OSI encrypted data transfer subclass Table 72 – Client or server OSI environment clear data transfer Table 73 – Client or server OSI environment encrypted data transfer |
106 | 10.6 OSI release request subclass 10.7 OSI release response subclass Table 74 – OSI release request subclass |
107 | 11 XMPP subclass (EnvPDU) 11.1 XMPP IQ stanza subclass Table 75 – OSI release response subclass |
108 | Table 76 – Client XMPP iq stanza subclass |
109 | Table 77 – Server XMPP IQ stanza subclass |
110 | 11.2 XMPP message stanza subclass Table 78 – Client XMPP message stanza subclass |
111 | 11.3 XMPP error subclass Table 79 – Server XMPP message stanza subclass |