Information security, cybersecurity and privacy protection - Information security controls for the energy utility industry (ISO/IEC 27019:2024)

This document provides information security controls for the energy utility industry, based on ISO/IEC 27002:2022, for controlling and monitoring the production or generation, transmission, storage and distribution of electric power, gas, oil and heat, and for the control of associated supporting processes.

Informationssicherheit, Cybersicherheit und Schutz der Privatsphäre - Informationssicherheitsmaßnahmen für die Energieversorgung (ISO/IEC 27019:2024)

Sécurité de l'information, cybersécurité et protection de la vie privée - Mesures de sécurité de l'information pour l'industrie des opérateurs de l'énergie (ISO/IEC 27019:2024)

Informacijska varnost, kibernetska varnost in varstvo zasebnosti - Kontrole informacijske varnosti za energetske operaterje (ISO/IEC 27019:2024)

General Information

Status
Published
Publication Date
09-Dec-2025
Current Stage
6060 - Definitive text made available (DAV) - Publishing
Start Date
10-Dec-2025
Due Date
18-Oct-2027
Completion Date
10-Dec-2025

Relations

Effective Date
11-Jun-2025

Overview

EN ISO/IEC 27019:2025 (aligned with ISO/IEC 27019:2024) provides sector-specific information security, cybersecurity and privacy protection controls tailored to the energy utility industry. Published by CEN and based on ISO/IEC 27002:2022, the standard addresses controls for the production/generation, transmission, storage and distribution of electric power, gas, oil and heat - including associated supporting processes and operational technology (OT) environments.

Key topics and technical requirements

The document structures controls into clear domains and energy-specific (ENR) additions. Key technical topics include:

  • Organizational controls

    • Policies, roles and responsibilities, segregation of duties
    • Threat intelligence, supplier and ICT supply chain security
    • Asset inventory, classification, labelling and information transfer
  • People controls

    • Screening, training, awareness, remote working and disciplinary processes
  • Physical controls

    • Securing control centres, equipment rooms, peripheral sites
    • Physical perimeters, access control, environment and cabling protection
    • Secure disposal and storage media controls
  • Technological controls

    • Identity and access management, privileged access, authentication
    • Endpoint protection, malware defences, vulnerability and configuration management
    • Data backup, deletion, masking and data leakage prevention
  • Incident and continuity

    • Incident management planning, evidence collection, learning and business continuity readiness for ICT/OT
  • Compliance and assurance

    • Legal/regulatory requirements, independent review, documented procedures

The standard includes energy-sector-specific controls (ENR) such as securing control centres, interconnected control systems and customer-facing security considerations.

Practical applications and who should use it

EN ISO/IEC 27019 is practical for organizations that need to apply ISO-class information security controls in energy contexts:

  • Energy utilities and grid operators (electricity, gas, oil, heat)
  • IT and OT security teams responsible for control systems and SCADA environments
  • Compliance officers and internal auditors implementing ISMS aligned with ISO/IEC 27001/27002
  • System integrators, suppliers and cloud providers delivering services to energy operators
  • Incident response teams and business continuity planners for energy operations

Use cases include designing secure control centres, managing supplier/ICT supply chain risks, implementing privileged access for OT, and developing incident response playbooks specific to energy infrastructure.

Related standards

  • ISO/IEC 27002:2022 (base code of practice for information security controls)
  • ISO/IEC 27001 (Information security management system framework)

Keywords: EN ISO/IEC 27019:2025, ISO/IEC 27019:2024, information security controls, energy utility industry, cybersecurity, OT security, control centres, supplier security, ISMS.

Standard

EN ISO/IEC 27019:2026

English language
50 pages
Preview
Preview
e-Library read for
1 day

Frequently Asked Questions

EN ISO/IEC 27019:2025 is a standard published by the European Committee for Standardization (CEN). Its full title is "Information security, cybersecurity and privacy protection - Information security controls for the energy utility industry (ISO/IEC 27019:2024)". This standard covers: This document provides information security controls for the energy utility industry, based on ISO/IEC 27002:2022, for controlling and monitoring the production or generation, transmission, storage and distribution of electric power, gas, oil and heat, and for the control of associated supporting processes.

This document provides information security controls for the energy utility industry, based on ISO/IEC 27002:2022, for controlling and monitoring the production or generation, transmission, storage and distribution of electric power, gas, oil and heat, and for the control of associated supporting processes.

