edition 1.0 2017-07 international standard norme ...ed1.0}b.pdfiec 62351-7 edition 1.0 2017-07...

23
IEC 62351-7 Edition 1.0 2017-07 INTERNATIONAL STANDARD NORME INTERNATIONALE Power systems management and associated information exchange – Data and communications security – Part 7: Network and System Management (NSM) data object models Gestion des systèmes de puissance et échanges d'informations associés – Sécurité des communications et des données – Partie 7: Modèles d’objets de données de gestion de réseaux et de systèmes (NSM) INTERNATIONAL ELECTROTECHNICAL COMMISSION COMMISSION ELECTROTECHNIQUE INTERNATIONALE ICS 33.200 ISBN 978-2-8322-7271-8 ® Registered trademark of the International Electrotechnical Commission Marque déposée de la Commission Electrotechnique Internationale ® Warning! Make sure that you obtained this publication from an authorized distributor. Attention! Veuillez vous assurer que vous avez obtenu cette publication via un distributeur agréé. colour inside This is a preview - click here to buy the full publication

Upload: others

Post on 06-Feb-2021

6 views

Category:

Documents


0 download

TRANSCRIPT

  • IEC 62351-7 Edition 1.0 2017-07

    INTERNATIONAL STANDARD NORME INTERNATIONALE

    Power systems management and associated information exchange – Data and communications security – Part 7: Network and System Management (NSM) data object models Gestion des systèmes de puissance et échanges d'informations associés – Sécurité des communications et des données – Partie 7: Modèles d’objets de données de gestion de réseaux et de systèmes (NSM)

    INTERNATIONAL ELECTROTECHNICAL COMMISSION

    COMMISSION ELECTROTECHNIQUE INTERNATIONALE ICS 33.200

    ISBN 978-2-8322-7271-8

    ® Registered trademark of the International Electrotechnical Commission Marque déposée de la Commission Electrotechnique Internationale

    ®

    Warning! Make sure that you obtained this publication from an authorized distributor. Attention! Veuillez vous assurer que vous avez obtenu cette publication via un distributeur agréé.

    colourinside

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • – 2 – IEC 62351-7:2017 © IEC 2017

    CONTENTS

    FOREWORD ........................................................................................................................... 8 1 Scope ............................................................................................................................ 10 2 Normative references .................................................................................................... 10 3 Terms and definitions .................................................................................................... 12 4 Abbreviated terms and acronyms ................................................................................... 13 5 Overview of Network and System Management (NSM) .................................................. 14

    5.1 Objectives ............................................................................................................. 14 5.2 NSM concepts....................................................................................................... 15

    5.2.1 Simple Network Management Protocol (SNMP) ............................................. 15 5.2.2 ISO NSM categories ...................................................................................... 15 5.2.3 NSM “data objects” for power system operations ........................................... 16 5.2.4 Other NSM protocols ..................................................................................... 16

    5.3 Communication network management ................................................................... 16 5.3.1 Network configuration .................................................................................... 16 5.3.2 Network backup ............................................................................................. 17 5.3.3 Communications failures and degradation ..................................................... 17

    5.4 Communication protocols ...................................................................................... 18 5.5 End systems management .................................................................................... 18 5.6 Intrusion detection systems (IDS) ......................................................................... 19

    5.6.1 IDS guidelines ............................................................................................... 19 5.6.2 IDS: Passive observation techniques ............................................................. 20 5.6.3 IDS: Active security monitoring architecture with NSM data objects ............... 20

    5.7 End-to-end security ............................................................................................... 21 5.7.1 End-to-end security concepts......................................................................... 21 5.7.2 Role of NSM in end-to-end security ............................................................... 22

    5.8 NSM requirements: detection functions ................................................................. 24 5.8.1 Detecting unauthorized access ...................................................................... 24 5.8.2 Detecting resource exhaustion as a denial of service (DoS) attack ................ 24 5.8.3 Detecting invalid buffer access DoS attacks .................................................. 25 5.8.4 Detecting tampered/malformed PDUs ............................................................ 25 5.8.5 Detecting physical access disruption ............................................................. 25 5.8.6 Detecting invalid network access ................................................................... 25 5.8.7 Detecting coordinated attacks ........................................................................ 26

    5.9 Abstract object and agent UML descriptions.......................................................... 26 5.9.1 Purpose of UML ............................................................................................. 26 5.9.2 Abstract types and base types ....................................................................... 27 5.9.3 Enumerated Types......................................................................................... 28 5.9.4 Abstract agents ............................................................................................. 28 5.9.5 Unsolicited Event Notification ........................................................................ 31 5.9.6 UML Model extension .................................................................................... 31

    5.10 Abstract Object UML translation to SNMP ............................................................. 31 5.10.1 Simple Network Management Protocol (SNMP) ............................................. 31 5.10.2 Management information bases (MIBs) .......................................................... 32

    5.11 SNMP mapping of UML model Objects .................................................................. 33 5.12 SNMP Security...................................................................................................... 34

    6 Abstract objects ............................................................................................................. 36

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • IEC 62351-7:2017 © IEC 2017 – 3 –

    6.1 General ................................................................................................................. 36 6.2 Package Abstract Types ....................................................................................... 37

    6.2.1 General ......................................................................................................... 37 6.2.2 BooleanValue ................................................................................................ 37 6.2.3 BooleanValueTs ............................................................................................ 37 6.2.4 CounterTs...................................................................................................... 37 6.2.5 CntRs ............................................................................................................ 38 6.2.6 Floating ......................................................................................................... 38 6.2.7 FloatingTs ..................................................................................................... 38 6.2.8 EntityIndex .................................................................................................... 39 6.2.9 Integer ........................................................................................................... 39 6.2.10 IntegerTs ....................................................................................................... 39 6.2.11 InetAddress ................................................................................................... 40 6.2.12 InetAddressType ........................................................................................... 40 6.2.13 MacAddress ................................................................................................... 40 6.2.14 Selector ......................................................................................................... 40 6.2.15 Timestamp ..................................................................................................... 41 6.2.16 CharString ..................................................................................................... 41 6.2.17 CharStringTs ................................................................................................. 41 6.2.18 AbstractBaseType root class ......................................................................... 41 6.2.19 AbstractAgent root class ................................................................................ 42

    6.3 Package EnumeratedTypes .................................................................................. 42 6.3.1 General ......................................................................................................... 42 6.3.2 AppDatStKind enumeration ............................................................................ 42 6.3.3 PhyHealthKind enumeration........................................................................... 42 6.3.4 ExtKind enumeration ..................................................................................... 42 6.3.5 IntKind enumeration....................................................................................... 43 6.3.6 LnkKind enumeration ..................................................................................... 43 6.3.7 PSPAccKind enumeration .............................................................................. 43 6.3.8 ProtIdKind enumeration ................................................................................. 43 6.3.9 EventKind enumeration .................................................................................. 44 6.3.10 TimSyncIssueKind enumeration ..................................................................... 44 6.3.11 SecurityProfileKind enumeration .................................................................... 45 6.3.12 TimSyncSrcKind enumeration ........................................................................ 45 6.3.13 AppDatStType ............................................................................................... 45 6.3.14 PhyHealthType .............................................................................................. 46 6.3.15 ExtType ......................................................................................................... 46 6.3.16 IntType .......................................................................................................... 46 6.3.17 EventType ..................................................................................................... 46 6.3.18 PSPAccType ................................................................................................. 47 6.3.19 ProtIdType ..................................................................................................... 47 6.3.20 TimSyncIssueType ........................................................................................ 47 6.3.21 SecurityProfileType ....................................................................................... 47 6.3.22 TimSyncSrcType ........................................................................................... 48 6.3.23 LnkType ........................................................................................................ 48

