{"id":22960,"date":"2024-04-10T17:59:51","date_gmt":"2024-04-10T16:59:51","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=22960"},"modified":"2024-04-10T17:59:53","modified_gmt":"2024-04-10T16:59:53","slug":"iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/","title":{"rendered":"IEC 62351 Standard: What cybersecurity measures are suitable for electrical networks?\u00a0"},"content":{"rendered":"\n<p><span data-contrast=\"auto\">IEC 62351 is an international cybersecurity standard for <\/span><b><span data-contrast=\"auto\">Smart Grid<\/span><\/b><span data-contrast=\"auto\"> communication and control systems. Its aim is to help grid operators protect themselves against threats endangering this sector, while adapting the recommendations to the realities of the industrial world.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In fact, many of the systems, equipment, and communications channels in such a network are:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Limited in terms of memory and computing power.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Located at remote sites with little or no staff or internet access (as opposed to an industrial system within a factory, for instance).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Incompatible with wireless technologies, due to the electrical environment of substations and the higher reliability required by certain applications.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Deployed for a long period of operation, which creates constraints in terms of maintaining security and interoperability with other systems.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">In an intelligent electrical system, two network infrastructures coexist: an <\/span><b><span data-contrast=\"auto\">electrical network<\/span><\/b><span data-contrast=\"auto\"> and an <\/span><b><span data-contrast=\"auto\">IT network<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The electrical network connects the equipment used to generate, transmit and distribute electricity. This includes power stations, transformers, power lines, substations, and electricity meters.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The computer network is used to monitor, control, and optimize power system operations. The aim of IEC 62351 is to secure this IT network.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-22978 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Electricity-and-IT-networks-coexist-in-parallel-in-a-Smart-Grid-context.png\" alt=\"\" width=\"1156\" height=\"483\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Electricity-and-IT-networks-coexist-in-parallel-in-a-Smart-Grid-context.png 1156w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Electricity-and-IT-networks-coexist-in-parallel-in-a-Smart-Grid-context-437x183.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Electricity-and-IT-networks-coexist-in-parallel-in-a-Smart-Grid-context-71x30.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Electricity-and-IT-networks-coexist-in-parallel-in-a-Smart-Grid-context-768x321.png 768w\" sizes=\"auto, (max-width: 1156px) 100vw, 1156px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"none\">Electricity and IT networks coexist in parallel in a Smart Grid context.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Today, the proliferation of industry standards means that one must wonder what this standard offers in relation to others, or whether it is appropriate for a customer to seek compliance with certain sections of the standard.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h1 aria-level=\"2\"><span data-contrast=\"none\">A standard to be used as a guide to good practice<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">To date, no organisation offering certification to IEC 62351 has been identified, although some certification authorities do offer conformity assessments (technical tests and associated recommendations).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"auto\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-22974 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Organizations-offering-conformity-assessments-IEC-62351-.png\" alt=\"\" width=\"610\" height=\"201\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Organizations-offering-conformity-assessments-IEC-62351-.png 610w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Organizations-offering-conformity-assessments-IEC-62351--437x144.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Organizations-offering-conformity-assessments-IEC-62351--71x23.png 71w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/span><\/i><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Organizations offering conformity assessments IEC 62351<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, the main purpose of the standard is to provide cyber teams with the tools they need to integrate cyber security into the technical specifications of industrial systems, for use by operators and suppliers. Conformity tests can be based on sections 100 of IEC 62351.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p aria-level=\"2\"><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h1 aria-level=\"2\"><span data-contrast=\"none\">Overview of the standard<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">The introductory section of the standard was published in 2007 in an industrial context that has changed considerably since then. The last section was published in January 2023 and a new section is currently being drafted. The 11 main documents that now make up the IEC 62351 standard, and their regular publication schedule, demonstrate a willingness to adapt to changes in the industrial context.