Power systems management and associated information exchange - Data and communication security - Part 100-4: Cybersecurity conformance testing for IEC 62351-4

IEC TS 62351-100-4:2023, which is a technical specification, describes test procedures for interoperability conformance testing of data and communication security for power system automation and protection systems which implement MMS, IEC 61850-8-1 (MMS), IEC 61850-8-2 (XMPP) or any other protocol implementing IEC 62351-4:2018/AMD1:2020. The tests described in this document cover only E2E security testing and do not evaluate A-security profile implementation. Thus, citing conformance to this document does not imply that any particular security level has been achieved by the corresponding product, or by the system in which it is used.
The goal of this document is to enable interoperability by providing a standard method of testing protocol implementations, but it does not guarantee the full interoperability of devices. It is expected that using this document during testing will minimize the risk of non interoperability. Additional testing and assurance measures will be required to verify that a particular implementation of IEC 62351-4:2018/AMD1:2020 has correctly implemented all the security functions and that they can be assured to be present in the delivered products. This topic is covered in other IEC standards, for example IEC 62443.
The scope of this document is to specify available common procedures and definitions for conformance and/or interoperability testing of IEC 62351-4:2018/AMD1:2020.
This document deals mainly with cyber security conformance testing; therefore, other requirements, such as safety or EMC are not covered. These requirements are covered by other standards (if applicable) and the proof of compliance for these topics is done according to these standards.
T-profile testing is to be performed prior to E2E security profile testing. T-profile testing is described in IEC 62351-100-3 in the context of IEC 61850-8-1. T-profile testing for IEC 61850-8-2 is to be described in the corresponding IEC 61850-8-2 test specification.

General Information

Status
Published
Publication Date
26-Nov-2023
Current Stage
PPUB - Publication issued
Start Date
20-Jul-2023
Completion Date
27-Nov-2023
Ref Project
Technical specification
IEC TS 62351-100-4:2023 - Power systems management and associated information exchange - Data and communication security - Part 100-4: Cybersecurity conformance testing for IEC 62351-4 Released:27. 11. 2023
English language
109 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


IEC TS 62351-100-4 ®
Edition 1.0 2023-11
TECHNICAL
SPECIFICATION
colour
inside
Power systems management and associated information exchange – Data and
communication security –
Part 100-4: Cybersecurity conformance testing for IEC 62351-4

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.

IEC Secretariat Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.

About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigendum or an amendment might have been published.

IEC publications search - webstore.iec.ch/advsearchform IEC Products & Services Portal - products.iec.ch
The advanced search enables to find IEC publications by a Discover our powerful search engine and read freely all the
variety of criteria (reference number, text, technical publications previews. With a subscription you will always have
committee, …). It also gives information on projects, replaced access to up to date content tailored to your needs.
and withdrawn publications.
Electropedia - www.electropedia.org
IEC Just Published - webstore.iec.ch/justpublished
The world's leading online dictionary on electrotechnology,
Stay up to date on all new IEC publications. Just Published
containing more than 22 300 terminological entries in English
details all new publications released. Available online and once
and French, with equivalent terms in 19 additional languages.
a month by email.
Also known as the International Electrotechnical Vocabulary

(IEV) online.
IEC Customer Service Centre - webstore.iec.ch/csc

If you wish to give us your feedback on this publication or need
further assistance, please contact the Customer Service
Centre: sales@iec.ch.
IEC TS 62351-100-4 ®
Edition 1.0 2023-11
TECHNICAL
SPECIFICATION
colour
inside
Power systems management and associated information exchange – Data and

communication security –
Part 100-4: Cybersecurity conformance testing for IEC 62351-4

INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
ICS 33.200  ISBN 978-2-8322-7903-8

