Amendment 2 - Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP

Amendement 2 - Gestion des systèmes de puissance et échanges d'informations associés - Sécurité des communications et des données - Partie 3: Sécurité des réseaux et des systèmes de communication - Profils comprenant TCP/IP

General Information

Status
Published
Publication Date
26-Feb-2020
Drafting Committee
WG 15 - TC 57/WG 15
Current Stage
DELPUB - Deleted Publication
Start Date
06-Jun-2023
Completion Date
26-Oct-2025

Relations

Effective Date
05-Sep-2023
Effective Date
05-Sep-2023

Overview

IEC 62351-3:2014/AMD2:2020 is an important amendment to the IEC 62351-3 international standard issued by the International Electrotechnical Commission (IEC). The standard focuses on power systems management and associated information exchange, specifically addressing data and communications security related to communication network and system security using TCP/IP profiles. This Amendment 2 introduces critical updates enhancing security protocols within power systems communication networks, ensuring stronger protection against vulnerabilities in modern smart grid environments.

Key Topics

  • TLS Version Handling:

    • TLS versions 1.0 and 1.1 are made optional instead of mandatory due to known security weaknesses. TLS 1.2 is now the default supported version, with recommendations to shift exclusively toward TLS 1.2 or higher for better security.
    • TLS session renegotiation and resumption processes have been updated to prevent in-session TLS version downgrades or upgrades, increasing communication session integrity.
    • Warning and alarm events are raised upon detection of insecure or deprecated TLS versions for improved system monitoring.
  • Deprecation of Weak Cryptographic Algorithms:

    • RSA1024 and SHA-1 algorithms are deprecated to phase out vulnerable cryptographic practices, encouraging use of stronger alternatives like SHA-256.
    • Use of SHA-1 is limited to backward compatibility only.
  • Security Event Management:

    • This amendment formalizes handling of security events (warnings and alarms) such as cipher suite mismatches, certificate expiration, certificate revocation, and TLS version changes.
    • Security events assist operators in error detection and proactive system resilience management by integrating with IEC 62351-14 cybersecurity event framework and network/system management objects per IEC 62351-7.
  • Certificate and Authentication Enhancements:

    • Requirements for certificate exchange and verification have been enhanced, including:
      • Raising alarms if valid certificates or Certificate Authorities (CAs) are missing or not found during TLS handshake.
      • Handling scenarios of expired, revoked, or unavailable Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP) responders with appropriate warnings or alarms.
      • Terminating connections confidently on failed authentication checks to strengthen trust.
  • Clarifications and References:

    • The amendment updates normative references to reflect related IEC 62351 parts, especially IEC 62351-7 on network and system management data models.
    • Includes explanatory text and practical examples for TLS session renegotiation and certificate handling to aid implementation.

Applications

IEC 62351-3:2014/AMD2:2020 is crucial for securing communications within electrical power systems and related critical infrastructure. Its practical applications include:

  • Smart Grid Communication Security:
    Protecting transmission control, distribution management systems, and SCADA systems from cybersecurity threats by enforcing secure encrypted communication protocols and robust certificate handling.

  • Utility Network Infrastructure:
    Ensuring safe and reliable data exchange between various control centers, substations, and field devices using strong TLS profiles aligned with modern cybersecurity best practices.

  • Cybersecurity Event Handling:
    Enabling utilities and operators to implement advanced monitoring, automated alerts, and incident response based on real-time security events defined in the standard.

  • Compliance Frameworks:
    Assisting organizations to meet international mandates and standards for cybersecurity in critical infrastructure, particularly emphasizing communication network security layers.

Related Standards

For full security coverage in power system management communications, IEC 62351-3 should be considered in conjunction with:

  • IEC 62351-1: Overview and general principles for data and communication security in power systems.
  • IEC 62351-7: Defines network and system management (NSM) data object models, essential for monitoring and managing security events.
  • IEC 62351-14: Specifies cybersecurity events for consistent warning and alarm management across power system components.
  • IEC 62351-4, 5, 6: Cover security for power system telemetry protocols such as MMS, DNP3, and IEC 61850-90-5 respectively.

Implementing IEC 62351-3 alongside these related standards facilitates an integrated, layered cybersecurity approach that protects operational technology (OT) networks from evolving threats.


Keywords: IEC 62351-3 amendment, power systems communication security, TCP/IP security profiles, TLS in smart grids, cryptographic algorithm deprecation, cybersecurity events, certificate management, smart grid standards, IEC cybersecurity, power system data security, network security IEC, power grid communication protocols.

