{"id":445404,"date":"2024-10-20T08:41:38","date_gmt":"2024-10-20T08:41:38","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-ts-62351-100-42023\/"},"modified":"2024-10-26T16:10:36","modified_gmt":"2024-10-26T16:10:36","slug":"bsi-pd-iec-ts-62351-100-42023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-ts-62351-100-42023\/","title":{"rendered":"BSI PD IEC TS 62351-100-4:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
4<\/td>\nCONTENTS <\/td>\n<\/tr>\n
8<\/td>\nFOREWORD <\/td>\n<\/tr>\n
10<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
12<\/td>\n3 Terms, definitions, and abbreviated terms
3.1 Terms and definitions <\/td>\n<\/tr>\n
13<\/td>\n3.2 Abbreviated terms
4 Application structure and information flow
4.1 Overview <\/td>\n<\/tr>\n
14<\/td>\n4.2 Application entity structure
Figures
Figure 1 \u2013 Application entity structure and information flow
Figure 2 \u2013 Relationships between APDUs <\/td>\n<\/tr>\n
15<\/td>\n4.3 Relationship to test structure
Figure 3 \u2013 Structure for test specifications <\/td>\n<\/tr>\n
16<\/td>\n5 General
5.1 General guidelines
5.2 Test methodology
5.2.1 General
5.2.2 Normal procedure tests and resiliency tests
5.2.3 SubClass descriptions <\/td>\n<\/tr>\n
17<\/td>\n5.3 Conformance testing requirements
5.3.1 Testing within the context of an application
5.3.2 Requirements for the device under test
5.3.3 Requirements for the test facility <\/td>\n<\/tr>\n
18<\/td>\n5.3.4 Test Validation
5.4 PICS <\/td>\n<\/tr>\n
19<\/td>\n5.5 PIXIT
Tables
Table 1 \u2013 PIXIT for Base Profile <\/td>\n<\/tr>\n
20<\/td>\n5.6 Tests cases
Table 2 \u2013 PIXIT for Secure Communication <\/td>\n<\/tr>\n
21<\/td>\nTable 3 \u2013 IEC 62351-4:2018\/AMD1:2020 E2E Compliancy Testing (IEC 61850-8-1 and ICCP) <\/td>\n<\/tr>\n
23<\/td>\nTable 4 \u2013 IEC 62351-4:2018\/AMD1:2020 E2E Compliancy Testing (IEC 61850-8-2) <\/td>\n<\/tr>\n
24<\/td>\n6 E2E conformity testing in an OSI environment
6.1 Conformance tables for E2E OSI-security profile <\/td>\n<\/tr>\n
25<\/td>\nTable 5 \u2013 Base Profile \u2013 E2E Security
Table 6 \u2013 Protocol Handshake \u2013 E2E Security
Table 7 \u2013 IEC 61850 Application Association \u2013 E2E Security
Table 8 \u2013 OSI EnvPDU Supported \u2013 E2E Security
Table 9 \u2013 OSI EnvPDU Subclass Supported \u2013 E2E Security <\/td>\n<\/tr>\n
26<\/td>\nTable 10 \u2013 E2E SecPDU Subclass Supported
Table 11 \u2013 OSI Mode of encryption \u2013 E2E Security
Table 12 \u2013 Cryptographic algorithms \u2013 E2E Security <\/td>\n<\/tr>\n
27<\/td>\n6.2 E2E Test Procedures for OSI environment
6.2.1 Association Management
Table 13 \u2013 ASN.1 Objects \u2013 E2E Security <\/td>\n<\/tr>\n
28<\/td>\nTable 14 \u2013 Verification of Client handshake request procedure in OSI environment <\/td>\n<\/tr>\n
29<\/td>\nTable 15 \u2013 Verification of Server handshake request procedure in OSI environment <\/td>\n<\/tr>\n
30<\/td>\nTable 16 \u2013 Handshake request resiliency procedure in OSI environment \u2013 Client <\/td>\n<\/tr>\n
31<\/td>\n6.2.2 Clear Data Transfer
Table 17 \u2013 Handshake request resiliency procedure in OSI environment \u2013 Server <\/td>\n<\/tr>\n
32<\/td>\nTable 18 \u2013 Verification of requirements for OSI environment security \u2013 Clear Data transfer
Table 19 \u2013 Clear Data Transfer resiliency procedure in OSI environment \u2013 Client <\/td>\n<\/tr>\n
33<\/td>\n6.2.3 Encrypted Data Transfer
Table 20 \u2013 Clear Data Transfer resiliency procedure in OSI environment \u2013 Server <\/td>\n<\/tr>\n
34<\/td>\nTable 21 \u2013 Verification of requirements for OSI environment security \u2013 Encrypted data transfer <\/td>\n<\/tr>\n
35<\/td>\nTable 22 \u2013 Resiliency testing for client \u2013 Encrypted data transfer <\/td>\n<\/tr>\n