    7 Agents ........................................................................................................................... 48 7.1 Package Overview ................................................................................................ 48 7.2 Package Environmental Agent .............................................................................. 50

    7.2.1 General ......................................................................................................... 50

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • – 4 – IEC 62351-7:2017 © IEC 2017

    7.2.2 Environmental ............................................................................................... 51 7.2.3 PSUPEntry .................................................................................................... 51 7.2.4 Notification .................................................................................................... 52 7.2.5 SecurityNotification ........................................................................................ 52

    7.3 Package IED Agent ............................................................................................... 53 7.3.1 General ......................................................................................................... 53 7.3.2 IED ................................................................................................................ 54 7.3.3 CPUEntry ...................................................................................................... 55 7.3.4 EXTEntry ....................................................................................................... 56 7.3.5 STOREEntry .................................................................................................. 56 7.3.6 Notification .................................................................................................... 57 7.3.7 SecurityNotification ........................................................................................ 57

    7.4 Package Application Protocols Agents .................................................................. 57 7.4.1 General ......................................................................................................... 57 7.4.2 Package Common objects ............................................................................. 58 7.4.3 Package IEEE 1815 and IEC 60870-5 Agent.................................................. 59 7.4.4 Package IEC61850 Agent .............................................................................. 68

    7.5 Package Interfaces Agent ..................................................................................... 87 7.5.1 General ......................................................................................................... 87 7.5.2 Interface ........................................................................................................ 88 7.5.3 Interfaces ...................................................................................................... 88 7.5.4 ETHEntry ....................................................................................................... 90 7.5.5 KEYEntry ....................................................................................................... 90 7.5.6 SEREntry....................................................................................................... 91 7.5.7 ALGEntry ....................................................................................................... 91 7.5.8 USBEntry....................................................................................................... 92 7.5.9 Notification .................................................................................................... 92

    7.6 Package Clocks Agent .......................................................................................... 93 7.6.1 General ......................................................................................................... 93 7.6.2 Clock ............................................................................................................. 93 7.6.3 ClockEntry ..................................................................................................... 94 7.6.4 SecurityNotification ........................................................................................ 95

    7.7 Network and Transport Agents .............................................................................. 95 7.7.1 TCP ............................................................................................................... 95 7.7.2 User Datagram Protocol (UDP) ...................................................................... 95 7.7.3 IP .................................................................................................................. 95

    8 SNMP security ............................................................................................................... 96 9 Secured time synchronization ........................................................................................ 96 Annex A (normative) SNMP MIB Mapping ............................................................................ 97 Annex B (informative) Mapping of relevant IEC 61850 Objects ........................................... 229 Bibliography ........................................................................................................................ 230 Figure 1 – Example of a power system SCADA architecture extended with NSM Data Objects ................................................................................................................................. 15 Figure 2 – IDS Information exchange between applications: generic communication topology ................................................................................................................................ 19 Figure 3 – Active security monitoring architecture with NSM data objects ............................ 21 Figure 4 – Comparison of NSM data objects with IEC 61850 objects ..................................... 23

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • IEC 62351-7:2017 © IEC 2017 – 5 –

    Figure 5 – Management of both the power system infrastructure and the information infrastructure ........................................................................................................................ 23 Figure 6 – Abstract types ...................................................................................................... 27 Figure 7 – Enumerated types ................................................................................................ 28 Figure 8 – Subagents ............................................................................................................ 29 Figure 9 – Environmental agent ............................................................................................ 30 Figure 10 – Model stereotypes .............................................................................................. 30 Figure 11 – Object identifier structure ................................................................................... 32 Figure 12 – SNMP table ........................................................................................................ 34 Figure 13 – SNMP RFCs map and security ........................................................................... 35 Figure 14 – SNMP Entity ....................................................................................................... 36 Figure 15 – Class diagram Overview::Part7 Classes Overview .............................................. 49 Figure 16 – Class diagram Environmental Agent::Environmental ........................................... 50 Figure 17 – Class diagram IED Agent::IED ........................................................................... 53 Figure 18 – Class diagram Common objects::Application Protocol common objects ............. 58 Figure 19 – Class diagram IEEE 1815 and IEC 60870-5 Agent::IEEE 1815 and IEC 60870 Agent Relationships ............................................................................................. 60 Figure 20 – Class diagram ACSI::ACSI ................................................................................. 69 Figure 21 – Class diagram MMS::MMS ................................................................................. 71 Figure 22 – Class diagram SV and GSE common objects::SV and GSE common objects .................................................................................................................................. 76 Figure 23 – Class diagram SV::SV ........................................................................................ 78 Figure 24 – Class diagram GSE::GSE ................................................................................... 82 Figure 25 – Class diagram Interfaces Agent::Interfaces ........................................................ 87 Figure 26 – Class diagram Clocks Agent::Clocks Agent ........................................................ 93 Table 1 – Attributes of Abstract Types::BooleanValue ........................................................... 37 Table 2 – Attributes of Abstract Types::BooleanValueTs ....................................................... 37 Table 3 – Attributes of Abstract Types::CounterTs ................................................................ 38 Table 4 – Attributes of Abstract Types::CntRs ....................................................................... 38 Table 5 – Attributes of Abstract Types::Floating .................................................................... 38 Table 6 – Attributes of Abstract Types::FloatingTs ................................................................ 39 Table 7 – Attributes of Abstract Types::EntityIndex ............................................................... 39 Table 8 – Attributes of Abstract Types::Integer ..................................................................... 39 Table 9 – Attributes of Abstract Types::IntegerTs .................................................................. 39 Table 10 – Attributes of Abstract Types::InetAddress ............................................................ 40 Table 11 – Attributes of Abstract Types::InetAddressType .................................................... 40 Table 12 – Attributes of Abstract Types::MacAddress ........................................................... 40 Table 13 – Attributes of Abstract Types::Selector .................................................................. 41 Table 14 – Attributes of Abstract Types::Timestamp ............................................................. 41 Table 15 – Attributes of Abstract Types::CharString .............................................................. 41 Table 16 – Attributes of Abstract Types::CharStringTs .......................................................... 41 Table 17 – Literals of EnumeratedTypes::AppDatStKind ....................................................... 42 Table 18 – Literals of EnumeratedTypes::PhyHealthKind ...................................................... 42

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • – 6 – IEC 62351-7:2017 © IEC 2017

