{"id":255573,"date":"2024-10-19T16:53:44","date_gmt":"2024-10-19T16:53:44","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-ts-62351-100-12018\/"},"modified":"2024-10-25T12:21:39","modified_gmt":"2024-10-25T12:21:39","slug":"bsi-pd-iec-ts-62351-100-12018","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-ts-62351-100-12018\/","title":{"rendered":"BSI PD IEC TS 62351-100-1:2018"},"content":{"rendered":"

This part of IEC 62351, which is a technical specification, describes test cases of data and communication security for telecontrol equipment, substation automation systems (SAS) and telecontrol systems, including front-end functions of SCADA.<\/p>\n

The goal of this document is to enable interoperability by providing a standard method of testing protocol implementations to verify that a device fulfils the requirement of the standard. Note that conformity to the standard does not guarantee interoperability between devices using different implementations. It is expected that using this specification during testing will minimize the risk of non-interoperability. A basic condition for this interoperability is a passed conformance test of both devices.<\/p>\n

The scope of this document is to specify commonly available procedures and definitions for conformance and\/or interoperability testing of IEC TS 62351-5 and IEC TS 60870-5-7. The conformance test cases defined herein are focused to verify the conformant integration of the underlying authentication, as specified in IEC TS 62351-5 and IEC TS 60870-5-7, to protect IEC 60870-5-101 and IEC 6870-5-104-based communications.<\/p>\n

This document deals with data and communication security conformance testing; therefore, other requirements, such as safety or EMC, are not covered. These requirements are covered by other standards (if applicable) and the proof of compliance for these topics is done according to these standards.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
4<\/td>\nCONTENTS <\/td>\n<\/tr>\n
8<\/td>\nFOREWORD <\/td>\n<\/tr>\n
10<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
12<\/td>\n3 Terms, definitions and abbreviated terms
3.1 Terms and definitions <\/td>\n<\/tr>\n
14<\/td>\n3.2 Abbreviated terms
4 General
4.1 Normatives covered by this technical specification
4.2 Conformance testing structure
4.2.1 General <\/td>\n<\/tr>\n
15<\/td>\n4.2.2 Conformance testing of security extension procedures
Figure 1 \u2013 IEC TS 62351-5 Security extension procedures <\/td>\n<\/tr>\n
16<\/td>\n4.2.3 Conformance testing addressed per station type
4.2.4 Normal procedure tests and resiliency tests
4.3 Conformance testing requirements
4.3.1 Testing base protocols with security extension
4.3.2 Testing of profiles including TCP\/IP
4.3.3 Requirements for the device under test <\/td>\n<\/tr>\n
17<\/td>\n4.3.4 Requirements for the test facility
4.3.5 Test logging <\/td>\n<\/tr>\n
18<\/td>\n5 Verification of configuration parameters
5.1 General
5.2 System definition <\/td>\n<\/tr>\n
19<\/td>\nTables
Table 1 \u2013 Configuration parameters: System definition <\/td>\n<\/tr>\n
20<\/td>\n5.3 Application security extension <\/td>\n<\/tr>\n
21<\/td>\nTable 2 \u2013 Configuration parameters: Application security extension <\/td>\n<\/tr>\n
23<\/td>\n6 Verification of Communication
6.1 General
6.2 ASDU segmentation control <\/td>\n<\/tr>\n
24<\/td>\nTable 3 \u2013 ASDU segmentation control <\/td>\n<\/tr>\n
25<\/td>\n6.3 Verification of ASDUs
6.3.1 User management ASDUs
Table 4 \u2013 User management ASDUs <\/td>\n<\/tr>\n
28<\/td>\n6.3.2 Update key maintenance ASDUs
Table 5 \u2013 Update key maintenance ASDUs <\/td>\n<\/tr>\n
34<\/td>\n6.3.3 Session key maintenance ASDUs
Table 6 \u2013 Session key maintenance ASDUs <\/td>\n<\/tr>\n
37<\/td>\n6.3.4 Challenge\/reply and aggressive mode authentication ASDUs
