{"id":445404,"date":"2024-10-20T08:41:38","date_gmt":"2024-10-20T08:41:38","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-ts-62351-100-42023\/"},"modified":"2024-10-26T16:10:36","modified_gmt":"2024-10-26T16:10:36","slug":"bsi-pd-iec-ts-62351-100-42023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-ts-62351-100-42023\/","title":{"rendered":"BSI PD IEC TS 62351-100-4:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 3 Terms, definitions, and abbreviated terms 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.2 Abbreviated terms 4 Application structure and information flow 4.1 Overview <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.2 Application entity structure Figures Figure 1 \u2013 Application entity structure and information flow Figure 2 \u2013 Relationships between APDUs <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.3 Relationship to test structure Figure 3 \u2013 Structure for test specifications <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5 General 5.1 General guidelines 5.2 Test methodology 5.2.1 General 5.2.2 Normal procedure tests and resiliency tests 5.2.3 SubClass descriptions <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.3 Conformance testing requirements 5.3.1 Testing within the context of an application 5.3.2 Requirements for the device under test 5.3.3 Requirements for the test facility <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.3.4 Test Validation 5.4 PICS <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.5 PIXIT Tables Table 1 \u2013 PIXIT for Base Profile <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.6 Tests cases Table 2 \u2013 PIXIT for Secure Communication <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Table 3 \u2013 IEC 62351-4:2018\/AMD1:2020 E2E Compliancy Testing (IEC 61850-8-1 and ICCP) <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Table 4 \u2013 IEC 62351-4:2018\/AMD1:2020 E2E Compliancy Testing (IEC 61850-8-2) <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6 E2E conformity testing in an OSI environment 6.1 Conformance tables for E2E OSI-security profile <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Table 5 \u2013 Base Profile \u2013 E2E Security Table 6 \u2013 Protocol Handshake \u2013 E2E Security Table 7 \u2013 IEC 61850 Application Association \u2013 E2E Security Table 8 \u2013 OSI EnvPDU Supported \u2013 E2E Security Table 9 \u2013 OSI EnvPDU Subclass Supported \u2013 E2E Security <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Table 10 \u2013 E2E SecPDU Subclass Supported Table 11 \u2013 OSI Mode of encryption \u2013 E2E Security Table 12 \u2013 Cryptographic algorithms \u2013 E2E Security <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.2 E2E Test Procedures for OSI environment 6.2.1 Association Management Table 13 \u2013 ASN.1 Objects \u2013 E2E Security <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Table 14 \u2013 Verification of Client handshake request procedure in OSI environment <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Table 15 \u2013 Verification of Server handshake request procedure in OSI environment <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Table 16 \u2013 Handshake request resiliency procedure in OSI environment \u2013 Client <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6.2.2 Clear Data Transfer Table 17 \u2013 Handshake request resiliency procedure in OSI environment \u2013 Server <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Table 18 \u2013 Verification of requirements for OSI environment security \u2013 Clear Data transfer Table 19 \u2013 Clear Data Transfer resiliency procedure in OSI environment \u2013 Client <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.2.3 Encrypted Data Transfer Table 20 \u2013 Clear Data Transfer resiliency procedure in OSI environment \u2013 Server <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Table 21 \u2013 Verification of requirements for OSI environment security \u2013 Encrypted data transfer <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Table 22 \u2013 Resiliency testing for client \u2013 Encrypted data transfer <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 6.2.4 Rekey Table 23 \u2013 Resiliency testing for server \u2013 Encrypted data transfer <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Table 24 \u2013 Verification of requirements for OSI environment security \u2013 Rekey initiated by the client <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Table 25 \u2013 Verification of requirements for OSI environment security \u2013 Rekey initiated by the Server <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 7 E2E conformity testing in the XMPP environment 7.1 Conformance tables for E2E-XMPP security profile Table 26 \u2013 Base Profile \u2013 E2E XMPP Security Table 27 \u2013 Protocol Handshake \u2013 E2E XMPP Security Table 28 \u2013 IEC 61850 Application Association \u2013 E2E XMPP Security <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Table 29 \u2013 EnvPDU Parameters\u2013 E2E XMPP Security Table 30 \u2013 EnvPDU Supported\u2013 E2E XMPP Security Table 31 \u2013 SecPDU Subclasses\u2013 E2E XMPP Security <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Table 32 \u2013 Encryption \u2013 E2E XMPP Security Table 33 \u2013 Cryptographic algorithms \u2013 E2E XMPP Security Table 34 \u2013 XMPP \u2013 E2E XMPP Security <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 7.2 E2E Test Procedures for XMPP environment 7.2.1 Association Management Table 35 \u2013 XMPP\u2013 E2E XMPP Security Table 36 \u2013 XMPP T-profile \u2013 E2E XMPP Security <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Table 37 \u2013 Verification of client handshake request procedure in XMPP environment <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Table 38 \u2013 Verification of server handshake request procedure in XMPP environment Table 39 \u2013 Handshake request resiliency procedure in XMPP environment \u2013 Client <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 7.2.2 Clear Data Transfer Table 40 \u2013 Handshake request resiliency procedure in XMPP environment \u2013 Server Table 41 \u2013 Verification of requirements for XMPP environment security \u2013 Clear Data transfer <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 