    Table 19 – Literals of EnumeratedTypes::ExtKind ................................................................. 43 Table 20 – Literals of EnumeratedTypes::IntKind .................................................................. 43 Table 21 – Literals of EnumeratedTypes::LnkKind ................................................................ 43 Table 22 – Literals of EnumeratedTypes::PSPAccKind ......................................................... 43 Table 23 – Literals of EnumeratedTypes::ProtIdKind ............................................................. 44 Table 24 – Literals of EnumeratedTypes::EventKind ............................................................. 44 Table 25 – Literals of EnumeratedTypes::TimSyncIssueKind ................................................ 44 Table 26 – Literals of EnumeratedTypes::SecurityProfileKind ............................................... 45 Table 27 – Literals of EnumeratedTypes::TimSyncSrcKind ................................................... 45 Table 28 – Attributes of EnumeratedTypes::AppDatStType ................................................... 46 Table 29 – Attributes of EnumeratedTypes::PhyHealthType .................................................. 46 Table 30 – Attributes of EnumeratedTypes::ExtType ............................................................. 46 Table 31 – Attributes of EnumeratedTypes::IntType .............................................................. 46 Table 32 – Attributes of EnumeratedTypes::EventType ......................................................... 47 Table 33 – Attributes of EnumeratedTypes::PSPAccType ..................................................... 47 Table 34 – Attributes of EnumeratedTypes::ProtIdType ........................................................ 47 Table 35 – Attributes of EnumeratedTypes::TimSyncIssueType ............................................ 47 Table 36 – Attributes of EnumeratedTypes::SecurityProfileType ........................................... 48 Table 37 – Attributes of EnumeratedTypes::TimSyncSrcType ............................................... 48 Table 38 – Attributes of EnumeratedTypes::LnkType ............................................................ 48 Table 39 – Attributes of Environmental Agent::Environmental ............................................... 51 Table 40 – Attributes of Environmental Agent::PSUPEntry .................................................... 51 Table 41 – Attributes of Environmental Agent::Notification .................................................... 52 Table 42 – Attributes of Environmental Agent::SecurityNotification ....................................... 52 Table 43 – Attributes of IED Agent::IED ................................................................................ 54 Table 44 – Attributes of IED Agent::CPUEntry....................................................................... 55 Table 45 – Attributes of IED Agent::EXTEntry ....................................................................... 56 Table 46 – Attributes of IED Agent::STOREEntry .................................................................. 56 Table 47 – Attributes of IED Agent::Notification .................................................................... 57 Table 48 – Attributes of IED Agent::SecurityNotification ........................................................ 57 Table 49 – Attributes of Common objects::CommonProtocolInfo ........................................... 58 Table 50 – Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPProtocolInfo ......................................................................................... 61 Table 51 – Attributes of IEEE 1815 and IEC 60870-5 Agent::Association .............................. 62 Table 52 – Attributes of IEEE 1815 and IEC 60870-5 Agent::Summary ................................. 64 Table 53 – Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPSecurityNotification ............................................................................. 65 Table 54 – Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPNotification ....... 65 Table 55 – Attributes of IEEE 1815 and IEC 60870-5 Agent::MasterAssociation .................. 66 Table 56 – Attributes of IEEE 1815 and IEC 60870-5 Agent::OutstationAssociation ............. 67 Table 57 – Attributes of ACSI::ACSISummary ....................................................................... 70 Table 58 – Attributes of MMS::MMSProtocolInfo ................................................................... 72 Table 59 – Attributes of MMS::MMSProvider ......................................................................... 73 Table 60 – Attributes of MMS::MMSAssociation .................................................................... 74

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • IEC 62351-7:2017 © IEC 2017 – 7 –

    Table 61 – Attributes of MMS::MMSSecurityNotification ........................................................ 75 Table 62 – Attributes of MMS::MMSNotification .................................................................... 75 Table 63 – Attributes of SV and GSE common objects::GSEandSVCommon ........................ 76 Table 64 – Attributes of SV and GSE common objects::GSEandSVPublisherAssociation .............................................................................. 77 Table 65 – Attributes of SV and GSE common objects::GSEandSVSubscriberAssociation ............................................................................ 77 Table 66 – Attributes of SV::SVProvider................................................................................ 79 Table 67 – Attributes of SV::SVPublisherAssociationIP ......................................................... 79 Table 68 – Attributes of SV::SVPublisherAssociationL2 ........................................................ 80 Table 69 – Attributes of SV::SVSubcriberAssociationIP......................................................... 80 Table 70 – Attributes of SV::SVSubcriberAssociationL2 ........................................................ 81 Table 71 – Attributes of SV::SVNotification ........................................................................... 81 Table 72 – Attributes of GSE::GSESubscriberAssociation ..................................................... 83 Table 73 – Attributes of GSE::GSEProvider .......................................................................... 83 Table 74 – Attributes of GSE::GSEPublisherAssociationIP .................................................... 84 Table 75 – Attributes of GSE::GSEPublisherAssociationL2 ................................................... 84 Table 76 – Attributes of GSE::GSESubcriberAssociationIP ................................................... 85 Table 77 – Attributes of GSE::GSESubscriberAssociationL2 ................................................. 85 Table 78 – Attributes of GSE::GSENotification ...................................................................... 86 Table 79 – Attributes of Interfaces Agent::Interface............................................................... 88 Table 80 – Attributes of Interfaces Agent::Interfaces ............................................................. 89 Table 81 – Attributes of Interfaces Agent::ETHEntry ............................................................. 90 Table 82 – Attributes of Interfaces Agent::KEYEntry ............................................................. 90 Table 83 – Attributes of Interfaces Agent::SEREntry ............................................................. 91 Table 84 – Attributes of Interfaces Agent::ALGEntry ............................................................. 91 Table 85 – Attributes of Interfaces Agent::USBEntry ............................................................. 92 Table 86 – Attributes of Interfaces Agent::Notification ........................................................... 92 Table 87 – Attributes of Clocks Agent::Clock ........................................................................ 93 Table 88 – Attributes of Clocks Agent::ClockEntry ................................................................ 94 Table 89 – Attributes of Clocks Agent::SecurityNotification ................................................... 95 Table B.1 – IEC 61850-7-4 objects mapping ....................................................................... 229

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • – 8 – IEC 62351-7:2017 © IEC 2017

    INTERNATIONAL ELECTROTECHNICAL COMMISSION

    ____________

    POWER SYSTEMS MANAGEMENT AND

    ASSOCIATED INFORMATION EXCHANGE – DATA AND COMMUNICATIONS SECURITY –

    Part 7: Network and System Management (NSM) data object models

    FOREWORD

    1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising all national electrotechnical committees (IEC National Committees). The object of IEC is to promote international co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and in addition to other activities, IEC publishes International Standards, Technical Specifications, Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with may participate in this preparatory work. International, governmental and non-governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely with the International Organization for Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.

    2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international consensus of opinion on the relevant subjects since each technical committee has representation from all interested IEC National Committees.

    3) IEC Publications have the form of recommendations for international use and are accepted by IEC National Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any misinterpretation by any end user.

    4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications transparently to the maximum extent possible in their national and regional publications. Any divergence between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in the latter.

    5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any services carried out by independent certification bodies.

    6) All users should ensure that they have the latest edition of this publication.

    7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and members of its technical committees and IEC National Committees for any personal injury, property damage or other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC Publications.

    8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is indispensable for the correct application of this publication.

    9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of patent rights. IEC shall not be held responsible for identifying any or all such patent rights.

    International Standard IEC 62351-7 has been prepared by IEC technical committee 57: Power systems management and associated information exchange.

    This edition of IEC 62351-7 cancels and replaces IEC TS 62351-7 published in 2010. This new edition constitutes a technical revision and includes the following significant technical changes with respect to IEC TS 62351-7:2010:

    a) NSM object data model reviewed and enriched;

    b) UML model adopted for NSM objects description;

    c) SNMP protocol MIBs translation included as Code Components.

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • IEC 62351-7:2017 © IEC 2017 – 9 –

    This bilingual version (2019-08) corresponds to the monolingual English version, published in 2017-07.

    The text of this International Standard is based on the following documents:

    FDIS Report on voting

    57/1857/FDIS 57/1885/RVD

    Full information on the voting for the approval of this International Standard can be found in the report on voting indicated in the above table.

    The French version of this standard has not been voted upon.

    This document has been drafted in accordance with the ISO/IEC Directives, Part 2.

    A list of all parts of the IEC 62351 series, under the general title: Power systems management and associated information exchange – Data and communications security, can be found on the IEC website.