EN ISO/IEC 27019:2025 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.

EN ISO/IEC 27019:2025 has the following relationships with other standards: It is inter standard links to EN ISO/IEC 27019:2020. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

EN ISO/IEC 27019:2025 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.

Standards Content (Sample)


SLOVENSKI STANDARD
01-februar-2026
Informacijska varnost, kibernetska varnost in varstvo zasebnosti - Kontrole
informacijske varnosti za energetske operaterje (ISO/IEC 27019:2024)
Information security, cybersecurity and privacy protection - Information security controls
for the energy utility industry (ISO/IEC 27019:2024)
Informationssicherheit, Cybersicherheit und Schutz der Privatsphäre -
Informationssicherheitsmaßnahmen für die Energieversorgung (ISO/IEC 27019:2024)
Sécurité de l'information, cybersécurité et protection de la vie privée - Mesures de
sécurité de l'information pour l'industrie des opérateurs de l'énergie (ISO/IEC
27019:2024)
Ta slovenski standard je istoveten z: EN ISO/IEC 27019:2025
ICS:
03.100.70 Sistemi vodenja Management systems
27.010 Prenos energije in toplote na Energy and heat transfer
splošno engineering in general
35.030 Informacijska varnost IT Security
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD EN ISO/IEC 27019

NORME EUROPÉENNE
EUROPÄISCHE NORM
December 2025
ICS 35.030
Supersedes EN ISO/IEC 27019:2020
English version
Information security, cybersecurity and privacy protection
- Information security controls for the energy utility
industry (ISO/IEC 27019:2024)
Sécurité de l'information, cybersécurité et protection Informationssicherheit, Cybersicherheit und Schutz
de la vie privée - Mesures de sécurité de l'information der Privatsphäre -
pour l'industrie des opérateurs de l'énergie (ISO/IEC Informationssicherheitsmaßnahmen für die
27019:2024) Energieversorgung (ISO/IEC 27019:2024)
This European Standard was approved by CEN on 7 December 2025.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for
giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical
references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to
any CEN and CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC
Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,
Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,
Slovakia, Slovenia, Spain, Sweden, Switzerland, Türkiye and United Kingdom.

CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels
© 2025 CEN/CENELEC All rights of exploitation in any form and by any means
Ref. No. EN ISO/IEC 27019:2025 E
reserved worldwide for CEN national Members and for
CENELEC Members.
Contents Page
European foreword . 3

European foreword
The text of ISO/IEC 27019:2024 has been prepared by Technical Committee ISO/IEC JTC 1 "Information
technology” of the International Organization for Standardization (ISO) and has been taken over as
Protection” the secretariat of which is held by DIN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by June 2026, and conflicting national standards shall be
withdrawn at the latest by June 2026.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN-CENELEC shall not be held responsible for identifying any or all such patent rights.
This document supersedes EN ISO/IEC 27019:2020.
Any feedback and questions on this document should be directed to the users’ national standards body.
A complete listing of these bodies can be found on the CEN and CENELEC websites.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of
North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Türkiye and the
United Kingdom.
Endorsement notice
The text of ISO/IEC 27019:2024 has been approved by CEN-CENELEC as EN ISO/IEC 27019:2025
without any modification.
International
Standard
ISO/IEC 27019
Second edition
Information security, cybersecurity
2024-10
and privacy protection —
Information security controls for
the energy utility industry
Sécurité de l'information, cybersécurité et protection de la vie
privée — Mesures de sécurité de l'information pour l'industrie
des opérateurs de l'énergie
Reference number
ISO/IEC 27019:2024(en) © ISO/IEC 2024