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-22980 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Capture-decran-2024-04-10-151026.png\" alt=\"\" width=\"745\" height=\"652\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Capture-decran-2024-04-10-151026.png 745w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Capture-decran-2024-04-10-151026-218x191.png 218w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Capture-decran-2024-04-10-151026-45x39.png 45w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">The IEC divides the standard into 4 main sections.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h1 aria-level=\"3\"><span data-contrast=\"none\">IEC 62351 complements existing cyber standards<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">To address Smart Grid cybersecurity issues in a coherent fashion, <\/span><b><span data-contrast=\"auto\">a combination of ISO\/IEC 27001, IEC 62443, and IEC 62351 standards is required<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The <\/span><b><span data-contrast=\"auto\">ISO\/IEC 27001 family of standards<\/span><\/b><span data-contrast=\"auto\"> applies to any organization with an information system: it is still applicable to the companies considered here. The standards will provide an overall applicable organization as well as general security measures.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The ISA\/IEC 62443 standard, which applies to industry, provides measures for industrial systems and components. It will ensure that the specific features of industrial systems are considered, at the boundary between IT and OT.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">IEC 62351 is dedicated to IoT, with a very specific field of application: communication in an electrical environment.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-22970 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/These-standards-cover-increasingly-technical-and-sector-specific-subjects.-.png\" alt=\"\" width=\"691\" height=\"388\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/These-standards-cover-increasingly-technical-and-sector-specific-subjects.-.png 691w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/These-standards-cover-increasingly-technical-and-sector-specific-subjects.--340x191.png 340w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/These-standards-cover-increasingly-technical-and-sector-specific-subjects.--69x39.png 69w\" sizes=\"auto, (max-width: 691px) 100vw, 691px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">These standards cover <\/span><\/i><b><i><span data-contrast=\"auto\">increasingly technical and sector-specific subjects<\/span><\/i><\/b><i><span data-contrast=\"auto\">.\u00a0<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h1 aria-level=\"3\"><span data-contrast=\"none\">In particular, the standard details security measures for communication protocols specific to the sector<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">The communication protocols, defined in other standards, are useful for gathering information from equipment in the field and, in turn, for sending commands. Despite their key function, these protocols are not secured by design. The IEC 62351 standard allows security mechanisms to be implemented, using mechanisms already present to limit interoperability impacts. The concerned protocols are:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-22968 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/protocols2.png\" alt=\"\" width=\"761\" height=\"278\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/protocols2.png 761w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/protocols2-437x160.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/protocols2-71x26.png 71w\" sizes=\"auto, (max-width: 761px) 100vw, 761px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-22982 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Capture-decran-2024-04-10-151321.png\" alt=\"\" width=\"1144\" height=\"467\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Capture-decran-2024-04-10-151321.png 1144w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Capture-decran-2024-04-10-151321-437x178.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Capture-decran-2024-04-10-151321-71x29.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/Capture-decran-2024-04-10-151321-768x314.png 768w\" sizes=\"auto, (max-width: 1144px) 100vw, 1144px\" \/>\u00a0<\/span><span data-contrast=\"auto\">\u00a0<em>A chapter of IEC 62351 may deal with one aspect of the safety of several protocols. For example, aspects relating to the TCP\/IP model are covered jointly in section 3 of the standard.<\/em><\/span><em>\u00a0<\/em><\/p>\n<p><span data-contrast=\"auto\">IEC 62351 was drafted by the same technical committee (TC57) that developed these communication protocols. The idea is to integrate security mechanisms into protocols that are completely lacking them. By considering their strong presence in the industry and their inherent constraints, the standard&#8217;s specifications promote interoperability. There&#8217;s no need to change hardware. The standard provides the right tools to secure protocols when required.