    This IEC standard includes Code Components i.e components that are intended to be directly processed by a computer. Such content is any text found between the markers and , or otherwise is clearly labeled in this standard as a Code Component.

    The purchase of this IEC standard carries a copyright license for the purchaser to sell software containing Code Components from this standard directly to end users and to end users via distributors, subject to IEC software licensing conditions, which can be found at: http://www.iec.ch/CCv1.

    The Code Components included in this IEC standard are also available as electronic machine readable file at: http://www.iec.ch/tc57/supportdocuments/IEC_62351-7.MIBS.light.zip.

    The committee has decided that the contents of this document will remain unchanged until the stability date indicated on the IEC website under "http://webstore.iec.ch" in the data related to the specific document. At this date, the document will be

    • reconfirmed,

    • withdrawn,

    • replaced by a revised edition, or

    • amended.

    A bilingual version of this publication may be issued at a later date.

    IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates that it contains colours which are considered to be useful for the correct understanding of its contents. Users should therefore print this document using a colour printer.

    This is a preview - click here to buy the full publication

    http://www.iec.ch/tc57/supportdocuments/IEC_62351-7.MIBS.light.ziphttps://webstore.iec.ch/publication/30593&preview

  • – 10 – IEC 62351-7:2017 © IEC 2017

    POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE – DATA AND COMMUNICATIONS SECURITY –

    Part 7: Network and System Management (NSM) data object models

    1 Scope

    This part of IEC 62351 defines network and system management (NSM) data object models that are specific to power system operations. These NSM data objects will be used to monitor the health of networks and systems, to detect possible security intrusions, and to manage the performance and reliability of the information infrastructure. The goal is to define a set of abstract objects that will allow the remote monitoring of the health and condition of IEDs (Intelligent Electronic Devices), RTUs (Remote Terminal Units), DERs (Distributed Energy Resources) systems and other systems that are important to power system operations.

    Power systems operations are increasingly reliant on information infrastructures, including communication networks, IEDs, and self-defining communication protocols. Therefore, management of the information infrastructure has become crucial to providing the necessary high levels of security and reliability in power system operations.

    The telecommunication infrastructure that is in use for the transport of telecontrol and automation protocols is already subject to health and condition monitoring control, using the concepts developed in the IETF Simple Network Management Protocol (SNMP) standards for network management. However, power system specific devices (like teleprotection, telecontrol, substation automation, synchrophasors, inverters and protections) need instead a specific solution for monitoring their health.

    The NSM objects provide monitoring data for IEC protocols used for power systems (IEC 61850, IEC 60870-5-104) and device specific environmental and security status. As a derivative of IEC 60870-5-104, IEEE 1815 DNP3 is also included in the list of monitored protocols. The NSM data objects use the naming conventions developed for IEC 61850, expanded to address NSM issues. For the sake of generality these data objects, and the data types of which they are comprised, are defined as abstract models of data objects.

    In addition to the abstract model, in order to allow the integration of the monitoring of power system devices within the NSM environment in this part of IEC 62351, a mapping of objects to the SNMP protocol of Management Information Base (MIBs) is provided.

    The objects that are already covered by existing MIBs are not defined here but are expected to be compliant with existing MIB standards.

    2 Normative references

    The following documents are referred to in the text in such a way that some or all of their content constitutes requirements of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.

    IEC TS 62351-1, Power systems management and associated information exchange – Data and communications security – Part 1: Communication network and system security – Introduction to security issues

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • IEC 62351-7:2017 © IEC 2017 – 11 –

    IEC TS 62351-2, Power systems management and associated information exchange – Data and communications security – Part 2: Glossary of terms

    IEC 62351-3, Power systems management and associated information exchange – Data and communications security – Part 3: Communication network and system security – Profiles including TCP/IP

    IEC 62351-4:2018, Power systems management and associated information exchange – Data and communications security – Part 4: Profiles including MMS

    IEC TS 62351-5, Power systems management and associated information exchange – Data and communications security – Part 5: Security for IEC 60870-5 and derivatives

    IEC TS 62351-8, Power systems management and associated information exchange – Data and communications security – Part 8: Role-based access control

    IEC 62351-9, Power systems management and associated information exchange – Data and communications security – Part 9: Cyber security key management for power system equipment

    IEEE 754:2008, IEEE Standard for Floating-Point Arithmetic

    IETF RFC 2578, Structure of Management Information Version 2 (SMIv2), April 1999, http://tools.ietf.org/html/rfc2578

    IETF RFC 3410, Introduction and Applicability Statements for Internet-Standard Management Framework, December 2002, http://tools.ietf.org/rfc/rfc3410

    IETF RFC 3414, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3), December 2002, http://tools.ietf.org/rfc/rfc3414

    IETF RFC 3826, The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model, June 2004, http://www.rfc-editor.org/rfc/rfc3826

    IETF RFC 4022, Management Information Base for the Transmission Control Protocol (TCP), March 2005, http://tools.ietf.org/html/rfc4022

    IETF RFC 4113, Management Information Base for the User Datagram Protocol (UDP), June 2005, http://tools.ietf.org/html/rfc4113

    IETF RFC 4292, IP Forwarding Table MIB, April 2006, http://www.rfc-editor.org/rfc/rfc4292

    IETF RFC 4293, Management Information Base for the Internet Protocol (IP), April 2006, http://tools.ietf.org/rfc/rfc4293

    IETF RFC 4898, TCP Extended Statistics MIB, May 2007, http://tools.ietf.org/rfc/rfc4898

    IETF RFC 5132, IP Multicast MIB, December 2007, http://tools.ietf.org/rfc/rfc5132

    IETF RFC 5905, Network Time Protocol Version 4: Protocol and Algorithms Specification, June 2010, http://tools.ietf.org/rfc/rfc5905

    IETF RFC 5590, Transport Subsystem for the Simple Network Management Protocol (SNMP), June 2009, http://tools.ietf.org/rfc/rfc5590

    This is a preview - click here to buy the full publication

    http://tools.ietf.org/html/rfc2578http://tools.ietf.org/rfc/rfc3410http://tools.ietf.org/rfc/rfc3414http://tools.ietf.org/html/rfc4022http://tools.ietf.org/html/rfc4113http://tools.ietf.org/rfc/rfc4293http://tools.ietf.org/rfc/rfc4898https://webstore.iec.ch/publication/30593&preview

  • – 12 – IEC 62351-7:2017 © IEC 2017

    IETF RFC 5591, Transport Security Model for the Simple Network Management Protocol (SNMP), June 2009, http://tools.ietf.org/rfc/rfc5591

    IETF RFC 5592, Secure Shell Transport Model for the Simple Network Management Protocol (SNMP), June 2009, http://www.rfc-editor.org/rfc/rfc5592

    IETF RFC 5953, Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP), August 2010, http://www.rfc-editor.org/rfc/rfc5953

    IETF RFC 6347, Datagram Transport Layer Security Version 1.2, January 2012, http://tools.ietf.org/rfc/rfc6347

    IETF RFC 6353, Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP), July 2011, http://tools.ietf.org/rfc/rfc6353

    IETF RFC 7860, HMAC-SHA-2, Authentication Protocols in User-Based Security Model (USM) for SNMPv3, April 2016, http://tools.ietf.org/rfc/rfc7860

    3 Terms and definitions

    For the purposes of this document, the terms and definitions given in IEC TS 62351-2 and the following apply.