7.2.3 Encrypted Data Transfer Table 42 \u2013 Clear Data Transfer resiliency procedure in XMPP environment \u2013 Server Table 43 \u2013 Clear Data Transfer resiliency procedure in XMPP environment \u2013 Client Table 44 \u2013 Verification of requirements for XMPP environment security \u2013 Encrypted data transfer <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 7.2.4 Rekey Table 45 \u2013 Resiliency testing for client \u2013 Encrypted data transfer Table 46 \u2013 Resiliency testing for server \u2013 Encrypted data transfer <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Table 47 \u2013 Verification of requirements for XMPP environment security \u2013 Rekey initiated by the client <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Table 48 \u2013 Verification of requirements for XMPP environment security \u2013 Rekey initiated by the server <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 8 E2E Resiliency test procedures 8.1 General <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 8.2 Association Management Resiliency Testing Table 49 \u2013 Handshake request resiliency procedure \u2013 Client <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | Table 50 \u2013 Handshake request resiliency procedure \u2013 Server <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 8.3 Clear Data Transfer Resiliency Table 51 \u2013 Clear Data Transfer resiliency \u2013 Server <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | Table 52 \u2013 Clear Data Transfer resiliency \u2013 Client <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 8.4 Encrypted Data Transfer Resiliency Table 53 \u2013 Resiliency testing for client \u2013 Encrypted data transfer <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | Table 54 \u2013 Resiliency testing for server \u2013 Encrypted data transfer <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 9 E2E security subclass (SecPDU) 9.1 E2E Handshake request subclass <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | Table 55 \u2013 E2E handshake request subclass <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 9.2 E2E handshake accept subclass Table 56 \u2013 E2E handshake accept subclass. <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 9.3 E2E Application reject subclass <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | Table 57 \u2013 E2E Application reject subclass <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 9.4 E2E Handshake reject subclass <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | Table 58 \u2013 Server reject of association due to security issues <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 9.5 E2E Handshake security abort subclass <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | Table 59 \u2013 Test of client submitted handshake security abort <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 9.6 E2E Data transfer security abort subclass <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | Table 60 \u2013 Client or server emitted data transfer security abort <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 9.7 E2E Abort by protected protocol subclass <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Table 61 \u2013 Client or server emitted abort by protected protocol <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 9.8 E2E Clear data transfer subclass <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Table 62 \u2013 Client initiated clear data transfer <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | Table 63 \u2013 Server initiated clear data transfer <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 9.9 E2E Encrypted data transfer subclass <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | Table 64 \u2013 Client initiated encrypted data transfer <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | Table 65 \u2013 Server initiated encrypted data transfer <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 9.10 E2E Association release request subclass <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | Table 66 \u2013 Client or server issued association release request. <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 9.11 E2E Association release response subclass <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | Table 67 \u2013 Client or server association release response <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 10 OSI subclass (EnvPDU) 10.1 OSI association request subclass <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | Table 68 \u2013 OSI association request subclass <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 10.2 OSI association response subclass <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | Table 69 \u2013 OSI association response subclass <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 10.3 OSI abort subclass <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | Table 70 \u2013 Client OSI abort subclass <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Table 71 \u2013 Server OSI abort subclass <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 10.4 OSI clear data transfer subclass 10.5 OSI encrypted data transfer subclass Table 72 \u2013 Client or server OSI environment clear data transfer Table 73 \u2013 Client or server OSI environment encrypted data transfer <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 10.6 OSI release request subclass 10.7 OSI release response subclass Table 74 \u2013 OSI release request subclass <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 11 XMPP subclass (EnvPDU) 11.1 XMPP IQ stanza subclass Table 75 \u2013 OSI release response subclass <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | Table 76 \u2013 Client XMPP iq stanza subclass <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | Table 77 \u2013 Server XMPP IQ stanza subclass <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 11.2 XMPP message stanza subclass Table 78 \u2013 Client XMPP message stanza subclass <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 11.3 XMPP error subclass Table 79 \u2013 Server XMPP message stanza subclass <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Power systems management and associated information exchange. Data and communication security – Cybersecurity conformance testing for IEC 62351-4<\/b><\/p>\n |