– 2 – IEC TS 62351-100-4:2023 © IEC 2023
CONTENTS
FOREWORD . 6
INTRODUCTION . 8
1 Scope . 9
2 Normative references . 9
3 Terms, definitions, and abbreviated terms . 10
3.1 Terms and definitions. 10
3.2 Abbreviated terms . 11
4 Application structure and information flow. 11
4.1 Overview . 11
4.2 Application entity structure . 12
4.3 Relationship to test structure . 13
5 General . 14
5.1 General guidelines . 14
5.2 Test methodology . 14
5.2.1 General . 14
5.2.2 Normal procedure tests and resiliency tests . 14
5.2.3 SubClass descriptions . 14
5.3 Conformance testing requirements . 15
5.3.1 Testing within the context of an application. 15
5.3.2 Requirements for the device under test . 15
5.3.3 Requirements for the test facility . 15
5.3.4 Test Validation . 16
5.4 PICS . 16
5.5 PIXIT . 17
5.6 Tests cases . 18
6 E2E conformity testing in an OSI environment . 22
6.1 Conformance tables for E2E OSI-security profile . 22
6.2 E2E Test Procedures for OSI environment . 25
6.2.1 Association Management . 25
6.2.2 Clear Data Transfer . 29
6.2.3 Encrypted Data Transfer . 31
6.2.4 Rekey . 34
7 E2E conformity testing in the XMPP environment . 38
7.1 Conformance tables for E2E-XMPP security profile . 38
7.2 E2E Test Procedures for XMPP environment . 41
7.2.1 Association Management . 41
7.2.2 Clear Data Transfer . 44
7.2.3 Encrypted Data Transfer . 45
7.2.4 Rekey . 46
8 E2E Resiliency test procedures . 49
8.1 General . 49
8.2 Association Management Resiliency Testing . 50
8.3 Clear Data Transfer Resiliency . 59
8.4 Encrypted Data Transfer Resiliency . 64
9 E2E security subclass (SecPDU) . 68
9.1 E2E Handshake request subclass . 68

9.2 E2E handshake accept subclass . 71
9.3 E2E Application reject subclass . 74
9.4 E2E Handshake reject subclass . 76
9.5 E2E Handshake security abort subclass . 78
9.6 E2E Data transfer security abort subclass . 80
9.7 E2E Abort by protected protocol subclass . 82
9.8 E2E Clear data transfer subclass . 84
9.9 E2E Encrypted data transfer subclass . 88
9.10 E2E Association release request subclass . 92
9.11 E2E Association release response subclass . 94
10 OSI subclass (EnvPDU) . 96
10.1 OSI association request subclass . 96
10.2 OSI association response subclass . 98
10.3 OSI abort subclass . 100
10.4 OSI clear data transfer subclass . 103
10.5 OSI encrypted data transfer subclass. 103
10.6 OSI release request subclass . 104
10.7 OSI release response subclass . 104
11 XMPP subclass (EnvPDU) . 105
11.1 XMPP IQ stanza subclass . 105
11.2 XMPP message stanza subclass . 108
11.3 XMPP error subclass . 109

Figure 1 – Application entity structure and information flow . 12
Figure 2 – Relationships between APDUs . 12
Figure 3 – Structure for test specifications . 13

Table 1 – PIXIT for Base Profile . 17
Table 2 – PIXIT for Secure Communication. 18
Table 3 – IEC 62351-4:2018/AMD1:2020 E2E Compliancy Testing (IEC 61850-8-1 and
ICCP) . 19
Table 4 – IEC 62351-4:2018/AMD1:2020 E2E Compliancy Testing (IEC 61850-8-2) . 21
Table 5 – Base Profile – E2E Security . 23
Table 6 – Protocol Handshake – E2E Security . 23
Table 7 – IEC 61850 Application Association – E2E Security . 23
Table 8 – OSI EnvPDU Supported – E2E Security . 23
Table 9 – OSI EnvPDU Subclass Supported – E2E Security . 23
Table 10 – E2E SecPDU Subclass Supported . 24
Table 11 – OSI Mode of encryption – E2E Security . 24
Table 12 – Cryptographic algorithms – E2E Security . 24
Table 13 – ASN.1 Objects – E2E Security . 25
Table 14 – Verification of Client handshake request procedure in OSI environment . 26
Table 15 – Verification of Server handshake request procedure in OSI environment . 27
Table 16 – Handshake request resiliency procedure in OSI environment – Client . 28
Table 17 – Handshake request resiliency procedure in OSI environment – Server . 29