Table 7 \u2013 Challenge\/reply and aggressive mode authentication ASDUs <\/td>\n<\/tr>\n
41<\/td>\n6.3.5 Security statistics ASDU
7 Verification of procedures
7.1 General
Table 8 \u2013 Security statistics ASDU <\/td>\n<\/tr>\n
42<\/td>\n7.2 User management
7.2.1 General <\/td>\n<\/tr>\n
43<\/td>\n7.2.2 Controlling station
Table 9 \u2013 User management: Controlling station normal procedure tests <\/td>\n<\/tr>\n
44<\/td>\nTable 10 \u2013 User management: Controlling station resiliency tests <\/td>\n<\/tr>\n
45<\/td>\n7.2.3 Controlled station
Table 11 \u2013 User management: Controlled station normal procedure tests <\/td>\n<\/tr>\n
46<\/td>\nTable 12 \u2013 User management: Controlled station resiliency tests <\/td>\n<\/tr>\n
50<\/td>\n7.3 Update key maintenance – Symmetric
7.3.1 General
7.3.2 Controlling station
Table 13 \u2013 Update key maintenance \u2013 Symmetric: Controlling station triggering conditions <\/td>\n<\/tr>\n
51<\/td>\nTable 14 \u2013 Update key maintenance \u2013 Symmetric: Controlling station normal procedure tests <\/td>\n<\/tr>\n
52<\/td>\nTable 15 \u2013 Update key maintenance \u2013 Symmetric: Controlling station resiliency tests <\/td>\n<\/tr>\n
54<\/td>\n7.3.3 Controlled station
Table 16 \u2013 Update key maintenance \u2013 Symmetric: Controlled station normal procedure tests <\/td>\n<\/tr>\n
55<\/td>\nTable 17 \u2013 Update key maintenance \u2013 Symmetric: Controlled station resiliency tests <\/td>\n<\/tr>\n
56<\/td>\n7.4 Update key maintenance \u2013 Asymmetric
7.4.1 General <\/td>\n<\/tr>\n
57<\/td>\n7.4.2 Controlling station
Table 18 \u2013 Update key maintenance \u2013 Asymmetric: Controlling station triggering conditions <\/td>\n<\/tr>\n
58<\/td>\nTable 19 \u2013 Update key maintenance \u2013 Asymmetric: Controlling station normal procedure tests <\/td>\n<\/tr>\n
59<\/td>\nTable 20 \u2013 Update key maintenance \u2013 Asymmetric: Controlling station resiliency tests <\/td>\n<\/tr>\n
61<\/td>\n7.4.3 Controlled station
Table 21 \u2013 Update key maintenance \u2013 Asymmetric: Controlled station normal procedure tests <\/td>\n<\/tr>\n
62<\/td>\nTable 22 \u2013 Update key maintenance \u2013 Asymmetric: Controlled station resiliency tests <\/td>\n<\/tr>\n
63<\/td>\n7.5 Session key maintenance
7.5.1 General <\/td>\n<\/tr>\n
64<\/td>\n7.5.2 Controlling station
Table 23 \u2013 Session key maintenance: Controlling station triggering conditions <\/td>\n<\/tr>\n
65<\/td>\nTable 24 \u2013 Session key maintenance: Controlling station normal procedure tests <\/td>\n<\/tr>\n
66<\/td>\nTable 25 \u2013 Session key maintenance: Controlling station resiliency tests <\/td>\n<\/tr>\n
69<\/td>\n7.5.3 Controlled station
Table 26 \u2013 Session key maintenance: Controlled station invalidating session key <\/td>\n<\/tr>\n
70<\/td>\nTable 27 \u2013 Session key maintenance: Controlled station normal procedure tests <\/td>\n<\/tr>\n
71<\/td>\n7.6 Challenge\/reply authentication
7.6.1 General
Table 28 \u2013 Session key maintenance: Controlled station resiliency tests <\/td>\n<\/tr>\n
72<\/td>\n7.6.2 Controlling station
Table 29 \u2013 Challenge\/reply authentication: Controlling station triggering conditions <\/td>\n<\/tr>\n
73<\/td>\nTable 30 \u2013 Challenge\/reply authentication: Controlling station normal procedure tests <\/td>\n<\/tr>\n
74<\/td>\nTable 31 \u2013 Challenge\/reply authentication: Controlling station resiliency tests <\/td>\n<\/tr>\n
78<\/td>\n7.6.3 Controlled station
Table 32 \u2013 Challenge\/reply authentication: Controlled station normal procedure tests <\/td>\n<\/tr>\n
79<\/td>\nTable 33 \u2013 Challenge\/reply authentication: Controlled station resiliency tests <\/td>\n<\/tr>\n
82<\/td>\n7.7 Aggressive mode authentication
7.7.1 General <\/td>\n<\/tr>\n
83<\/td>\n7.7.2 Controlling station
Table 34 \u2013 Aggressive mode authentication: Controlling station normal procedure tests <\/td>\n<\/tr>\n