    ISO and IEC maintain terminological databases for use in standardization at the following addresses:

    • IEC Electropedia: available at http://www.electropedia.org/

    • ISO Online browsing platform: available at http://www.iso.org/obp

    3.1 Unified Modelling Language UML general-purpose modeling language with a semantic specification, a graphical notation, an interchange format, and a repository query interface, designed for use in object-oriented software applications, including those based on technologies recommended by the Object Management Group (OMG)

    [SOURCE: ISO/IEC 19501:2005, Introduction]

    3.2 Structure of Management Information SMlv2 adapted subset of OSI's Abstract Syntax Notation One, ASN.1 used to write Management Information Base (MIB) modules (RFC 2578), which defines fundamental data types, an object model, and the rules for writing and revising MIB modules

    [SOURCE: adapted from IETF RFC 3410, 7.1]

    3.3 Transport Security Model Security Model for the Simple Network Management Protocol for use with secure Transport Models in the Transport Subsystem

    [SOURCE: adapted from IETF RFC 5590, 3.2.1]

    This is a preview - click here to buy the full publication

    http://tools.ietf.org/rfc/rfc5591http://tools.ietf.org/rfc/rfc6347http://tools.ietf.org/rfc/rfc6353http://www.iso.org/obphttps://webstore.iec.ch/publication/30593&preview

  • – 234 – IEC 62351-7:2017 © IEC 2017

    SOMMAIRE

    SOMMAIRE ........................................................................................................................ 234 AVANT-PROPOS ................................................................................................................ 240 1 Domaine d’application ................................................................................................. 242 2 Références normatives ................................................................................................ 243 3 Termes et définitions ................................................................................................... 244 4 Abréviations et acronymes ........................................................................................... 245 5 Présentation de la gestion de réseau et de système (NSM) ......................................... 246

    5.1 Objectifs ............................................................................................................. 246 5.2 Concepts NSM .................................................................................................... 248

    5.2.1 Protocole simple de gestion de réseau (SNMP) ........................................... 248 5.2.2 Catégories NSM de l’ISO ............................................................................. 249 5.2.3 “data objects” (« Objets de données ») NSM pour les opérations de

    systèmes de puissance ................................................................................ 249 5.2.4 Autres protocoles NSM ................................................................................ 249

    5.3 Gestion des réseaux de communication .............................................................. 249 5.3.1 Configuration de réseau .............................................................................. 249 5.3.2 Sauvegarde de réseau ................................................................................. 250 5.3.3 Défaillances et détériorations des communications ...................................... 251

    5.4 Protocoles de communication ............................................................................. 251 5.5 Gestion des systèmes terminaux ......................................................................... 252 5.6 Systèmes de détection d’intrusion (IDS) .............................................................. 253

    5.6.1 Lignes directrices pour IDS .......................................................................... 253 5.6.2 IDS: Techniques d’observation passive ....................................................... 254 5.6.3 IDS: Architecture de surveillance de sécurité active avec objets de

    données NSM .............................................................................................. 255 5.7 Sécurité de bout en bout ..................................................................................... 256

    5.7.1 Concepts de sécurité de bout en bout .......................................................... 256 5.7.2 Rôle de la NSM dans la sécurité de bout en bout ......................................... 257

    5.8 Exigences NSM: fonctions de détection .............................................................. 260 5.8.1 Détection d’un arrêt non autorisé ................................................................. 260 5.8.2 Détection de l’épuisement des ressources sous forme d'une attaque par

    déni de service (DoS) .................................................................................. 260 5.8.3 Détection des attaques par déni de service de l’accès à une mémoire

    tampon non valide ....................................................................................... 261 5.8.4 Détection de PDU falsifiés/malformés .......................................................... 261 5.8.5 Détection d’interruption d’accès physique .................................................... 262 5.8.6 Détection d’un accès réseau non valide ....................................................... 262 5.8.7 Détection d’attaques coordonnées ............................................................... 262

    5.9 Descriptions UML des objets et agents abstraits ................................................. 263 5.9.1 Objet du langage UML ................................................................................. 263 5.9.2 Types abstraits et types de base ................................................................. 264 5.9.3 Types énumérés .......................................................................................... 264 5.9.4 Agents abstraits ........................................................................................... 265 5.9.5 Notification d’événement non sollicité .......................................................... 268 5.9.6 Extension de modèle UML ........................................................................... 268

    5.10 Traduction du langage UML des objets abstraits en protocole SNMP .................. 269 5.10.1 Protocole simple de gestion de réseau (SNMP) ........................................... 269

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • IEC 62351-7:2017 © IEC 2017 – 235 –

    5.10.2 Bases d’informations de gestion (MIB) ......................................................... 269 5.11 Mise en correspondance SNMP des objets de modèle UML ................................ 270 5.12 Sécurité SNMP ................................................................................................... 272

    6 Objets abstraits ........................................................................................................... 275 6.1 Généralités ......................................................................................................... 275 6.2 Ensemble Abstract Types (Types abstraits) ........................................................ 275

    6.2.1 Généralités .................................................................................................. 275 6.2.2 BooleanValue .............................................................................................. 275 6.2.3 BooleanValueTs .......................................................................................... 276 6.2.4 CounterTs.................................................................................................... 276 6.2.5 CntRs .......................................................................................................... 276 6.2.6 Floating (Flottante) ...................................................................................... 277 6.2.7 FloatingTs ................................................................................................... 277 6.2.8 EntityIndex .................................................................................................. 277 6.2.9 Integer (Entière) .......................................................................................... 277 6.2.10 IntegerTs ..................................................................................................... 278 6.2.11 InetAddress ................................................................................................. 278 6.2.12 InetAddressType ......................................................................................... 278 6.2.13 MacAddress ................................................................................................. 278 6.2.14 Selector (Sélecteur) ..................................................................................... 279 6.2.15 Timestamp (Horodatage) ............................................................................. 279 6.2.16 CharString ................................................................................................... 279 6.2.17 CharStringTs ............................................................................................... 280 6.2.18 Classe de racine AbstractBaseType ............................................................ 280 6.2.19 Classe de racine AbstractAgent ................................................................... 280

    6.3 Ensemble EnumeratedTypes (Types énumérés) ................................................. 280 6.3.1 Généralités .................................................................................................. 280 6.3.2 Énumération AppDatStKind ......................................................................... 280 6.3.3 Énumération PhyHealthKind ........................................................................ 280 6.3.4 Énumération ExtKind ................................................................................... 281 6.3.5 Énumération IntKind .................................................................................... 281 6.3.6 Énumération LnkKind ................................................................................... 281 6.3.7 Énumération PSPAccKind ............................................................................ 282 6.3.8 Énumération ProtIdKind ............................................................................... 282 6.3.9 Énumération EventKind ............................................................................... 282 6.3.10 Énumération TimSyncIssueKind .................................................................. 283 6.3.11 Énumération SecurityProfileKind.................................................................. 283 6.3.12 Énumération TimSyncSrcKind ...................................................................... 283 6.3.13 AppDatStType ............................................................................................. 284 6.3.14 PhyHealthType ............................................................................................ 284 6.3.15 ExtType ....................................................................................................... 284 6.3.16 IntType ........................................................................................................ 284 6.3.17 EventType ................................................................................................... 285 6.3.18 PSPAccType ............................................................................................... 285 6.3.19 ProtIdType ................................................................................................... 285 6.3.20 TimSyncIssueType ...................................................................................... 285 6.3.21 SecurityProfileType ..................................................................................... 285 6.3.22 TimSyncSrcType ......................................................................................... 286 6.3.23 LnkType ...................................................................................................... 286

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • – 236 – IEC 62351-7:2017 © IEC 2017