– 4 – IEC TS 62351-100-4:2023 © IEC 2023
Table 18 – Verification of requirements for OSI environment security – Clear Data
transfer . 30
Table 19 – Clear Data Transfer resiliency procedure in OSI environment – Client . 30
Table 20 – Clear Data Transfer resiliency procedure in OSI environment – Server . 31
Table 21 – Verification of requirements for OSI environment security – Encrypted data

transfer . 32
Table 22 – Resiliency testing for client – Encrypted data transfer . 33
Table 23 – Resiliency testing for server – Encrypted data transfer . 34
Table 24 – Verification of requirements for OSI environment security – Rekey initiated
by the client . 35
Table 25 – Verification of requirements for OSI environment security – Rekey initiated
by the Server . 36
Table 26 – Base Profile – E2E XMPP Security . 38
Table 27 – Protocol Handshake – E2E XMPP Security . 38
Table 28 – IEC 61850 Application Association – E2E XMPP Security . 38
Table 29 – EnvPDU Parameters– E2E XMPP Security . 39
Table 30 – EnvPDU Supported– E2E XMPP Security . 39
Table 31 – SecPDU Subclasses– E2E XMPP Security . 39
Table 32 – Encryption – E2E XMPP Security . 40
Table 33 – Cryptographic algorithms – E2E XMPP Security . 40
Table 34 – XMPP – E2E XMPP Security . 40
Table 35 – XMPP– E2E XMPP Security . 41
Table 36 – XMPP T-profile – E2E XMPP Security . 41
Table 37 – Verification of client handshake request procedure in XMPP environment . 42
Table 38 – Verification of server handshake request procedure in XMPP environment . 43
Table 39 – Handshake request resiliency procedure in XMPP environment – Client . 43
Table 40 – Handshake request resiliency procedure in XMPP environment – Server . 44
Table 41 – Verification of requirements for XMPP environment security – Clear Data
transfer . 44
Table 42 – Clear Data Transfer resiliency procedure in XMPP environment – Server . 45
Table 43 – Clear Data Transfer resiliency procedure in XMPP environment – Client . 45
Table 44 – Verification of requirements for XMPP environment security – Encrypted
data transfer . 45
Table 45 – Resiliency testing for client – Encrypted data transfer . 46
Table 46 – Resiliency testing for server – Encrypted data transfer . 46
Table 47 – Verification of requirements for XMPP environment security – Rekey
initiated by the client . 47
Table 48 – Verification of requirements for XMPP environment security – Rekey
initiated by the server . 48
Table 49 – Handshake request resiliency procedure – Client . 50
Table 50 – Handshake request resiliency procedure – Server . 55
Table 51 – Clear Data Transfer resiliency – Server . 59
Table 52 – Clear Data Transfer resiliency – Client . 61
Table 53 – Resiliency testing for client – Encrypted data transfer . 64
Table 54 – Resiliency testing for server – Encrypted data transfer . 66
Table 55 – E2E handshake request subclass . 69

Table 56 – E2E handshake accept subclass. . 71
Table 57 – E2E Application reject subclass . 75
Table 58 – Server reject of association due to security issues . 77
Table 59 – Test of client submitted handshake security abort . 79
Table 60 – Client or server emitted data transfer security abort . 81
Table 61 – Client or server emitted abort by protected protocol . 83
Table 62 – Client initiated clear data transfer . 85
Table 63 – Server initiated clear data transfer . 87
Table 64 – Client initiated encrypted data transfer . 89
Table 65 – Server initiated encrypted data transfer . 91
Table 66 – Client or server issued association release request. . 93
Table 67 – Client or server association release response . 95
Table 68 – OSI association request subclass . 97
Table 69 – OSI association response subclass . 99
Table 70 – Client OSI abort subclass . 101
Table 71 – Server OSI abort subclass . 102
Table 72 – Client or server OSI environment clear data transfer . 103
Table 73 – Client or server OSI environment encrypted data transfer . 103
Table 74 – OSI release request subclass . 104
Table 75 – OSI release response subclass . 105
Table 76 – Client XMPP iq stanza subclass . 106
Table 77 – Server XMPP IQ stanza subclass . 107
Table 78 – Client XMPP message stanza subclass . 108
Table 79 – Server XMPP message stanza subclass . 109

