BSI DD IEC/TS 62351-7:2010
$167.15
Power systems management and associated information exchange. Data and communication security – Network and system management (NSM) data object models
Published By | Publication Date | Number of Pages |
BSI | 2010 | 44 |
Power systems operations are increasingly reliant on information infrastructures, including communication networks, intelligent electronic devices (IEDs), and self-defining communication protocols. Therefore, management of the information infrastructure has become crucial to providing the necessary high levels of security and reliability in power system operations. Using the concepts developed in the IETF simple network management protocol (SNMP) standards for network management, IEC/TS 62351-7 defines network and system management (NSM) data object models that are specific to power system operations. These NSM data objects will be used to monitor the health of networks and systems, to detect possible security intrusions, and to manage the performance and reliability of the information infrastructure.
The NSM data objects use the naming conventions developed for IEC 61850, expanded to address NSM issues. These data objects, and the data types of which they are comprised, are defined as abstract models of data objects. The actual bits-and-bytes formats of the data objects will depend upon the mapping of these abstract NSM data objects to specific protocols, such as IEC 61850, IEC 60870-5, IEC 60870-6, IEC 61968/IEC 61970 (CIM), web services, SNMP or any other appropriate protocol. Those mappings will need to be standardized in separate documents.
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | CONTENTS |
6 | FOREWORD |
8 | 1 Scope 2 Normative references 3 Terms and definitions 4 Glossary of terms and definitions 5 Background of network and system management (NSM) requirements (informative) 5.1 Objectives of IEC NSM standards |
11 | Figures Figure 1 – Comparison of NSM data objects with IEC 61850 objects Figure 2 – Management of both the power system infrastructure and the information infrastructure |
12 | 5.2 Current lack of coherent information infrastructure |
14 | 5.3 Intrusion detection systems (IDS) Figure 3 – Power system operations systems, illustrating the security monitoring architecture |
15 | Figure 4 – Information exchange between applications: generic communication topology |
17 | 5.4 Network and system management (NSM) concepts Figure 5 – Active security monitoring architecture with NSM data objects |
19 | 6 Security and reliability NSM requirements for power system operations (informative) 6.1 NSM requirements: Monitoring and controlling the networks and protocols |
21 | 6.2 NSM requirements: Monitoring and management of end systems |
22 | 6.3 NSM requirements: Intrusion detection functions |
25 | 7 NSM abstract data types 7.1 Abbreviated terms |
26 | 7.2 NSM data object constructs |
28 | 7.3 High level NSM data type structures Figure 6 – Alarm structure |
29 | Figure 7 – Status structure Figure 8 – Measurement structure |
30 | Figure 9 – Setting structure Figure 10 – Array |
31 | Figure 11 – Table Figure 12 – Control hardware |
32 | 8 NSM abstract data objects 8.1 Communications health NSM data objects Figure 13 – Control software |
35 | 8.2 End system health NSM data objects |
37 | 8.3 Intrusion detection NSM data objects |
41 | Bibliography |