    7 Agents ......................................................................................................................... 286 7.1 Ensemble Overview (Présentation) ..................................................................... 286 7.2 Ensemble Agent Environmental (Environnemental) ............................................. 289

    7.2.1 Généralités .................................................................................................. 289 7.2.2 Environmental (Environnemental) ................................................................ 290 7.2.3 PSUPEntry .................................................................................................. 290 7.2.4 Notification .................................................................................................. 291 7.2.5 SecurityNotification ...................................................................................... 291

    7.3 Ensemble IED Agent (Agent IED) ........................................................................ 292 7.3.1 Généralités .................................................................................................. 292 7.3.2 IED .............................................................................................................. 293 7.3.3 CPUEntry .................................................................................................... 294 7.3.4 EXTEntry ..................................................................................................... 295 7.3.5 STOREEntry ................................................................................................ 295 7.3.6 Notification .................................................................................................. 296 7.3.7 SecurityNotification ...................................................................................... 296

    7.4 Ensemble Application Protocols Agents (Agents Protocoles d’application) .......... 296 7.4.1 Généralités .................................................................................................. 296 7.4.2 Ensemble Common objects (Objets communs) ............................................ 297 7.4.3 Ensemble IEEE 1815 and IEC 60870-5 Agent (Agent IEEE 1815 et

    IEC 60870-5) ............................................................................................... 298 7.4.4 Ensemble IEC61850 Agent (Agent IEC61850) ............................................. 307

    7.5 Ensemble Interfaces Agent (Agent Interfaces) .................................................... 326 7.5.1 Généralités .................................................................................................. 326 7.5.2 Interface ...................................................................................................... 327 7.5.3 Interfaces .................................................................................................... 327 7.5.4 ETHEntry ..................................................................................................... 329 7.5.5 KEYEntry ..................................................................................................... 329 7.5.6 SEREntry..................................................................................................... 330 7.5.7 ALGEntry ..................................................................................................... 330 7.5.8 USBEntry..................................................................................................... 331 7.5.9 Notification .................................................................................................. 331

    7.6 Ensemble Clocks Agent (Agent Horloges) ........................................................... 332 7.6.1 Généralités .................................................................................................. 332 7.6.2 Clock (Horloge) ........................................................................................... 332 7.6.3 ClockEntry ................................................................................................... 333 7.6.4 SecurityNotification ...................................................................................... 334

    7.7 Agents Network and Transport (Réseau et transport) .......................................... 334 7.7.1 TCP ............................................................................................................. 334 7.7.2 Protocole de datagramme utilisateur (UDP- User Datagram Protocol) .......... 335 7.7.3 IP ................................................................................................................ 335

    8 Sécurité SNMP ............................................................................................................ 335 9 Synchronisation temporelle sécurisée .......................................................................... 336 Annexe A (normative) Mise en correspondance des MIB SNMP ......................................... 337 Annexe B (informative) Mise en correspondance des objets IEC 61850 appropriés ............ 469 Bibliographie ....................................................................................................................... 470

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • IEC 62351-7:2017 © IEC 2017 – 237 –

    Figure 1 – Exemple d’extension d'architecture SCADA d’un système de puissance avec objets de données NSM .............................................................................................. 248 Figure 2 – Échange d’informations IDS entre les applications: topologie de communication générique ................................................................................................... 253 Figure 3 – Architecture de surveillance de sécurité active avec objets de données NSM ..... 256 Figure 4 – Comparaison des objets de données NSM avec les objets définis dans l’IEC 61850 ......................................................................................................................... 258 Figure 5 – Gestion de l’infrastructure d’un système de puissance et de l’infrastructure d’information ....................................................................................................................... 259 Figure 6 – Types abstraits .................................................................................................. 264 Figure 7 – Types énumérés ................................................................................................ 265 Figure 8 – Sous-agents ....................................................................................................... 266 Figure 9 – Agent Environmental .......................................................................................... 267 Figure 10 – Stéréotypes de modèle..................................................................................... 268 Figure 11 – Structure des identificateurs d’objets ................................................................ 270 Figure 12 – Tableau SNMP ................................................................................................. 272 Figure 13 – Représentation et sécurité des protocoles RFC SNMP ..................................... 273 Figure 14 – Entité SNMP .................................................................................................... 274 Figure 15 – Diagramme de classe Presentation::Part7 Classes Overview (Présentation:: Présentation des classes Part7) .................................................................. 288 Figure 16 – Diagramme de classe Environmental Agent::Environmental (Environnemental) .............................................................................................................. 289 Figure 17 – Diagramme de classe IED Agent::IED .............................................................. 292 Figure 18 – Diagramme de classe Common Objects::Application Protocol common objects (Objets communs des protocoles d’application) ...................................................... 297 Figure 19 – Diagramme de classe IEEE 1815 and IEC 60870-5 Agent::IEEE 1815 and IEC 60870 Agent Relationships (Relations des agents IEEE 1815 et IEC 60870) ................ 299 Figure 20 – Diagramme de classe ACSI::ACSI .................................................................... 308 Figure 21 – Diagramme de classe MMS::MMS .................................................................... 310 Figure 22 – Diagramme de classe SV and GSE common objects::SV and GSE common objects (Objets communs SV et GSE) ................................................................................. 315 Figure 23 – Diagramme de classe SV::SV ........................................................................... 317 Figure 24 – Diagramme de classe GSE::GSE ..................................................................... 321 Figure 25 – Diagramme de classe Interfaces Agent::Interfaces ........................................... 326 Figure 26 – Diagramme de classe Clocks Agent::Clocks Agent (Agent Horloges) ................ 332 Tableau 1 – Attributs de AbstractTypes::BooleanValue ....................................................... 276 Tableau 2 – Attributs de AbstractTypes::BooleanValueTs ................................................... 276 Tableau 3 – Attributs de AbstractTypes::CounterTs ............................................................ 276 Tableau 4 – Attributs de AbstractTypes::CntRs ................................................................... 276 Tableau 5 – Attributs de AbstractTypes::Floating ................................................................ 277 Tableau 6 – Attributs de AbstractTypes::FloatingTs ............................................................ 277 Tableau 7 – Attributs de AbstractTypes::EntityIndex ........................................................... 277 Tableau 8 – Attributs de AbstractTypes::Integer .................................................................. 277 Tableau 9 – Attributs de AbstractTypes::IntegerTs .............................................................. 278 Tableau 10 – Attributs de AbstractTypes::InetAddress ........................................................ 278

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • – 238 – IEC 62351-7:2017 © IEC 2017