84<\/td>\nTable 35 \u2013 Aggressive mode authentication: Controlling station resiliency tests <\/td>\n<\/tr>\n
86<\/td>\n7.7.3 Controlled station
Table 36 \u2013 Aggressive mode authentication: Controlled station normal procedure tests <\/td>\n<\/tr>\n
87<\/td>\nTable 37 \u2013 Aggressive Mode Authentication: Controlled station resiliency tests <\/td>\n<\/tr>\n
89<\/td>\n8 Tests results chart
8.1 Verification of configuration parameters
Table 38 \u2013 Test results chart: Configuration parameters <\/td>\n<\/tr>\n
90<\/td>\n8.2 Verification of communication
8.2.1 ASDUs segmentation control
Table 39 \u2013 Test results chart: ASDU segmentation control <\/td>\n<\/tr>\n
91<\/td>\n8.2.2 User management ASDUs
Table 40 \u2013 Test results chart: User managements ASDUs <\/td>\n<\/tr>\n
92<\/td>\n8.2.3 Update key maintenance ASDUs
Table 41 \u2013 Test results chart: Update key maintenance ASDUs <\/td>\n<\/tr>\n
94<\/td>\n8.2.4 Session key maintenance ASDUs
Table 42 \u2013 Test results chart: Session key maintenance ASDUs <\/td>\n<\/tr>\n
95<\/td>\n8.2.5 Challenge\/reply and aggressive mode authentication ASDUs
Table 43 \u2013 Test results chart: Challenge\/reply and aggressive mode authentication ASDUs <\/td>\n<\/tr>\n
96<\/td>\n8.2.6 Security statistics ASDU
Table 44 \u2013 Test results chart: Security statistics ASDU <\/td>\n<\/tr>\n
97<\/td>\n8.3 Verification of procedures
8.3.1 User management
Table 45 \u2013 Test results chart: User management procedure \u2013 Controlling station <\/td>\n<\/tr>\n
98<\/td>\nTable 46 \u2013 Test results chart: User management procedure \u2013 Controlled Station <\/td>\n<\/tr>\n
100<\/td>\n8.3.2 Update key maintenance \u2013 Symmetric
Table 47 \u2013 Test results chart: Update key maintenance \u2013 Symmetric \u2013 Controlling station <\/td>\n<\/tr>\n
101<\/td>\nTable 48 \u2013 Test results chart: Update key maintenance \u2013 Symmetric \u2013 Controlled station <\/td>\n<\/tr>\n
102<\/td>\n8.3.3 Update key maintenance \u2013 Asymmetric
Table 49 \u2013 Test results chart: Update key maintenance \u2013 Asymmetric \u2013 Controlling station <\/td>\n<\/tr>\n
103<\/td>\nTable 50 \u2013 Test results chart: Update key maintenance \u2013 Asymmetric \u2013 Controlled station <\/td>\n<\/tr>\n
104<\/td>\n8.3.4 Session key maintenance
Table 51 \u2013 Test results chart: Session key maintenance \u2013 Controlling station <\/td>\n<\/tr>\n
106<\/td>\nTable 52 \u2013 Test results chart: Session key maintenance \u2013 Controlled station <\/td>\n<\/tr>\n
107<\/td>\n8.3.5 Challenge\/reply authentication
Table 53 \u2013 Test results chart: Challenge\/reply authentication \u2013 Controlling station <\/td>\n<\/tr>\n
109<\/td>\nTable 54 \u2013 Test results chart: Challenge\/reply authentication \u2013 Controlled station <\/td>\n<\/tr>\n
111<\/td>\n8.3.6 Aggressive mode authentication
Table 55 \u2013 Test results chart: Aggressive mode authentication \u2013 Controlling station <\/td>\n<\/tr>\n
112<\/td>\nTable 56 \u2013 Test results chart: Aggressive mode authentication \u2013 Controlled station <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Power systems management and associated information exchange. Data and communications security – Conformance test cases for IEC TS 62351-5 and IEC TS 60870-5-7<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2018<\/td>\n114<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":255577,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-255573","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/255573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/255577"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=255573"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=255573"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=255573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}