Shopping Cart

No products in the cart.

BS EN IEC 62351-8:2020

$215.11

Power systems management and associated information exchange. Data and communications security – Role-based access control for power system management

Published By Publication Date Number of Pages
BSI 2020 80
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

IEC 62351-8: 2020 is to facilitate role-based access control (RBAC) for power system management. RBAC assigns human users, automated systems, and software applications (collectively called “subjects” in this document) to specified “roles”, and restricts their access to only those resources, which the security policies identify as necessary for their roles. As electric power systems become more automated and cyber security concerns become more prominent, it is becoming increasingly critical to ensure that access to data (read, write, control, etc.) is restricted. As in many aspects of security, RBAC is not just a technology; it is a way of running a business. RBAC is not a new concept; in fact, it is used by many operating systems to control access to system resources. Specifically, RBAC provides an alternative to the all-or-nothing super-user model in which all subjects have access to all data, including control commands. RBAC is a primary method to meet the security principle of least privilege, which states that no subject should be authorized more permissions than necessary for performing that subject’s task. With RBAC, authorization is separated from authentication. RBAC enables an organization to subdivide super-user capabilities and package them into special user accounts termed roles for assignment to specific individuals according to their associated duties. This subdivision enables security policies to determine who or what systems are permitted access to which data in other systems. RBAC provides thus a means of reallocating system controls as defined by the organization policy. In particular, RBAC can protect sensitive system operations from inadvertent (or deliberate) actions by unauthorized users. Clearly RBAC is not confined to human users though; it applies equally well to automated systems and software applications, i.e., software parts operating independent of user interactions. The following interactions are in scope: – local (direct wired) access to the object by a human user; by a local and automated computer agent, or built-in HMI or panel; – remote (via dial-up or wireless media) access to the object by a human user; – remote (via dial-up or wireless media) access to the object by a remote automated computer agent, e.g. another object at another substation, a distributed energy resource at an end-user’s facility, or a control centre application. While this document defines a set of mandatory roles to be supported, the exchange format for defined specific or custom roles is also in scope of this document. Out of scope for this document are all topics which are not directly related to the definition of roles and access tokens for local and remote access, especially administrative or organizational tasks.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 Annex ZA(normative)Normative references to international publicationswith their corresponding European publications
7 English
CONTENTS
11 FOREWORD
13 INTRODUCTION
14 1 Scope
15 2 Normative references
16 3 Terms and definitions
18 4 Abbreviated terms
19 5 RBAC process model
5.1 Overview of RBAC process model
20 5.2 Generic RBAC concepts
Figures
Figure 1 – Generic framework for access control
21 5.3 Separation of subjects, roles, and permissions
5.3.1 RBAC model
Figure 2 – Diagram of RBAC with static and dynamic separation of duty (enhanced version of ANSI INCITS 359-2004)
23 5.3.2 Subject assignment (subject-to-role mapping)
5.3.3 Role assignment (role-to-permission mapping)
Figure 3 – Subjects, roles, permissions, and operations
24 5.3.4 Permission assignment (mapping of actions to objects)
5.4 Criteria for defining roles
5.4.1 Policies
5.4.2 Subjects, roles, and permissions
5.4.3 Introducing roles reduces complexity
25 6 Definition of roles
6.1 Role-to-permission assignment inside the entity in general
6.1.1 General
6.1.2 Number of supported permissions by a role
6.1.3 Number of supported roles
6.1.4 Flexibility of role-to-permission mapping
6.2 Role-to-permission assignment with respect to power systems
6.2.1 Mandatory roles and permissions for IED access control
26 Tables
Table 1 – List of mandatory pre-defined permissions
27 Table 2 – Pre-defined roles
28 6.2.2 Power utility automation using IEC 61850
Table 3 – List of pre-defined role-to-permission assignments
29 Table 4 – LISTOBJECTS permission and associated ACSI services
30 6.3 Role to permission assignment for specific roles
6.3.1 General
6.3.2 Encoding specific roles
31 Figure 4 – XACML structure
34 6.3.3 Evaluation context
Table 5 – Evaluation Context
35 6.4 Role-to-permission assignment with respect to other non-power system domains (e.g. industrial process control)
7 RBAC credential distribution using the PUSH model
36 Figure 5 – Schematic view of authorization mechanism based on RBAC
37 8 RBAC credential distribution using the PULL model
8.1 General
38 8.2 Secure access to an LDAP-enabled repository
8.2.1 General
8.2.2 PULL model with LDAP
Figure 6 – Schematic view of authorization mechanism based on RBAC PULL model
39 8.2.3 LDAP Directory organization
Figure 7 – RBAC PULL model using LDAP
40 8.3 Secure access to the RADIUS-enabled repository
8.3.1 General
8.3.2 PULL model with RADIUS
41 8.3.3 RADIUS security applying transparent TLS protection
Figure 8 – RBAC PULL model using RADIUS
42 Table 6 – Cipher suites combinations in the context of this document
44 8.4 Secure access to the JWT provider
9 General application of RBAC access token (informative)
Figure 9 – RBAC model using OAuth2.0 and JWT
46 Figure 10 – Session based RBAC approach (simplified IEC 62351-4 end-to-end security)
47 10 Definition of access tokens
10.1 General
10.2 Supported profiles
10.3 Identification of access token
48 10.4 General structure of the access tokens
10.4.1 Mandatory fields in the access tokens
10.4.2 Mandatory profile-specific fields
10.4.3 Optional fields in the access tokens
Table 7 – Mandatory general access token components
Table 8 – Mandatory profile specific access token components
Table 9 – Optional access token components
49 10.4.4 Definition of specific fields
51 Table 10 – AoR fields and format
52 10.5 Specific structure of the access tokens
10.5.1 Profile A: X.509 Public key certificate
54 10.5.2 Profile B: X.509 Attribute certificate
57 10.5.3 Profile C: JSON Web Token – JWT
Table 11 – Mapping between ID and attribute certificate
59 10.5.4 Profile D: RADIUS token
61 11 Transport profiles
11.1 Usage in TCP-based protocols
62 11.2 Usage in non-Ethernet based protocols
12 Verification of access tokens
12.1 General
12.2 Multiple access token existence
12.3 Subject authentication
63 12.4 Access token availability
12.5 Validity period
12.6 Access token integrity
12.7 Issuer
12.8 RoleID
64 12.9 Revision number
12.10 Area of responsibility
12.11 Role definition
12.12 Revocation state
12.13 Operation
12.14 Sequence number
65 12.15 Revocation methods
12.15.1 General
12.15.2 Supported methods
66 13 Conformity
13.1 General
13.2 Notation
13.3 Conformance to access token format
13.4 Conformance to access token content
13.5 Access token distribution
Table 12 – Conformance to access token format
67 13.6 Role information exchange
13.7 Mapping to existing authorization mechanisms
13.8 Security events
14 Repository interaction for the defined RBAC profiles
Table 13 – Conformance to access token distribution
68 Table 14 – Profile comparison
69 Annex A (informative)Informative example for specific role definition
A.1 Scope of annex
A.2 Use case description
A.3 XACML definition example
Table A.1 – Permission assignment
70 A.4 Role description
71 A.5 Permission group description
72 A.6 Permission description
75 A.7 Request syntax for PDP
77 Bibliography
BS EN IEC 62351-8:2020
$215.11