    Tableau 11 – Attributs de AbstractTypes::InetAddressType ................................................ 278 Tableau 12 – Attributs de AbstractTypes::MacAddress ....................................................... 279 Tableau 13 – Attributs de AbstractTypes::Selector .............................................................. 279 Tableau 14 – Attributs de AbstractTypes::Timestamp .......................................................... 279 Tableau 15 – Attributs de AbstractTypes::CharString .......................................................... 279 Tableau 16 – Attributs de AbstractTypes::CharStringTs ...................................................... 280 Tableau 17 – Libellés de EnumeratedTypes::AppDatStKind ................................................ 280 Tableau 18 – Libellés de EnumeratedTypes::PhyHealthKind ............................................... 281 Tableau 19 – Libellés de EnumeratedTypes::ExKind ........................................................... 281 Tableau 20 – Libellés de EnumeratedTypes::IntKind ........................................................... 281 Tableau 21 – Libellés de EnumeratedTypes::LnkKind ......................................................... 281 Tableau 22 – Libellés de EnumeratedTypes::PSPAccKind .................................................. 282 Tableau 23 – Libellés de EnumeratedTypes::ProtIdKind ..................................................... 282 Tableau 24 – Libellés de EnumeratedTypes::EventKind ...................................................... 282 Tableau 25 – Libellés de EnumeratedTypes::TimSyncIssueKind ......................................... 283 Tableau 26 – Libellés de EnumeratedTypes::SecurityProfileKind ........................................ 283 Tableau 27 – Libellés de EnumeratedTypes::TimSyncSrcKind ............................................ 283 Tableau 28 – Attributs de EnumeratedTypes::AppDatStType .............................................. 284 Tableau 29 – Attributs de EnumeratedTypes::PhyHealthType ............................................. 284 Tableau 30 – Attributs de EnumeratedTypes::ExtType ........................................................ 284 Tableau 31 – Attributs de EnumeratedTypes::IntType ......................................................... 284 Tableau 32 – Attributs de EnumeratedTypes::EventType .................................................... 285 Tableau 33 – Attributs de EnumeratedTypes::PSPAccType ................................................ 285 Tableau 34 – Attributs de EnumeratedTypes::ProtIdType .................................................... 285 Tableau 35 – Attributs de EnumeratedTypes::TimSyncIssueType ....................................... 285 Tableau 36 – Attributs de EnumeratedTypes::SecurityProfileType ...................................... 286 Tableau 37 – Attributs de EnumeratedTypes::TimSyncSrcType .......................................... 286 Tableau 38 – Attributs de EnumeratedTypes::LnkType ....................................................... 286 Tableau 39 – Attributs de Environmental Agent::Environmental .......................................... 290 Tableau 40 – Attributs de Environmental Agent::PSUPEntry ............................................... 290 Tableau 41 – Attributs de Environnemental Agent::Notification ........................................... 291 Tableau 42 – Attributs de Environnemental Agent::SecurityNotification ............................... 291 Tableau 43 – Attributs de IED Agent::IED ........................................................................... 293 Tableau 44 – Attributs de IED Agent:: CPUEntry ................................................................. 294 Tableau 45 – Attributs de IED Agent:: EXTEntry ................................................................. 295 Tableau 46 – Attributs de IED Agent:: STOREEntry ............................................................ 295 Tableau 47 – Attributs de IED Agent:: Notification ............................................................... 296 Tableau 48 – Attributs de IED Agent:: SecurityNotification .................................................. 296 Tableau 49 – Attributs de Common Objects::CommonProtocolInfo ...................................... 297 Tableau 50 – Attributs de IEEE 1815 and IEC 60870-5 Agent::60870andDNPProtocolInfo ....................................................................................... 300 Tableau 51 – Attributs de IEEE 1815 and IEC 60870-5 Agent::Association ......................... 301 Tableau 52 – Attributs de IEEE 1815 and IEC 60870-5 Agent::Summary ............................ 303

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • IEC 62351-7:2017 © IEC 2017 – 239 –

    Tableau 53 – Attributs de IEEE 1815 and IEC 60870-5 Agent::60870andDNPSecurityNotification ........................................................................... 304 Tableau 54 – Attributs de IEEE 1815 and IEC 60870-5 Agent::60870andDNPNotification ........................................................................................ 304 Tableau 55 – Attributs de IEEE 1815 and IEC 60870-5 Agent::MasterAssociation ............... 304 Tableau 56 – Attributs de IEEE 1815 and IEC 60870-5 Agent:: OutstationAssociation ........ 306 Tableau 57 – Attributs de ACSI::ACSISummary .................................................................. 309 Tableau 58 – Attributs de MMS::MMSProtocolInfo .............................................................. 311 Tableau 59 – Attributs de MMS::MMSProvider .................................................................... 312 Tableau 60 – Attributs de MMS::MMSAssociation ............................................................... 313 Tableau 61 – Attributs de MMS::MMSSecurityNotification ................................................... 314 Tableau 62 – Attributs de MMS::MMSNotification ................................................................ 314 Tableau 63 – Attributs des objets communs SV et GSE::GSEandSVCommon ..................... 315 Tableau 64 – Attributs des objets communs SV et GSE::GSEandSVPublisherAssociation ................................................................................ 316 Tableau 65 – Attributs des objets communs SV et GSE::GSEandSVSubscriberAssociation .............................................................................. 316 Tableau 66 – Attributs de SV::SVProvider ........................................................................... 318 Tableau 67 – Attributs de SV::SVPublisherAssociationIP .................................................... 318 Tableau 68 – Attributs de SV::SVPublisherAssociationL2.................................................... 319 Tableau 69 – Attributs de SV::SVSubscriberAssociationIP .................................................. 319 Tableau 70 – Attributs de SV::SVSubcriberAssociationL2 ................................................... 320 Tableau 71 – Attributs de SV::SVNotification ...................................................................... 320 Tableau 72 – Attributs de GSE::GSESubscriberAssociation ................................................ 322 Tableau 73 – Attributs de GSE::GSEProvider ..................................................................... 322 Tableau 74 – Attributs de GSE::GSEPublisherAssociationIP ............................................... 323 Tableau 75 – Attributs de GSE::GSEPublisherAssociationL2 .............................................. 323 Tableau 76 – Attributs de GSE::GSESubscriberAssociationIP ............................................. 324 Tableau 77 – Attributs de GSE::GSESubscriberAssociationL2 ............................................ 324 Tableau 78 – Attributs de GSE::GSENotification ................................................................. 325 Tableau 79 – Attributs de Interfaces Agent::Interface .......................................................... 327 Tableau 80 – Attributs de Interfaces Agent::Interfaces ........................................................ 328 Tableau 81 – Attributs de Interfaces Agent::ETHEntry ........................................................ 329 Tableau 82 – Attributs de Interfaces Agent::KEYEntry ........................................................ 329 Tableau 83 – Attributs de Interfaces Agent::SEREntry ........................................................ 330 Tableau 84 – Attributs de Interfaces Agent::ALGEntry ........................................................ 330 Tableau 85 – Attributs de Interfaces Agent::USBEntry ........................................................ 331 Tableau 86 – Attributs de Interfaces Agent::Notification ...................................................... 331 Tableau 87 – Attributs de Clocks Agent::Clock .................................................................... 333 Tableau 88 – Attributs de Clocks Agent::ClockEntry............................................................ 333 Tableau 89 – Attributs de Clocks Agent::SecurityNotification .............................................. 334 Tableau B.1 – Mise en correspondance des objets IEC 61850-7-4 ...................................... 469

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • – 240 – IEC 62351-7:2017 © IEC 2017

    COMMISSION ÉLECTROTECHNIQUE INTERNATIONALE

    ____________

    GESTION DES SYSTÈMES DE PUISSANCE ET ÉCHANGES

    D'INFORMATIONS ASSOCIÉS – SÉCURITÉ DES COMMUNICATIONS ET DES DONNÉES –

    Partie 7: Modèles d’objets de données de gestion de réseaux et de

    systèmes (NSM)

    AVANT-PROPOS 1) La Commission Électrotechnique Internationale (IEC) est une organisation mondiale de normalisation

    composée de l'ensemble des comités électrotechniques nationaux (Comités nationaux de l’IEC). L’IEC a pour objet de favoriser la coopération internationale pour toutes les questions de normalisation dans les domaines de l'électricité et de l'électronique. À cet effet, l’IEC – entre autres activités – publie des Normes internationales, des Spécifications techniques, des Rapports techniques, des Spécifications accessibles au public (PAS) et des Guides (ci-après dénommés "Publication(s) de l’IEC"). Leur élaboration est confiée à des comités d'études, aux travaux desquels tout Comité national intéressé par le sujet traité peut participer. Les organisations internationales, gouvernementales et non gouvernementales, en liaison avec l’IEC, participent également aux travaux. L’IEC collabore étroitement avec l'Organisation Internationale de Normalisation (ISO), selon des conditions fixées par accord entre les deux organisations.