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">To illustrate the cybersecurity specifications to be found in IEC 62351, the example of section 5, dealing with the IEC 60870-5 protocol, shall be considered:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-22966\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/protocols3.png\" alt=\"\" width=\"532\" height=\"373\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/protocols3.png 551w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/protocols3-273x191.png 273w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/protocols3-56x39.png 56w\" sizes=\"auto, (max-width: 532px) 100vw, 532px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-22964\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/protocols4.png\" alt=\"\" width=\"297\" height=\"359\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/protocols4.png 273w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/protocols4-158x191.png 158w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/protocols4-32x39.png 32w\" sizes=\"auto, (max-width: 297px) 100vw, 297px\" \/><\/span><\/p>\n<p>\u00a0<\/p>\n<h1 aria-level=\"2\"><span data-contrast=\"none\">Concluding remarks<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">The IEC 62351 standard outlines best practices for securing electrical networks, with concrete measures for their implementation.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This standard can be used by CISOs to define concrete measures to be implemented on their most critical systems, and as a basis for drafting requirements towards their suppliers, to be integrated into specifications.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<hr \/>\n<h1 aria-level=\"1\"><span data-contrast=\"none\">Glossary<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h1>\n<table style=\"height: 668px; width: 100%; border-color: #000000; border-style: solid;\" border=\"1\" data-tablestyle=\"MsoTable15Grid4Accent5\" data-tablelook=\"1152\" aria-rowcount=\"7\">\n<tbody>\n<tr style=\"height: 100px;\" aria-rowindex=\"1\">\n<td style=\"width: 12.381%; height: 100px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">ASDU<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<td style=\"width: 86.7857%; height: 100px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">Application Service Data Unit<\/span><\/b><span data-contrast=\"auto\">: actual data in a PDU corresponding to the application layer of the OSI model.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 100px;\" aria-rowindex=\"2\">\n<td style=\"width: 12.381%; height: 100px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">CIM<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<td style=\"width: 86.7857%; height: 100px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">Common Information Model<\/span><\/b><span data-contrast=\"auto\">: standard defining the representation of managed elements in an IT environment, using objects and links.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 100px;\" aria-rowindex=\"3\">\n<td style=\"width: 12.381%; height: 100px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">DER<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<td style=\"width: 86.7857%; height: 100px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">Distributed Energy Resources:<\/span><\/b><span data-contrast=\"auto\"> power generation using small-capacity plants connected to the low or medium-voltage grid.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 100px;\" aria-rowindex=\"4\">\n<td style=\"width: 12.381%; height: 100px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">GOOSE<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<td style=\"width: 86.7857%; height: 100px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">Generic Object-Oriented Substation Event<\/span><\/b><span data-contrast=\"auto\">: event data transfer mechanism for all electrical substation networks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 100px;\" aria-rowindex=\"5\">\n<td style=\"width: 12.381%; height: 100px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">MMS<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<td style=\"width: 86.7857%; height: 100px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">Manufacturing Message Specification:<\/span><\/b><span data-contrast=\"auto\"> international standard for the transfer of real-time process data and supervisory control information.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 68px;\" aria-rowindex=\"6\">\n<td style=\"width: 12.381%; height: 68px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">SCADA<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<td style=\"width: 86.7857%; height: 68px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">Supervisory Control and Data Acquisition:<\/span><\/b><span data-contrast=\"auto\"> real-time data acquisition and control system<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 100px;\" aria-rowindex=\"7\">\n<td style=\"width: 12.381%; height: 100px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">SV<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<td style=\"width: 86.7857%; height: 100px;\" data-celllook=\"0\">\n<p><b><span data-contrast=\"auto\">Sampled Values:<\/span><\/b><span data-contrast=\"auto\"> protocol for high-speed, real-time propagation of analog and digital sampled values from IEDs to other devices in the substations network.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259,&quot;469777462&quot;:[2182],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IEC 62351 is an international cybersecurity standard for Smart Grid communication and control systems. Its aim is to help grid operators protect themselves against threats endangering this sector, while adapting the recommendations to the realities of the industrial world.