{"id":416949,"date":"2024-10-20T06:13:31","date_gmt":"2024-10-20T06:13:31","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-dd-iec-ts-62351-82011-2\/"},"modified":"2024-10-26T11:34:13","modified_gmt":"2024-10-26T11:34:13","slug":"bsi-dd-iec-ts-62351-82011-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-dd-iec-ts-62351-82011-2\/","title":{"rendered":"BSI DD IEC\/TS 62351-8:2011"},"content":{"rendered":"

This technical specification covers the access control of users and automated agents \u2013 in the following subjects \u2013 to data objects in power systems by means of role-based access control (RBAC). RBAC is not a new concept used by many operating systems to control access to system resources. RBAC is an alternative to the all-or-nothing super-user model. RBAC is in keeping with the security principle of least privilege, which states that no subject should be given more rights than necessary for performing that subject\u2019s job. RBAC enables an organization to separate super-user capabilities and package them into special user accounts termed roles for assignment to specific individuals according to their job needs. This enables a variety of security policies, networking, firewall, back-ups, and system operation. A site that prefers a single strong administrator but wants to let more sophisticated users fix portions of their own system can set up an advanced-user role. RBAC is not confined to users however, it applies equally well to automated computer agents, i.e., software parts operating independent of user interactions. The following interactions are covered by the scope of this technical specification:<\/p>\n