BS EN IEC 62351-8:2020
$215.11
Power systems management and associated information exchange. Data and communications security – Role-based access control for power system management
Published By | Publication Date | Number of Pages |
BSI | 2020 | 80 |
IEC 62351-8: 2020 is to facilitate role-based access control (RBAC) for power system management. RBAC assigns human users, automated systems, and software applications (collectively called “subjects” in this document) to specified “roles”, and restricts their access to only those resources, which the security policies identify as necessary for their roles. As electric power systems become more automated and cyber security concerns become more prominent, it is becoming increasingly critical to ensure that access to data (read, write, control, etc.) is restricted. As in many aspects of security, RBAC is not just a technology; it is a way of running a business. RBAC is not a new concept; in fact, it is used by many operating systems to control access to system resources. Specifically, RBAC provides an alternative to the all-or-nothing super-user model in which all subjects have access to all data, including control commands. RBAC is a primary method to meet the security principle of least privilege, which states that no subject should be authorized more permissions than necessary for performing that subject’s task. With RBAC, authorization is separated from authentication. RBAC enables an organization to subdivide super-user capabilities and package them into special user accounts termed roles for assignment to specific individuals according to their associated duties. This subdivision enables security policies to determine who or what systems are permitted access to which data in other systems. RBAC provides thus a means of reallocating system controls as defined by the organization policy. In particular, RBAC can protect sensitive system operations from inadvertent (or deliberate) actions by unauthorized users. Clearly RBAC is not confined to human users though; it applies equally well to automated systems and software applications, i.e., software parts operating independent of user interactions. The following interactions are in scope: – local (direct wired) access to the object by a human user; by a local and automated computer agent, or built-in HMI or panel; – remote (via dial-up or wireless media) access to the object by a human user; – remote (via dial-up or wireless media) access to the object by a remote automated computer agent, e.g. another object at another substation, a distributed energy resource at an end-user’s facility, or a control centre application. While this document defines a set of mandatory roles to be supported, the exchange format for defined specific or custom roles is also in scope of this document. Out of scope for this document are all topics which are not directly related to the definition of roles and access tokens for local and remote access, especially administrative or organizational tasks.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
5 | Annex ZA(normative)Normative references to international publicationswith their corresponding European publications |
7 | English CONTENTS |
11 | FOREWORD |
13 | INTRODUCTION |
14 | 1 Scope |
15 | 2 Normative references |
16 | 3 Terms and definitions |
18 | 4 Abbreviated terms |
19 | 5 RBAC process model 5.1 Overview of RBAC process model |
20 | 5.2 Generic RBAC concepts Figures Figure 1 – Generic framework for access control |
21 | 5.3 Separation of subjects, roles, and permissions 5.3.1 RBAC model Figure 2 – Diagram of RBAC with static and dynamic separation of duty (enhanced version of ANSI INCITS 359-2004) |
23 | 5.3.2 Subject assignment (subject-to-role mapping) 5.3.3 Role assignment (role-to-permission mapping) Figure 3 – Subjects, roles, permissions, and operations |
24 | 5.3.4 Permission assignment (mapping of actions to objects) 5.4 Criteria for defining roles 5.4.1 Policies 5.4.2 Subjects, roles, and permissions 5.4.3 Introducing roles reduces complexity |
25 | 6 Definition of roles 6.1 Role-to-permission assignment inside the entity in general 6.1.1 General 6.1.2 Number of supported permissions by a role 6.1.3 Number of supported roles 6.1.4 Flexibility of role-to-permission mapping 6.2 Role-to-permission assignment with respect to power systems 6.2.1 Mandatory roles and permissions for IED access control |
26 | Tables Table 1 – List of mandatory pre-defined permissions |
27 | Table 2 – Pre-defined roles |
28 | 6.2.2 Power utility automation using IEC 61850 Table 3 – List of pre-defined role-to-permission assignments |
29 | Table 4 – LISTOBJECTS permission and associated ACSI services |
30 | 6.3 Role to permission assignment for specific roles 6.3.1 General 6.3.2 Encoding specific roles |
31 | Figure 4 – XACML structure |
34 | 6.3.3 Evaluation context Table 5 – Evaluation Context |
35 | 6.4 Role-to-permission assignment with respect to other non-power system domains (e.g. industrial process control) 7 RBAC credential distribution using the PUSH model |
36 | Figure 5 – Schematic view of authorization mechanism based on RBAC |
37 | 8 RBAC credential distribution using the PULL model 8.1 General |
38 | 8.2 Secure access to an LDAP-enabled repository 8.2.1 General 8.2.2 PULL model with LDAP Figure 6 – Schematic view of authorization mechanism based on RBAC PULL model |
39 | 8.2.3 LDAP Directory organization Figure 7 – RBAC PULL model using LDAP |
40 | 8.3 Secure access to the RADIUS-enabled repository 8.3.1 General 8.3.2 PULL model with RADIUS |
41 | 8.3.3 RADIUS security applying transparent TLS protection Figure 8 – RBAC PULL model using RADIUS |
42 | Table 6 – Cipher suites combinations in the context of this document |
44 | 8.4 Secure access to the JWT provider 9 General application of RBAC access token (informative) Figure 9 – RBAC model using OAuth2.0 and JWT |
46 | Figure 10 – Session based RBAC approach (simplified IEC 62351-4 end-to-end security) |
47 | 10 Definition of access tokens 10.1 General 10.2 Supported profiles 10.3 Identification of access token |
48 | 10.4 General structure of the access tokens 10.4.1 Mandatory fields in the access tokens 10.4.2 Mandatory profile-specific fields 10.4.3 Optional fields in the access tokens Table 7 – Mandatory general access token components Table 8 – Mandatory profile specific access token components Table 9 – Optional access token components |
49 | 10.4.4 Definition of specific fields |
51 | Table 10 – AoR fields and format |
52 | 10.5 Specific structure of the access tokens 10.5.1 Profile A: X.509 Public key certificate |
54 | 10.5.2 Profile B: X.509 Attribute certificate |
57 | 10.5.3 Profile C: JSON Web Token – JWT Table 11 – Mapping between ID and attribute certificate |
59 | 10.5.4 Profile D: RADIUS token |
61 | 11 Transport profiles 11.1 Usage in TCP-based protocols |
62 | 11.2 Usage in non-Ethernet based protocols 12 Verification of access tokens 12.1 General 12.2 Multiple access token existence 12.3 Subject authentication |
63 | 12.4 Access token availability 12.5 Validity period 12.6 Access token integrity 12.7 Issuer 12.8 RoleID |
64 | 12.9 Revision number 12.10 Area of responsibility 12.11 Role definition 12.12 Revocation state 12.13 Operation 12.14 Sequence number |
65 | 12.15 Revocation methods 12.15.1 General 12.15.2 Supported methods |
66 | 13 Conformity 13.1 General 13.2 Notation 13.3 Conformance to access token format 13.4 Conformance to access token content 13.5 Access token distribution Table 12 – Conformance to access token format |
67 | 13.6 Role information exchange 13.7 Mapping to existing authorization mechanisms 13.8 Security events 14 Repository interaction for the defined RBAC profiles Table 13 – Conformance to access token distribution |
68 | Table 14 – Profile comparison |
69 | Annex A (informative)Informative example for specific role definition A.1 Scope of annex A.2 Use case description A.3 XACML definition example Table A.1 – Permission assignment |
70 | A.4 Role description |
71 | A.5 Permission group description |
72 | A.6 Permission description |
75 | A.7 Request syntax for PDP |
77 | Bibliography |