\u00a0\u00a0 In&#8230;<\/p>\n","protected":false},"author":1499,"featured_media":22955,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3977,3274],"tags":[],"coauthors":[4411,4412],"class_list":["post-22960","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-focus","category-manufacturing-industry-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IEC 62351 Standard: What cybersecurity measures are suitable for electrical networks?\u00a0 - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IEC 62351 Standard: What cybersecurity measures are suitable for electrical networks?\u00a0 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"IEC 62351 is an international cybersecurity standard for Smart Grid communication and control systems. Its aim is to help grid operators protect themselves against threats endangering this sector, while adapting the recommendations to the realities of the industrial world.\u00a0\u00a0 In...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-10T16:59:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-10T16:59:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/pylon-8574348_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Christophe VILLA, Maxime VALLEE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christophe VILLA, Maxime VALLEE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/\"},\"author\":{\"name\":\"Madeline Salles\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8\"},\"headline\":\"IEC 62351 Standard: What cybersecurity measures are suitable for electrical networks?\u00a0\",\"datePublished\":\"2024-04-10T16:59:51+00:00\",\"dateModified\":\"2024-04-10T16:59:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/\"},\"wordCount\":882,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/pylon-8574348_1280.jpg\",\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Focus\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/\",\"name\":\"IEC 62351 Standard: What cybersecurity measures are suitable for electrical networks?\u00a0 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/pylon-8574348_1280.jpg\",\"datePublished\":\"2024-04-10T16:59:51+00:00\",\"dateModified\":\"2024-04-10T16:59:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/pylon-8574348_1280.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/pylon-8574348_1280.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IEC 62351 Standard: What cybersecurity measures are suitable for electrical networks?\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8\",\"name\":\"Madeline Salles\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/madeline-salles\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IEC 62351 Standard: What cybersecurity measures are suitable for electrical networks?\u00a0 - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/","og_locale":"en_US","og_type":"article","og_title":"IEC 62351 Standard: What cybersecurity measures are suitable for electrical networks?\u00a0 - RiskInsight","og_description":"IEC 62351 is an international cybersecurity standard for Smart Grid communication and control systems. Its aim is to help grid operators protect themselves against threats endangering this sector, while adapting the recommendations to the realities of the industrial world.\u00a0\u00a0 In...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/","og_site_name":"RiskInsight","article_published_time":"2024-04-10T16:59:51+00:00","article_modified_time":"2024-04-10T16:59:53+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/pylon-8574348_1280.jpg","type":"image\/jpeg"}],"author":"Christophe VILLA, Maxime VALLEE","twitter_misc":{"Written by":"Christophe VILLA, Maxime VALLEE","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/"},"author":{"name":"Madeline Salles","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8"},"headline":"IEC 62351 Standard: What cybersecurity measures are suitable for electrical networks?\u00a0","datePublished":"2024-04-10T16:59:51+00:00","dateModified":"2024-04-10T16:59:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/"},"wordCount":882,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/pylon-8574348_1280.jpg","articleSection":["Cybersecurity &amp; Digital Trust","Focus","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/","name":"IEC 62351 Standard: What cybersecurity measures are suitable for electrical networks?\u00a0 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/pylon-8574348_1280.jpg","datePublished":"2024-04-10T16:59:51+00:00","dateModified":"2024-04-10T16:59:53+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/pylon-8574348_1280.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/04\/pylon-8574348_1280.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/04\/iec-62351-standard-what-cybersecurity-measures-are-suitable-for-electrical-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"IEC 62351 Standard: What cybersecurity measures are suitable for electrical networks?\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8ff9185abd0574dc00c0e378146212b8","name":"Madeline Salles","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/madeline-salles\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1499"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=22960"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22960\/revisions"}],"predecessor-version":[{"id":23013,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22960\/revisions\/23013"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/22955"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=22960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=22960"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=22960"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=22960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}