36<\/td>\n6.2.4 Rekey
Table 23 \u2013 Resiliency testing for server \u2013 Encrypted data transfer <\/td>\n<\/tr>\n
37<\/td>\nTable 24 \u2013 Verification of requirements for OSI environment security \u2013 Rekey initiated by the client <\/td>\n<\/tr>\n
38<\/td>\nTable 25 \u2013 Verification of requirements for OSI environment security \u2013 Rekey initiated by the Server <\/td>\n<\/tr>\n
40<\/td>\n7 E2E conformity testing in the XMPP environment
7.1 Conformance tables for E2E-XMPP security profile
Table 26 \u2013 Base Profile \u2013 E2E XMPP Security
Table 27 \u2013 Protocol Handshake \u2013 E2E XMPP Security
Table 28 \u2013 IEC 61850 Application Association \u2013 E2E XMPP Security <\/td>\n<\/tr>\n
41<\/td>\nTable 29 \u2013 EnvPDU Parameters\u2013 E2E XMPP Security
Table 30 \u2013 EnvPDU Supported\u2013 E2E XMPP Security
Table 31 \u2013 SecPDU Subclasses\u2013 E2E XMPP Security <\/td>\n<\/tr>\n
42<\/td>\nTable 32 \u2013 Encryption \u2013 E2E XMPP Security
Table 33 \u2013 Cryptographic algorithms \u2013 E2E XMPP Security
Table 34 \u2013 XMPP \u2013 E2E XMPP Security <\/td>\n<\/tr>\n
43<\/td>\n7.2 E2E Test Procedures for XMPP environment
7.2.1 Association Management
Table 35 \u2013 XMPP\u2013 E2E XMPP Security
Table 36 \u2013 XMPP T-profile \u2013 E2E XMPP Security <\/td>\n<\/tr>\n
44<\/td>\nTable 37 \u2013 Verification of client handshake request procedure in XMPP environment <\/td>\n<\/tr>\n
45<\/td>\nTable 38 \u2013 Verification of server handshake request procedure in XMPP environment
Table 39 \u2013 Handshake request resiliency procedure in XMPP environment \u2013 Client <\/td>\n<\/tr>\n
46<\/td>\n7.2.2 Clear Data Transfer
Table 40 \u2013 Handshake request resiliency procedure in XMPP environment \u2013 Server
Table 41 \u2013 Verification of requirements for XMPP environment security \u2013 Clear Data transfer <\/td>\n<\/tr>\n
47<\/td>\n7.2.3 Encrypted Data Transfer
Table 42 \u2013 Clear Data Transfer resiliency procedure in XMPP environment \u2013 Server
Table 43 \u2013 Clear Data Transfer resiliency procedure in XMPP environment \u2013 Client
Table 44 \u2013 Verification of requirements for XMPP environment security \u2013 Encrypted data transfer <\/td>\n<\/tr>\n
48<\/td>\n7.2.4 Rekey
Table 45 \u2013 Resiliency testing for client \u2013 Encrypted data transfer
Table 46 \u2013 Resiliency testing for server \u2013 Encrypted data transfer <\/td>\n<\/tr>\n
49<\/td>\nTable 47 \u2013 Verification of requirements for XMPP environment security \u2013 Rekey initiated by the client <\/td>\n<\/tr>\n
50<\/td>\nTable 48 \u2013 Verification of requirements for XMPP environment security \u2013 Rekey initiated by the server <\/td>\n<\/tr>\n
51<\/td>\n8 E2E Resiliency test procedures
8.1 General <\/td>\n<\/tr>\n
52<\/td>\n8.2 Association Management Resiliency Testing
Table 49 \u2013 Handshake request resiliency procedure \u2013 Client <\/td>\n<\/tr>\n
57<\/td>\nTable 50 \u2013 Handshake request resiliency procedure \u2013 Server <\/td>\n<\/tr>\n
61<\/td>\n8.3 Clear Data Transfer Resiliency
Table 51 \u2013 Clear Data Transfer resiliency \u2013 Server <\/td>\n<\/tr>\n
63<\/td>\nTable 52 \u2013 Clear Data Transfer resiliency \u2013 Client <\/td>\n<\/tr>\n
66<\/td>\n8.4 Encrypted Data Transfer Resiliency
Table 53 \u2013 Resiliency testing for client \u2013 Encrypted data transfer <\/td>\n<\/tr>\n
68<\/td>\nTable 54 \u2013 Resiliency testing for server \u2013 Encrypted data transfer <\/td>\n<\/tr>\n
70<\/td>\n9 E2E security subclass (SecPDU)
9.1 E2E Handshake request subclass <\/td>\n<\/tr>\n
71<\/td>\nTable 55 \u2013 E2E handshake request subclass <\/td>\n<\/tr>\n
73<\/td>\n9.2 E2E handshake accept subclass
Table 56 \u2013 E2E handshake accept subclass. <\/td>\n<\/tr>\n