– 6 – IEC TS 62351-100-4:2023 © IEC 2023
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION
EXCHANGE – DATA AND COMMUNICATION SECURITY –

Part 100-4: Cybersecurity conformance testing for 62351-4

FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote international
co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and
in addition to other activities, IEC publishes International Standards, Technical Specifications, Technical Reports,
Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC Publication(s)”). Their
preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with
may participate in this preparatory work. International, governmental and non-governmental organizations liaising
with the IEC also participate in this preparation. IEC collaborates closely with the International Organization for
Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence between
any IEC Publication and the corresponding national or regional publication shall be clearly indicated in the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of patent
rights. IEC shall not be held responsible for identifying any or all such patent rights.
IEC TS 62351-100-4 has been prepared by IEC technical committee 57: Power systems
management and associated information exchange. It is a Technical Specification.
The text of this Technical Specification is based on the following documents:
Draft Report on voting
57/2505/DTS 57/2564/RVDTS
Full information on the voting for its approval can be found in the report on voting indicated in
the above table.
The language used for the development of this Technical Specification is English.

A list of all parts in the IEC 62351 series, published under the general title Power systems
management and associated information exchange – Data and communications security, can
be found on the IEC website.
In this document the following print types are used:
• Abstract Syntax Notation One (ASN.1) and W3C XML Schema Definition (W3C XSD)
notions are presented in bold Courier New typeface; and
• when ASN.1 types and values are referenced in normal text, they are differentiated from
normal text by presenting them in bold Courier New typeface.
This document was drafted in accordance with ISO/IEC Directives, Part 2, and developed in
accordance with ISO/IEC Directives, Part 1 and ISO/IEC Directives, IEC Supplement, available
at www.iec.ch/members_experts/refdocs. The main document types developed by IEC are
described in greater detail at www.iec.ch/publications.
The committee has decided that the contents of this document will remain unchanged until the
stability date indicated on the IEC website under webstore.iec.ch in the data related to the
specific document. At this date, the document will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
IMPORTANT – The "colour inside" logo on the cover page of this document indicates that it
contains colours which are considered to be useful for the correct understanding of its
contents. Users should therefore print this document using a colour printer.

– 8 – IEC TS 62351-100-4:2023 © IEC 2023
INTRODUCTION
The quality system of a device producer forms the basis of reliable testing in development and
production activities. Many internal tests during the development of a device result in a unit
level test performed at least by the provider and – if required by applicable standards – by an
independent test authority. In the context of this document, the term type test is restricted to
the functional behavior of the device.
To validate the results of some tests, internal IED information should be made available (see
5.3.4). These requirements are beyond those specified in IEC 62351-4 and therefore the
manufacturer/vendor shall describe in Table 2 how the IED can expose the required information.
Conformance testing does not replace project-specific system-related tests such as the POC
(Proof Of Concept) FAT (Factory acceptance Test) and SAT (Site Acceptance Test). The POC,
FAT and SAT are based on specific customer requirements for a dedicated substation
automation system and are done by the system integrator and normally witnessed by the
customer. These tests increase the confidence level that all potential problems in the system
have been identified and solved. These tests establish that the delivered substation automation
system is performing as specified. The conformance testing reduces the risks of failure during
the POC, FAT and SAT.
The purpose of this part of IEC 62351 is to cover all possible situations taking into consideration
the normal operating test cases and the resiliency test cases to demonstrate the capability of
the DUT to operate with other devices in the specified way according to IEC 62351-
4:2018/AMD1:2020, and also according to the PID (Protocol Implementation Document).
Testing of Application layer protocol (61860-8-1, 61850-8-2 or ICCP) features or performances
is out of scope.
Through this part of IEC 62351, a test facility can prove that the DUT communication subsystem
(or a part of it) conforms to IEC 62351-4:2018/AMD1:2020.
The test cases described in this specification do not guarantee full cybersecurity conformance
testing. It is to be complemented with other test suites.

POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION
EXCHANGE – DATA AND COMMUNICATION SECURITY –

Part 100-4: Cybersecurity conformance testing for 62351-4

1 Scope
This part of IEC 62351, which is a technical specification, describes test procedures for
interoperability conformance testing of data and communication security for power system
automation and protection systems which implement MMS, IEC 61850-8-1 (MMS),
IEC 61850-8-2 (XMPP) or any other protocol implementing IEC 62351-4:2018/AMD1:2020. The
tests described in this document cover only E2E security testing and do not evaluate A-security
profile implementation. Thus, citing conformance to this document does not imply that any
particular security level has been achieved by the corresponding product, or by the system in
which it is used.
The goal of this document is to enable interoperability by providing a standard method of testing
protocol implementations, but it does not guarantee the full interoperability of devices. It is
expected that using this document during testing will minimize the risk of non-interoperability.
Additional testing and assurance measures will be required to verify that a particular
implementation of IEC 62351-4:2018/AMD1:2020 has correctly implemented all the security
functions and that they can be assured to be present in the delivered products. This topic is
covered in other IEC standards, for example IEC 62443.
The scope of this document is to specify available common procedures and definitions for
conformance and/or interoperability testing of IEC 62351-4:2018/AMD1:2020.
This document deals mainly with cyber security conformance testing; therefore, other
requirements, such as safety or EMC are not covered. These requirements are covered by other
standards (if applicable) and the proof of compliance for these topics is done according to these
standards.
T-profile testing is to be performed prior to E2E security profile testing. T-profile testing is
described in IEC 62351-100-3 in the context of IEC 61850-8-1. T-profile testing for IEC 61850-
8-2 is to be described in the corresponding IEC 61850-8-2 test specification.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies.
For undated references, the latest edition of the referenced document (including any
amendments) applies.
IEC 62351-4:2018, Power systems management and associated information exchange – Data
and communications security – Part 4: Profiles including MMS and derivatives
IEC 62351-4:2018/AMD1:2020
IEC 62351-3:2023, Power systems management and associated information exchange – Data
and communications security – Part 3: Communication network and system security – Profiles
including TCP/IP
___________
A-profile is specified in IEC 62351-4:2020 for backward compatibility with IEC 62351-4:2007.

– 10 – IEC TS 62351-100-4:2023 © IEC 2023
IEC 62351-6, Power systems management and associated information exchange – Data and
communications security – Part 6: Security for IEC 61850
3 Terms, definitions, and abbreviated terms
3.1 Terms and definitions
For the purposes of this document, the terms and definitions given in the PID Protocol
Implementation Document and the following apply.
ISO and IEC maintain terminology databases for use in standardization at the following
addresses:
• IEC Electropedia: available at https://www.electropedia.org/
• ISO Online browsing platform: available at https://www.iso.org/obp
3.1.1
application context
set of rules shared in common by two application-entity in order to support an association (in
an OSI operational environment)
[SOURCE: IEC 62351-4:2018/AMD1:2020, 3.1.5]
3.1.2
application entity
active element embodying a set of capabilities which is pertinent to communication systems,
and which is defined for the application layer
[SOURCE: IEC 62351-4:2018/AMD1:2020, 3.1.6]
3.1.3
association
cooperative relationship between application-entity invocations, which enables the
communication of information and the coordination of their joint operation for an instance of
communication
[SOURCE: Rec. ITU-T X.217 (1995), 3.5.1]
3.1.4
E2E security
security facilities at the application layer that ensures data origin authentication and integrity
end-to-end with or without confidentiality (encryption) between two entities with zero or more
intermediate entities
[SOURCE: IEC 62351-4:2018/AMD1:2020, 3.1.18]
3.1.5
environment protocol data unit
application protocol data unit (APDU) that is carrying protocol control information for the
environment protocol in addition to carrying a security protocol data unit
[SOURCE: IEC 62351-4:2018/AMD1:2020, 3.1.20]
3.1.6
protected protocol data unit
application protocol data unit (APDU) defined by a protected application protocol

