ISO ISO/IEC TR 27019 Information technology - Security techniques - Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry - First Edition
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- 35
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- 35.040
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- ISO ISO/IEC TR 27019 Information technology - Security techniques - Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry - First Edition
- DIN SPEC 27009 Guidance for information security management of power supply control systems based on ISO/IEC 27002
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- Картотека зарубежных и международных стандартов
International Organization for Standardization
Information technology - Security techniques - Information security management guidelines based on /IEC 27002 for process control systems specific to the energy utility industry - First Edition
N ISO/IEC TR 27019
Annotation
The scope of this guideline covers process control systems used by the energy utility industry for controlling and monitoring the generation, transmission, storage and distribution of electric power, gas and heat in combination with the control of supporting processes. This includes in particular the following systems, applications and components:
- the overall IT-supported central and distributed process control, monitoring and automation technology as well as IT systems used for their operation, such as programming and parameterization devices;
- digital controllers and automation components such as control and field devices or PLCs, including digital sensor and actuator elements;
- all further supporting IT systems used in the process control domain, e.g. for supplementary data visualization tasks and for controlling, monitoring, data archiving and documentation purposes;
- the overall communications technology used in the process control domain, e.g. networks, telemetry, telecontrol applications and remote control technology;
- digital metering and measurement devices, e.g. for measuring energy consumption, generation or emission values;
- digital protection and safety systems, e.g. protection relays or safety PLCs;
- distributed components of future smart grid environments;