ISO/IEC 27019:2024(en)
© ISO/IEC 2024
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2024 – All rights reserved
ii
ISO/IEC 27019:2024(en)
Contents Page
Foreword .vi
Introduction .vii
1 Scope . 1
2 Normative references . 2
3 Terms, definitions and abbreviated terms . 2
3.1 Terms and definitions .2
3.2 Abbreviated terms .4
4 Structure of this document . 4
5 Organizational controls . 4
5.1 Policies for information security . .4
5.2 Information security roles and responsibilities .4
5.3 Segregation of duties.4
5.4 Management responsibilities .4
5.5 Contact with authorities .5
5.6 Contact with special interest groups . .5
5.7 Threat intelligence .5
5.8 Information security in project management .5
5.9 Inventory of information and other associated assets .6
5.10 Acceptable use of information and other associated assets .6
5.11 Return of assets .6
5.12 Classification of information .6
5.13 Labelling of information .7
5.14 Information transfer .7
5.15 Access control .7
5.16 Identity management .7
5.17 Authentication information .8
5.18 Access rights .8
5.19 Information security in supplier relationships .8
5.20 Addressing information security within supplier agreements .8
5.21 Managing information security in the ICT supply chain .9
5.22 M onitoring, review and change management of supplier services .9
5.23 Information security for use of cloud services .9
5.24 Information security incident management planning and preparation .9
5.25 A ssessment and decision on information security events .9
5.26 Response to information security incidents .9
5.27 Learning from information security incidents .9
5.28 Collection of evidence . .9
5.29 Information security during disruption .9
5.30 ICT readiness for business continuity .9
5.31 L egal, statutory, regulatory and contractual requirements .10
5.32 Intellectual property rights .10
5.33 Protection of records .10
5.34 Privacy and protection of PII .10
5.35 Independent review of information security .10
5.36 C ompliance with policies, rules and standards for information security .10
5.37 Documented operating procedures .10
5.38 ENR – Identification of risks related to external business partners .10
5.39 ENR – Addressing security when dealing with customers .11
6 People controls .12
6.1 Screening . 12
6.2 Terms and conditions of employment . 12
6.3 Information security awareness, education and training . 12
6.4 Disciplinary process . 12

© ISO/IEC 2024 – All rights reserved
iii
ISO/IEC 27019:2024(en)
6.5 Responsibilities after termination or change of employment. 12
6.6 Confidentiality or non-disclosure agreements . 12
6.7 Remote working . 13
6.8 Information security event reporting. 13
7 Physical controls .13
7.1 Physical security perimeters . 13
7.2 Physical entry . 13
7.3 Securing offices, rooms and facilities . 13
7.4 Physical security monitoring . . 13
7.5 Protecting against physical and environmental threats .14
7.6 Working in secure areas .14
7.7 Clear desk and clear screen .14
7.8 Equipment siting and protection .14
7.9 Security of assets off-premises .14
7.10 Storage media . 15
7.11 Supporting utilities . 15
7.12 Cabling security . 15
7.13 Equipment maintenance . 15
7.14 Secure disposal or re-use of equipment . 15
7.15 ENR – Securing control centres . 15
7.16 ENR – Securing equipment rooms .16
7.17 ENR – Securing peripheral sites.18
7.18 ENR – Interconnected control and communication systems .18
8 Technological controls . 19
8.1 User endpoint devices .19
8.2 Privileged access rights . 20
8.3 Information access restriction . 20
8.4 Access to source code . 20
8.5 Secure authentication . 20
8.6 Capacity management . 20
8.7 Protection against malware . 20
8.8 Management of technical vulnerabilities .21
8.9 Configuration management .21
8.10 Information deletion .21
8.11 Data masking .21
8.12 Data leakage prevention .21
8.13 Information backup.21
8.14 Redundancy of information processing facilities .21
8.15 Logging .21
8.16 M onitoring activities . 22
8.17 Clock synchronization . 22
8.18 Use of privileged utility programs . 22
8.19 Installation of software on operational systems . 22
8.20 Networks security . 22
8.21 Security of network services . 22
8.22 Segregation of networks . 23
8.23 Web filtering . 23
8.24 Use of cryptography . 23
8.25 Secure development life cycle . 23
8.26 Application security requirements . 23
8.27 Secure system architecture and engineering principles . 23
8.28 Secure coding. 23
8.29 Security testing in development and acceptance . 23
8.30 Outsourced development . 23
8.31 Separation of development, test and production environments. 23
8.32 Change management .24
8.33 Test information .24
8.34 Protection of information systems during audit testing .24

© ISO/IEC 2024 – All rights reserved
iv
ISO/IEC 27019:2024(en)
8.35 ENR – Treatment of legacy systems .24
8.36 ENR – Integrity and availability of safety functions . 25
8.37 ENR – Securing process control data communication . 25
8.38 ENR – Logical connection of external process control systems . 26
8.39 ENR – Least functionality .27
8.40 ENR – Emergency communication .27
Annex A (informative) Energy utility industry specific controls reference .29
Annex B (informative) Correspondence between this document and the first edition (ISO/IEC
27019:2017).30
Bibliography .38