[SOURCE: IEC 62351-4:2018/AMD1:2020, 3.1.28]
3.1.7
protocol control information
information exchanged between entities of a given layer, via the service provided by the next
lower layer, to coordinate their joint operation
3.1.8
Protocol Implementation Document (PID)
document which includes all the required parameters, settings and options for a particular
protocol implemented in the IED
Note 1 to entry: This document will include the PICS and PIXIT that will be implemented during the tests.
3.2 Abbreviated terms
AA Application Association
TP Two-Party
AEAD Authenticated Encryption with Associated Data
DUT Device Under Test
TEQ Test Equipment
PCI Protocol Control Information
PDU Protocol Data Unit
APDU Application PDU
EnvPDU Environment PDU
PrPDU Protected PDU
SecPDU Secured PDU
SAOC Send Application Object Classes
RAOC Receive Application Object Classes
PID Protocol Implementation Document that includes PICS and PIXIT
N/R Note required
4 Application structure and information flow
4.1 Overview
This clause describes the application structure and information flow specified by IEC 62351-
4:2018/AMD1:2020. These structures will be used in this document to specify the configuration
parameters and describe the test procedures.

– 12 – IEC TS 62351-100-4:2023 © IEC 2023
4.2 Application entity structure

Figure 1 – Application entity structure and information flow
Figure 1 illustrates the proposed structure of application entity components, their inner
relationship, and the information flow. The figure is not intended to reflect a possible
implementation structure but is used to reflect the relationship between the different
components of an application entity.

Figure 2 – Relationships between APDUs
Figure 2 illustrates the relationship between APDUs as reflected by the model shown in
Figure 1. An APDU of a protected protocol is called a protected PDU (PrPDU). An APDU of the
E2E security is called a security PDU (SecPDU). It holds security protocol control information
and may hold a PrPDU. The APDU transporting a SecPDU is called the Environment PDU
(EnvPDU). In addition to the holding the SecPDU, it holds protocol control information
necessary for the overall operation for the environmental handling. An APDU consists of a
header and, if relevant, of a payload. The header holds the protocol control information (PCI)
controlling the underlying protocol. For an EnvPDU, a SecPDU is the payload, while a PrPDU
is the payload for a SecPDU.
As illustrated in Figure 1, an application entity in the context of this document consists of SAOCs
and RAOCs. The control function included in the figure provides the overall coordination of the
application entity. The implementation of control function may reflect the overall application that
includes the capabilities of the enclosing SAOCs and RAOCs.

Object classes defined in this way have subclasses for specific purposes. As an example, the
E2E-security SAOC has a subclass for each type of SecPDU to be generated. Each such
subclass is described in term of required input and generated output.
Clause 9 describes the SecPDU subclasses specified in IEC 62351-4:2018/AMD1:2020.
Clause 10 describes the EnvPDU subclasses for MMS implementation (IEC 61850-8-1 or ICCP)
specified in 62351-4:2018/AMD1:2020.
Clause 11 describes the EnvPDU subclasses for XMPP implementation (IEC 61850-8-2)
specified in IEC 62351-4:2018/AMD1:2020.
4.3 Relationship to test structure
The test structure and test methodology may also be illustrated using Figure 1. Consider the
top part of Figure 1 (the sending application entity) as the device under test (DUT) and the
lower part (the receiving application entity) as the testing equipment (TEQ).
The DUT is made to send EnvPDUs, which are then analyzed by the TEQ. The DUT may be
triggered to send EnvPDUs in two ways:
a) The DUT is by external stimuli instructed to issue particular types of EnvPDUs.
b) The TEQ sends EnvPDUs to the DUT, which requires the DUT to respond with
corresponding EnvPDUs.
The tests consist of:
a) Test procedures specified for both the OSI environment and the XMPP environments
(Clauses 6 and 7) and are applied depending on which environment, the DUT claims
conformance. These tests validate at the same time the EnvPDU and the SecPDU behaviour
of the DUT. PCI items (EnvPDU and SECPDU components) are listed in the subclasses
(Clauses 9, 10 and 11) with required content specified and against which the DUT emitted
EnvPDUs and SecPDUs are checked. Clauses 6 and 7 also describe tests sequence to
validate the required handshaking between the DUT and the TEQ.
b) Resiliency tests to validate the capability of the DUT to recover from errors in the
implemented protocol. For these tests, the TEQ sends PDU that contains error. Clauses 6
and 7 describe contingency tests resulting from EnvPDU errors and Clause 8 from SecPDU
errors. Clause 8 tests are independent on the operational environment.
The document is structured as depicted in Figure 3.