    2) Les décisions ou accords officiels de l’IEC concernant les questions techniques représentent, dans la mesure du possible, un accord international sur les sujets étudiés, étant donné que les Comités nationaux de l’IEC intéressés sont représentés dans chaque comité d’études.

    3) Les Publications de l’IEC se présentent sous la forme de recommandations internationales et sont agréées comme telles par les Comités nationaux de l’IEC. Tous les efforts raisonnables sont entrepris afin que l’IEC s'assure de l'exactitude du contenu technique de ses publications; l’IEC ne peut pas être tenue responsable de l'éventuelle mauvaise utilisation ou interprétation qui en est faite par un quelconque utilisateur final.

    4) Dans le but d'encourager l'uniformité internationale, les Comités nationaux de l’IEC s'engagent, dans toute la mesure possible, à appliquer de façon transparente les Publications de l’IEC dans leurs publications nationales et régionales. Toutes divergences entre toutes Publications de l’IEC et toutes publications nationales ou régionales correspondantes doivent être indiquées en termes clairs dans ces dernières.

    5) L’IEC elle-même ne fournit aucune attestation de conformité. Des organismes de certification indépendants fournissent des services d'évaluation de conformité et, dans certains secteurs, accèdent aux marques de conformité de l’IEC. L’IEC n'est responsable d'aucun des services effectués par les organismes de certification indépendants.

    6) Tous les utilisateurs doivent s'assurer qu'ils sont en possession de la dernière édition de cette publication.

    7) Aucune responsabilité ne doit être imputée à l’IEC, à ses administrateurs, employés, auxiliaires ou mandataires, y compris ses experts particuliers et les membres de ses comités d'études et des Comités nationaux de l’IEC, pour tout préjudice causé en cas de dommages corporels et matériels, ou de tout autre dommage de quelque nature que ce soit, directe ou indirecte, ou pour supporter les coûts (y compris les frais de justice) et les dépenses découlant de la publication ou de l'utilisation de cette Publication de l’IEC ou de toute autre Publication de l’IEC, ou au crédit qui lui est accordé.

    8) L'attention est attirée sur les références normatives citées dans cette publication. L'utilisation de publications référencées est obligatoire pour une application correcte de la présente publication.

    9) L’attention est attirée sur le fait que certains des éléments de la présente Publication de l’IEC peuvent faire l’objet de droits de brevet. L’IEC ne saurait être tenue pour responsable de ne pas avoir identifié de tels droits de brevets et de ne pas avoir signalé leur existence.

    La Norme internationale IEC 62351-7 a été établie par le Comité d’études 57 de l’IEC: Gestion des systèmes de puissance et échanges d’informations associés.

    Cette édition de l’IEC 62351-7 annule et remplace l’IEC TS 62351-7 parue en 2010. Cette nouvelle édition constitue une révision technique et inclut les modifications techniques majeures suivantes par rapport à l'IEC TS 62351-7:2010:

    a) revue et enrichissement du modèle de données d’objets NSM;

    b) adoption du modèle UML pour la description des objets NSM;

    This is a preview - click here to buy the full publication

    https://webstore.iec.ch/publication/30593&preview

  • IEC 62351-7:2017 © IEC 2017 – 241 –

    c) traduction des MIB de protocole SNMP inclus comme composants codés.

    La présente version bilingue (2019-08) correspond à la version anglaise monolingue publiée en 2017-07.

    Le texte anglais de cette norme est issu des documents 57/1857/FDIS et 57/1885/RVD.

    Le rapport de vote 57/1885/RVD donne toute information sur le vote ayant abouti à l'approbation de cette norme.

    La version française de cette norme n'a pas été soumise au vote.

    Ce document a été rédigé selon les Directives ISO/IEC, Partie 2

    Une liste de toutes les parties de la série IEC 62351, publiées sous le titre général: Gestion des systèmes de puissance et échanges d'informations associés – Sécurité des communications et des données, peut être consultée sur le site web de l’IEC.

    La présente norme IEC inclut les composants codés, c’est-à-dire les composants destinés à être traités directement par un ordinateur. Ce type de contenu consiste en tout texte délimité par les marqueurs et , ou est à défaut clairement étiqueté dans la présente norme comme composant codé.

    L’achat de la présente norme IEC comprend une licence de droit d’auteur qui permet à l’acquéreur de vendre un logiciel contenant des composants codés de la présente norme directement aux utilisateurs finaux et à des utilisateurs finaux par l’intermédiaire de distributeurs, dans les conditions d’octroi de licences de logiciels IEC qui peuvent être consultées à l’adresse: http://www.iec.ch/CCv1.

    Les composants codés inclus dans la présente norme IEC sont également disponibles sous forme d’un fichier électronique lisible sur machine: http://www.iec.ch/tc57/supportdocuments/IEC_62351-7.MIBS.light.zip.

    Le comité a décidé que le contenu de ce document ne sera pas modifié avant la date de stabilité indiquée sur le site web de l'IEC sous "http://webstore.iec.ch" dans les données relatives au document recherché. À cette date, le document sera

    • reconduit,

    • supprimé,

    • remplacé par une édition révisée, ou

    • amendé.

    Une version bilingue de cette publication peut être diffusée à une date ultérieure.

    IMPORTANT – Le logo "colour inside" qui se trouve sur la page de couverture de cette publication indique qu'elle contient des couleurs qui sont considérées comme utiles à une bonne compréhension de son contenu. Les utilisateurs devraient, par conséquent, imprimer cette publication en utilisant une imprimante couleur.

    This is a preview - click here to buy the full publication

    http://www.iec.ch/tc57/supportdocuments/IEC_62351-7.MIBS.light.ziphttps://webstore.iec.ch/publication/30593&preview

  • – 242 – IEC 62351-7:2017 © IEC 2017

    GESTION DES SYSTÈMES DE PUISSANCE ET ÉCHANGES D'INFORMATIONS ASSOCIÉS – SÉCURITÉ DES

    COMMUNICATIONS ET DES DONNÉES –

    Partie 7: Modèles d’objets de données de gestion de réseaux et de systèmes (NSM)

    1 Domaine d’application

    La présente partie de l’IEC 62351 définit des modèles d’objets de données de gestion de réseaux et de systèmes (NSM – network and system management) spécifiques aux opérations des systèmes de puissance. Ces objets de données NSM servent à surveiller la bonne santé des réseaux et des systèmes afin de détecter les intrusions de sécurité potentielles, et de gérer les performances et la fiabilité de l’infrastructure d’information. L’objectif est de définir un ensemble d’objets abstraits qui permet de surveiller à distance la bonne santé des appareils électroniques intelligents (IED – Intelligent Electronic Devices), des terminaux à distance (RTU – Remote Terminal Units), des systèmes de ressources énergétiques décentralisées (DER – Distributed Energy Resources) et des autres systèmes importants pour les opérations des opérations des systèmes de puissance.

    Les opérations des systèmes de puissance reposent de plus en plus sur les infrastructures d’information, y compris les réseaux de communication, les IED et les protocoles de communication autodéfinis. Par conséquent, la gestion de l’infrastructure d’information est essentielle pour fournir les niveaux élevé