{"id":255573,"date":"2024-10-19T16:53:44","date_gmt":"2024-10-19T16:53:44","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-ts-62351-100-12018\/"},"modified":"2024-10-25T12:21:39","modified_gmt":"2024-10-25T12:21:39","slug":"bsi-pd-iec-ts-62351-100-12018","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-ts-62351-100-12018\/","title":{"rendered":"BSI PD IEC TS 62351-100-1:2018"},"content":{"rendered":"
This part of IEC 62351, which is a technical specification, describes test cases of data and communication security for telecontrol equipment, substation automation systems (SAS) and telecontrol systems, including front-end functions of SCADA.<\/p>\n
The goal of this document is to enable interoperability by providing a standard method of testing protocol implementations to verify that a device fulfils the requirement of the standard. Note that conformity to the standard does not guarantee interoperability between devices using different implementations. It is expected that using this specification during testing will minimize the risk of non-interoperability. A basic condition for this interoperability is a passed conformance test of both devices.<\/p>\n
The scope of this document is to specify commonly available procedures and definitions for conformance and\/or interoperability testing of IEC TS 62351-5 and IEC TS 60870-5-7. The conformance test cases defined herein are focused to verify the conformant integration of the underlying authentication, as specified in IEC TS 62351-5 and IEC TS 60870-5-7, to protect IEC 60870-5-101 and IEC 6870-5-104-based communications.<\/p>\n
This document deals with data and communication security conformance testing; therefore, other requirements, such as safety or EMC, are not covered. These requirements are covered by other standards (if applicable) and the proof of compliance for these topics is done according to these standards.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 3 Terms, definitions and abbreviated terms 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 3.2 Abbreviated terms 4 General 4.1 Normatives covered by this technical specification 4.2 Conformance testing structure 4.2.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.2.2 Conformance testing of security extension procedures Figure 1 \u2013 IEC TS 62351-5 Security extension procedures <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.2.3 Conformance testing addressed per station type 4.2.4 Normal procedure tests and resiliency tests 4.3 Conformance testing requirements 4.3.1 Testing base protocols with security extension 4.3.2 Testing of profiles including TCP\/IP 4.3.3 Requirements for the device under test <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 4.3.4 Requirements for the test facility 4.3.5 Test logging <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5 Verification of configuration parameters 5.1 General 5.2 System definition <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Tables Table 1 \u2013 Configuration parameters: System definition <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.3 Application security extension <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Table 2 \u2013 Configuration parameters: Application security extension <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6 Verification of Communication 6.1 General 6.2 ASDU segmentation control <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Table 3 \u2013 ASDU segmentation control <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.3 Verification of ASDUs 6.3.1 User management ASDUs Table 4 \u2013 User management ASDUs <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 6.3.2 Update key maintenance ASDUs Table 5 \u2013 Update key maintenance ASDUs <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.3.3 Session key maintenance ASDUs Table 6 \u2013 Session key maintenance ASDUs <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 6.3.4 Challenge\/reply and aggressive mode authentication ASDUs Table 7 \u2013 Challenge\/reply and aggressive mode authentication ASDUs <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 6.3.5 Security statistics ASDU 7 Verification of procedures 7.1 General Table 8 \u2013 Security statistics ASDU <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 7.2 User management 7.2.1 General <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 7.2.2 Controlling station Table 9 \u2013 User management: Controlling station normal procedure tests <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Table 10 \u2013 User management: Controlling station resiliency tests <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 7.2.3 Controlled station Table 11 \u2013 User management: Controlled station normal procedure tests <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Table 12 \u2013 User management: Controlled station resiliency tests <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 7.3 Update key maintenance – Symmetric 7.3.1 General 7.3.2 Controlling station Table 13 \u2013 Update key maintenance \u2013 Symmetric: Controlling station triggering conditions <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | Table 14 \u2013 Update key maintenance \u2013 Symmetric: Controlling station normal procedure tests <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | Table 15 \u2013 Update key maintenance \u2013 Symmetric: Controlling station resiliency tests <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 7.3.3 Controlled station Table 16 \u2013 Update key maintenance \u2013 Symmetric: Controlled station normal procedure tests <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Table 17 \u2013 Update key maintenance \u2013 Symmetric: Controlled station resiliency tests <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 7.4 Update key maintenance \u2013 Asymmetric 7.4.1 General <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 7.4.2 Controlling station Table 18 \u2013 Update key maintenance \u2013 Asymmetric: Controlling station triggering conditions <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | Table 19 \u2013 Update key maintenance \u2013 Asymmetric: Controlling station normal procedure tests <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | Table 20 \u2013 Update key maintenance \u2013 Asymmetric: Controlling station resiliency tests <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 7.4.3 Controlled station Table 21 \u2013 Update key maintenance \u2013 Asymmetric: Controlled station normal procedure tests <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | Table 22 \u2013 Update key maintenance \u2013 Asymmetric: Controlled station resiliency tests <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 7.5 Session key maintenance 7.5.1 General <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 7.5.2 Controlling station Table 23 \u2013 Session key maintenance: Controlling station triggering conditions <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Table 24 \u2013 Session key maintenance: Controlling station normal procedure tests <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | Table 25 \u2013 Session key maintenance: Controlling station resiliency tests <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 7.5.3 Controlled station Table 26 \u2013 Session key maintenance: Controlled station invalidating session key <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Table 27 \u2013 Session key maintenance: Controlled station normal procedure tests <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 7.6 Challenge\/reply authentication 7.6.1 General Table 28 \u2013 Session key maintenance: Controlled station resiliency tests <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 7.6.2 Controlling station Table 29 \u2013 Challenge\/reply authentication: Controlling station triggering conditions <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | Table 30 \u2013 Challenge\/reply authentication: Controlling station normal procedure tests <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | Table 31 \u2013 Challenge\/reply authentication: Controlling station resiliency tests <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 7.6.3 Controlled station Table 32 \u2013 Challenge\/reply authentication: Controlled station normal procedure tests <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | Table 33 \u2013 Challenge\/reply authentication: Controlled station resiliency tests <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 7.7 Aggressive mode authentication 7.7.1 General <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 7.7.2 Controlling station Table 34 \u2013 Aggressive mode authentication: Controlling station normal procedure tests <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | Table 35 \u2013 Aggressive mode authentication: Controlling station resiliency tests <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 7.7.3 Controlled station Table 36 \u2013 Aggressive mode authentication: Controlled station normal procedure tests <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Table 37 \u2013 Aggressive Mode Authentication: Controlled station resiliency tests <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 8 Tests results chart 8.1 Verification of configuration parameters Table 38 \u2013 Test results chart: Configuration parameters <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 8.2 Verification of communication 8.2.1 ASDUs segmentation control Table 39 \u2013 Test results chart: ASDU segmentation control <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 8.2.2 User management ASDUs Table 40 \u2013 Test results chart: User managements ASDUs <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 8.2.3 Update key maintenance ASDUs Table 41 \u2013 Test results chart: Update key maintenance ASDUs <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 8.2.4 Session key maintenance ASDUs Table 42 \u2013 Test results chart: Session key maintenance ASDUs <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 8.2.5 Challenge\/reply and aggressive mode authentication ASDUs Table 43 \u2013 Test results chart: Challenge\/reply and aggressive mode authentication ASDUs <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 8.2.6 Security statistics ASDU Table 44 \u2013 Test results chart: Security statistics ASDU <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 8.3 Verification of procedures 8.3.1 User management Table 45 \u2013 Test results chart: User management procedure \u2013 Controlling station <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | Table 46 \u2013 Test results chart: User management procedure \u2013 Controlled Station <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 8.3.2 Update key maintenance \u2013 Symmetric Table 47 \u2013 Test results chart: Update key maintenance \u2013 Symmetric \u2013 Controlling station <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | Table 48 \u2013 Test results chart: Update key maintenance \u2013 Symmetric \u2013 Controlled station <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 8.3.3 Update key maintenance \u2013 Asymmetric Table 49 \u2013 Test results chart: Update key maintenance \u2013 Asymmetric \u2013 Controlling station <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | Table 50 \u2013 Test results chart: Update key maintenance \u2013 Asymmetric \u2013 Controlled station <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 8.3.4 Session key maintenance Table 51 \u2013 Test results chart: Session key maintenance \u2013 Controlling station <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | Table 52 \u2013 Test results chart: Session key maintenance \u2013 Controlled station <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 8.3.5 Challenge\/reply authentication Table 53 \u2013 Test results chart: Challenge\/reply authentication \u2013 Controlling station <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | Table 54 \u2013 Test results chart: Challenge\/reply authentication \u2013 Controlled station <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 8.3.6 Aggressive mode authentication Table 55 \u2013 Test results chart: Aggressive mode authentication \u2013 Controlling station <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | Table 56 \u2013 Test results chart: Aggressive mode authentication \u2013 Controlled station <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Power systems management and associated information exchange. Data and communications security – Conformance test cases for IEC TS 62351-5 and IEC TS 60870-5-7<\/b><\/p>\n |