Figure 3 – Structure for test specifications

– 14 – IEC TS 62351-100-4:2023 © IEC 2023
5 General
5.1 General guidelines
The test environment should be as close as possible to the final environment. To perform the
test, a specially designed testing device (TEQ) is used to test the device under test (DUT).
Since the IED can be tested in server or client mode, two TEQs exist.
To realize the tests described in this standard, a TEQ compliant to IEC 62351-
4:2018/AMD1:2020 shall be used. The TEQ shall offer the capability of analysis all the
IEC 62351-4:2018/AMD1:2020 requirements and be able to generate an invalid message to test
the robustness of the device under test (DUT). The DUT should provide mechanisms to permit
the validation of the results of the tests and give the secure connection status. Table 2 describes
means of reporting/displaying internal status to provide to the test engineer enough information
in order to validate the results of the tests.
The test facility will likely use a single server/client simulator, but there is no restriction on using
one server/client which only supports certain communication services and using another to do
the rest, i.e. as long as the server(s)/client(s) simulators can cover the input requirements to
the test case/DUT. Such test environment adaptions should be documented in the test report.
5.2 Test methodology
5.2.1 General
The tests are realized in a non-intrusive mode. The device under test (DUT) has the same
software and parameters as the production system. In order to realize the conformity testing,
IED functions, at application level (IEC 61850-8-1, IEC 61850-8-2 or ICCP), are used to
establish a secure connection. When an operation fails, the use of cybersecurity logs will allow
the identification of the failing tests. The tests are grouped in a table for each type of tests. In
these tables, the test procedures have numeric references. If the test case needs more than
one step, it will be enumerated as 1a), 1b) … The test cases in this document should be referred
as in the following example: Table 1-1a).
The detailed test procedures are not part of this document and are left to the conformance test
body. Test labs claiming the ability to perform conformance testing to these parts of IEC 62351
shall be accredited for quality and technical competency by an internationally recognized
organization.
5.2.2 Normal procedure tests and resiliency tests
IEC 62351-4:2018/AMD1:2020 specifies how each IED (client and server) shall execute the
procedures in normal conditions (expected behaviour) and also how it shall behave when
unexpected or fault events occur during their execution (negative behaviours). The tests cases
are thus divided in two categories: the normal procedure test cases addressing the expected
behaviours and the resiliency test cases addressing unexpected or fault events.
Normal Procedure tests and Resiliency tests shall be performed AT LEAST ONCE for one
mandatory cryptographic algorithms required by the standard referencing IEC 62351-
4:2018/AMD1:2020, with the mandatory key length required by IEC 62351-4:2018/AMD1:2020.
PICS Table 11 – Conformance to cryptographic algorithms for E2E-security in IEC 62351-
4:2018/AMD1:2020 lists the cipher suites supported by the DUT and those selected for the
tests.
5.2.3 SubClass descriptions
Clauses 9, 10 and 11 define the different subclasses used for E2E security.

The core definition for E2E (SecPDU) is defined in Clause 9 while Clauses 10 and 11 define
subclass used for OSI and XMPP EnvPDU.
The tables in these clauses define the expected value of the different data components. The
tests refer to these tables in order to help the test engineer in interpreting the test results.
5.3 Conformance testing requirements
5.3.1 Testing within the context of an application
The test cases listed in this document shall be executed within the context of an application.
The DUT claiming conformance to IEC 62351-4:2018/AMD1:2020 shall execute an application
protocol defined in a standard requiring conformance to the IEC 62351-4:2018/AMD1:2020.
5.3.2 Requirements for the device under test
Before the beginning of the testing, the Protocol Implementation Document (PID) that includes
all the required paramet
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...