76<\/td>\n9.3 E2E Application reject subclass <\/td>\n<\/tr>\n
77<\/td>\nTable 57 \u2013 E2E Application reject subclass <\/td>\n<\/tr>\n
78<\/td>\n9.4 E2E Handshake reject subclass <\/td>\n<\/tr>\n
79<\/td>\nTable 58 \u2013 Server reject of association due to security issues <\/td>\n<\/tr>\n
80<\/td>\n9.5 E2E Handshake security abort subclass <\/td>\n<\/tr>\n
81<\/td>\nTable 59 \u2013 Test of client submitted handshake security abort <\/td>\n<\/tr>\n
82<\/td>\n9.6 E2E Data transfer security abort subclass <\/td>\n<\/tr>\n
83<\/td>\nTable 60 \u2013 Client or server emitted data transfer security abort <\/td>\n<\/tr>\n
84<\/td>\n9.7 E2E Abort by protected protocol subclass <\/td>\n<\/tr>\n
85<\/td>\nTable 61 \u2013 Client or server emitted abort by protected protocol <\/td>\n<\/tr>\n
86<\/td>\n9.8 E2E Clear data transfer subclass <\/td>\n<\/tr>\n
87<\/td>\nTable 62 \u2013 Client initiated clear data transfer <\/td>\n<\/tr>\n
89<\/td>\nTable 63 \u2013 Server initiated clear data transfer <\/td>\n<\/tr>\n
90<\/td>\n9.9 E2E Encrypted data transfer subclass <\/td>\n<\/tr>\n
91<\/td>\nTable 64 \u2013 Client initiated encrypted data transfer <\/td>\n<\/tr>\n
93<\/td>\nTable 65 \u2013 Server initiated encrypted data transfer <\/td>\n<\/tr>\n
94<\/td>\n9.10 E2E Association release request subclass <\/td>\n<\/tr>\n
95<\/td>\nTable 66 \u2013 Client or server issued association release request. <\/td>\n<\/tr>\n
96<\/td>\n9.11 E2E Association release response subclass <\/td>\n<\/tr>\n
97<\/td>\nTable 67 \u2013 Client or server association release response <\/td>\n<\/tr>\n
98<\/td>\n10 OSI subclass (EnvPDU)
10.1 OSI association request subclass <\/td>\n<\/tr>\n
99<\/td>\nTable 68 \u2013 OSI association request subclass <\/td>\n<\/tr>\n
100<\/td>\n10.2 OSI association response subclass <\/td>\n<\/tr>\n
101<\/td>\nTable 69 \u2013 OSI association response subclass <\/td>\n<\/tr>\n
102<\/td>\n10.3 OSI abort subclass <\/td>\n<\/tr>\n
103<\/td>\nTable 70 \u2013 Client OSI abort subclass <\/td>\n<\/tr>\n
104<\/td>\nTable 71 \u2013 Server OSI abort subclass <\/td>\n<\/tr>\n
105<\/td>\n10.4 OSI clear data transfer subclass
10.5 OSI encrypted data transfer subclass
Table 72 \u2013 Client or server OSI environment clear data transfer
Table 73 \u2013 Client or server OSI environment encrypted data transfer <\/td>\n<\/tr>\n
106<\/td>\n10.6 OSI release request subclass
10.7 OSI release response subclass
Table 74 \u2013 OSI release request subclass <\/td>\n<\/tr>\n
107<\/td>\n11 XMPP subclass (EnvPDU)
11.1 XMPP IQ stanza subclass
Table 75 \u2013 OSI release response subclass <\/td>\n<\/tr>\n
108<\/td>\nTable 76 \u2013 Client XMPP iq stanza subclass <\/td>\n<\/tr>\n
109<\/td>\nTable 77 \u2013 Server XMPP IQ stanza subclass <\/td>\n<\/tr>\n
110<\/td>\n11.2 XMPP message stanza subclass
Table 78 \u2013 Client XMPP message stanza subclass <\/td>\n<\/tr>\n
111<\/td>\n11.3 XMPP error subclass
Table 79 \u2013 Server XMPP message stanza subclass <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Power systems management and associated information exchange. Data and communication security – Cybersecurity conformance testing for IEC 62351-4<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n112<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":445414,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-445404","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/445404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/445414"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=445404"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=445404"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=445404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}