IEC 62351-8 Ed. 1.0 b PDF
IEC 62351-8 Ed. 1.0 b PDF
$215.60

IEC 62351-8 Ed. 1.0 b PDF

   0 reviews
Product Code:
Availability:
product
In Stock
$215.60 $392.00
IN TAX $215.60
Ask about this product

Power systems management and associated information exchange – Data and communications security – Part 8: Role-based access control for power system management

Published byPublication DateNumber of Pages
IEC04/28/2020151

IEC 62351-8 Ed. 1.0 b – Power systems management and associated information exchange – Data and communications security – Part 8: Role-based access control for power system management

IEC 62351-8: 2020 is to facilitate role-based access control (RBAC) for power system management. RBAC assigns human users, automated systems, and software applications (collectively called “subjects” in this document) to specified “roles”, and restricts their access to only those resources, which the security policies identify as necessary for their roles.

As electric power systems become more automated and cyber security concerns become more prominent, it is becoming increasingly critical to ensure that access to data (read, write, control, etc.) is restricted. As in many aspects of security, RBAC is not just a technology; it is a way of running a business. RBAC is not a new concept; in fact, it is used by many operating systems to control access to system resources. Specifically, RBAC provides an alternative to the all-or-nothing super-user model in which all subjects have access to all data, including control commands.

RBAC is a primary method to meet the security principle of least privilege, which states that no subject should be authorized more permissions than necessary for performing that subject’s task. With RBAC, authorization is separated from authentication. RBAC enables an organization to subdivide super-user capabilities and package them into special user accounts termed roles for assignment to specific individuals according to their associated duties. This subdivision enables security policies to determine who or what systems are permitted access to which data in other systems. RBAC provides thus a means of reallocating system controls as defined by the organization policy. In particular, RBAC can protect sensitive system operations from inadvertent (or deliberate) actions by unauthorized users. Clearly RBAC is not confined to human users though; it applies equally well to automated systems and software applications, i.e., software parts operating independent of user interactions.

Reviews (0)

   0 reviews
Write a review