© ISO/IEC 2024 – All rights reserved
v
ISO/IEC 27019:2024(en)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations,
governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.
The procedures used to develop this document and those intended for its further maintenance are described
in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the different types
of document should be noted. This document was drafted in accordance with the editorial rules of the ISO/
IEC Directives, Part 2 (see www.iso.org/directives or www.iec.ch/members_experts/refdocs).
ISO and IEC draw attention to the possibility that the implementation of this document may involve the
use of (a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of any
claimed patent rights in respect thereof. As of the date of publication of this document, ISO and IEC had not
received notice of (a) patent(s) which may be required to implement this document. However, implementers
are cautioned that this may not represent the latest information, which may be obtained from the patent
database available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall not be held
responsible for identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and expressions
related to conformity assessment, as well as information about ISO's adherence to the World Trade
Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www.iso.org/iso/foreword.html.
In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
This second edition cancels and replaces the first edition (ISO/IEC 27019:2017), which has been technically
revised.
The main changes are as follows:
— alignment of the controls to the organizational, people, physical and technological themes covered in
ISO/IEC 27002:2022;
— the “Guidance” and “Other information” in Clauses 5 to 8 have been updated, to avoid redundancies with
ISO/IEC 27002:2022;
— attributes have been added to the controls specific to this document.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.

© ISO/IEC 2024 – All rights reserved
vi
ISO/IEC 27019:2024(en)
Introduction
0.1  Background and context
This document provides guidance based on ISO/IEC 27002:2022 for information security management when
applied to process control systems used in the energy utility industry. The aim of this document is to extend
the contents of ISO/IEC 27002:2022 to the domain of process control systems and automation technology for
the energy industry.
In addition to the security objectives and measures that are set forth in ISO/IEC 27002:2022, the process
control systems used by energy utilities and energy suppliers are subject to further special requirements.
In comparison with conventional information and communication technology (ICT) environments (e.g.
office information technology, energy trading systems), there are fundamental and significant differences
with respect to the development, operation, repair, maintenance and operating environment of process
control systems. Furthermore, the process technology referred to in this document can represent integral
components of critical infrastructures. This means they are therefore essential for the secure and reliable
operation of such infrastructures. These distinctions and characteristics should be taken into due
consideration by the management processes for process control systems and justify separate consideration
within ISO/IEC 27001 and related standards.
From the viewpoint of design and function, process control systems used by the energy utility industry are
in fact information processing systems. They collect process data and monitor the status of the physical
processes using sensors. The systems then process this data and generate control outputs that regulate
actions using actuators. The control and regulation are automatic, but manual intervention by operating
personnel is also possible. Information and information processing systems are therefore an essential part
of operational processes within energy utilities. It is important that appropriate controls be applied in the
same manner as for other organizational units.
Software and hardware (e.g. programmable logic) components based on standard ICT technology are
increasingly utilized in process control environments and are also covered in this document. Furthermore,
process control systems in the energy utility industry are increasingly interconnected to form complex
systems. Risks arising from this trend should be considered in a risk assessment.
The information and information processing systems in process control environments are also exposed to
an increasing number of threats and vulnerabilities.
Effective information security in the process control domain of the energy utility industry can be achieved
by establishing, implementing, monitoring, reviewing and, if necessary, improving the applicable controls
set forth in this document, in order to attain the specific security and business objectives of the organization.
It is important to give particular consideration here to the special role of the energy utilities in society
and to the economic necessity of a secure and reliable energy supply. Ultimately, the overall success of the
cybersecurity of energy industries is based on collaborative efforts by all stakeholders (vendors, suppliers,
customers, etc.).
0.2  Security considerations for process control systems used by energy utilities
The requirement for a general and overall information security framework for the process control domain of
the energy utility industry is based on several basic requirements:
a) Customers expect a secure and reliable energy supply.
b) Legal requirements demand safe, reliable and secure operation of energy supply systems.
c) Energy providers require information security in order to safeguard their business interests, meet
customers’ needs and comply with legal regulations.

© ISO/IEC 2024 – All rights reserved
vii
ISO/IEC 27019:2024(en)
0.3  Information security requirements
It is essential that energy utility organizations identify their security requirements. There are three main
sources of security requirements:
a) the assessment of risks to the organization, taking into account the organization’s overall business
strategy and objectives. This can be facilitated or supported through an information security-specific
risk assessment. This should result in the determination of the controls necessary to ensure that the
residual risk to the organization meets its risk acceptance criteria;
b) the legal, statutory, regulatory and contractual requirements that an organization and its interested
parties (trading partners, service providers, etc.) are expected to comply with and their socio-cultural
environment;
c) the set of principles, objectives and business requirements for all the steps of the life cycle of information
that an organization has developed to support its operations.
NOTE It is important that energy utility organizations ensure that security requirements of process control
systems are analysed and adequately covered in policies for information security. The analysis of the information
security requirements and objectives include the consideration of all relevant criteria for a secure energy supply and
delivery, such as:
— impairment of the security of energy supply;
— restriction of energy flow;
— affected share of population;
— danger of physical injury;
— effects on other critical infrastructures;
— effects on information privacy;
— financial impacts.
0.4  Determining controls
Once the security requirements and risks have been identified and decisions taken on how to deal with the
risks, appropriate controls are then selected and implemented in order to ensure that the risks are reduced
to an acceptable level.
In addition to the controls provided by a comprehensive information security management system, this
document provides additional assistance and sector-specific measures for the process control systems used
by the energy utility industry, taking into consideration the special requirements in these environments.
If necessary, further controls can be developed to fulfil particular requirements. The selection of controls
depends upon the decisions taken by the organization on the basis of its own risk acceptance criteria, the
options for dealing with the risk and the general risk management approach of the organization.
NOTE National and international law, legal ordinances and regulations can apply.
0.5  Audience
This document is targeted at the persons responsible for the operation of process control systems used by
energy utilities, information security managers, vendors, system integrators and auditors. For this target
group, this document details the fundamental controls according to the objectives of ISO/IEC 27002:2022
and defines specific measures for process control systems in the energy utility industry, their supporting
systems and the associated infrastructure.

© ISO/IEC 2024 – All rights reserved
viii
International Standard ISO/IEC 27019:2024(en)
Information security, cybersecurity and privacy protection —
Information security controls for the energy utility industry
1 Scope
This document provides information security controls for the energy utility industry, based on
ISO/IEC 27002:2022, for controlling and monitoring the production or generation, transmission, storage and
distribution of electric power, gas, oil and heat, and for the control of associated supporting processes. This
includes in particular the following:
— central and distributed process control, monitoring and automation technology as well as information
systems used for their operation, such as programming and parameterization devices;
— digital controllers and automation components such as control and field devices or programmable logic
controllers (PLCs), including digital sensor and actuator elements;
— all further supporting information systems used in the process control domain, e.g. for supplementary
data visualization tasks and for controlling, monitoring, data archiving, historian logging, reporting and
documentation purposes;
— communication technology used in the process control domain, e.g. networks, telemetry, telecontrol
applications and remote-control technology;
— Advanced metering infrastructure (AMI) components, e.g. smart meters;
— measurement devices, e.g. for emission values;
— digital protection and safety systems, e.g. protection relays, safety PLCs, emergency governor
mechanisms;
— energy management systems, e.g. for distributed energy resources (DER), electric charging
infrastructures, and for private households, residential buildings or industrial customer installations;
— distributed components of smart grid environments, e.g. in energy grids, in private households,
residential buildings or industrial customer installations;
— all software, firmware and applications installed on above-mentioned systems, e.g. distribution
management system (DMS) applications or outage management systems (OMS);
— any premises housing the abovementioned equipment and systems;
— remote maintenance systems for abovementioned systems.
This document does not apply to the process control domain of nuclear facilities. This domain is covered by
IEC 63096.
© ISO/IEC 2024 – All rights reserved
ISO/IEC 27019:2024(en)
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content constitutes
requirements of this document. For dated references, only the edition cited applies. For undated references,
the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 27002:2022, Information security, cybersecurity and privacy protection — Information security
controls
3 Terms, definitions and abbreviated terms
3.1 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 27002 and the following apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at https:// www .electropedia .org/
3.1.1
blackout
widespread electrical power outage
3.1.2
black start
start-up of an electric power system from a total or partial blackout through internal or external energy
resources
3.1.3
computer security incident response team
CSIRT
team of security experts to support the handling of information security incidents
3.1.4
critical asset
asset which can have a direct impact on production or generation, transmission, storage and distribution of
electric power, gas, oil and heat
3.1.5
critical infrastructure
set of organizations and facilities that are essential for the functioning of society and the economy as a whole
Note 1 to entry: A failure or malfunction of such organizations and facilities can result in sustai
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...