Standard

IEC 62351-3:2014/AMD2:2020 - Amendment 2 - Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP

English and French language
21 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

IEC 62351-3:2014/AMD2:2020 is a standard published by the International Electrotechnical Commission (IEC). Its full title is "Amendment 2 - Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP". This standard covers: Amendment 2 - Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP

Amendment 2 - Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP/IP

IEC 62351-3:2014/AMD2:2020 is classified under the following ICS (International Classification for Standards) categories: 33.200 - Telecontrol. Telemetering. The ICS classification helps identify the subject area and facilitates finding related standards.

IEC 62351-3:2014/AMD2:2020 has the following relationships with other standards: It is inter standard links to IEC 62351-3:2014, IEC 62351-3:2023. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

You can purchase IEC 62351-3:2014/AMD2:2020 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of IEC standards.

Standards Content (Sample)


IEC 62351-3 ®
Edition 1.0 2020-02
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
A MENDMENT 2
AM ENDEMENT 2
Power systems management and associated information exchange – Data
and communications security –
Part 3: Communication network and system security – Profiles including TCP/IP

Gestion des systèmes de puissance et échanges d'informations associés –
Sécurité des communications et des données –
Partie 3: Sécurité des réseaux et des systèmes de communication – Profils
comprenant TCP/IP
IEC 62351-3:2014-10/AMD2:2020-02(en-fr)

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.

Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite
ni utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie
et les microfilms, sans l'accord écrit de l'IEC ou du Comité national de l'IEC du pays du demandeur. Si vous avez des
questions sur le copyright de l'IEC ou si vous désirez obtenir des droits supplémentaires sur cette publication, utilisez
les coordonnées ci-après ou contactez le Comité national de l'IEC de votre pays de résidence.

IEC Central Office Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.

About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigendum or an amendment might have been published.

IEC publications search - webstore.iec.ch/advsearchform Electropedia - www.electropedia.org
The advanced search enables to find IEC publications by a The world's leading online dictionary on electrotechnology,
variety of criteria (reference number, text, technical containing more than 22 000 terminological entries in English
committee,…). It also gives information on projects, replaced and French, with equivalent terms in 16 additional languages.
and withdrawn publications. Also known as the International Electrotechnical Vocabulary

(IEV) online.
IEC Just Published - webstore.iec.ch/justpublished
Stay up to date on all new IEC publications. Just Published IEC Glossary - std.iec.ch/glossary
details all new publications released. Available online and 67 000 electrotechnical terminology entries in English and
once a month by email. French extracted from the Terms and Definitions clause of
IEC publications issued since 2002. Some entries have been
IEC Customer Service Centre - webstore.iec.ch/csc collected from earlier publications of IEC TC 37, 77, 86 and
If you wish to give us your feedback on this publication or CISPR.

need further assistance, please contact the Customer Service

Centre: sales@iec.ch.
A propos de l'IEC
La Commission Electrotechnique Internationale (IEC) est la première organisation mondiale qui élabore et publie des
Normes internationales pour tout ce qui a trait à l'électricité, à l'électronique et aux technologies apparentées.

A propos des publications IEC
Le contenu technique des publications IEC est constamment revu. Veuillez vous assurer que vous possédez l’édition la
plus récente, un corrigendum ou amendement peut avoir été publié.

Recherche de publications IEC - Electropedia - www.electropedia.org
webstore.iec.ch/advsearchform Le premier dictionnaire d'électrotechnologie en ligne au
La recherche avancée permet de trouver des publications IEC monde, avec plus de 22 000 articles terminologiques en
en utilisant différents critères (numéro de référence, texte, anglais et en français, ainsi que les termes équivalents dans
comité d’études,…). Elle donne aussi des informations sur les 16 langues additionnelles. Egalement appelé Vocabulaire
projets et les publications remplacées ou retirées. Electrotechnique International (IEV) en ligne.

IEC Just Published - webstore.iec.ch/justpublished Glossaire IEC - std.iec.ch/glossary
Restez informé sur les nouvelles publications IEC. Just 67 000 entrées terminologiques électrotechniques, en anglais
Published détaille les nouvelles publications parues. et en français, extraites des articles Termes et Définitions des
Disponible en ligne et une fois par mois par email. publications IEC parues depuis 2002. Plus certaines entrées
antérieures extraites des publications des CE 37, 77, 86 et
Service Clients - webstore.iec.ch/csc CISPR de l'IEC.

Si vous désirez nous donner des commentaires sur cette
publication ou si vous avez des questions contactez-nous:
sales@iec.ch.
IEC 62351-3 ®
Edition 1.0 2020-02
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
A MENDMENT 2
AM ENDEMENT 2
Power systems management and associated information exchange – Data

and communications security –
Part 3: Communication network and system security – Profiles including TCP/IP

Gestion des systèmes de puissance et échanges d'informations associés –

Sécurité des communications et des données –

Partie 3: Sécurité des réseaux et des systèmes de communication – Profils

comprenant TCP/IP
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
INTERNATIONALE
ICS 33.200 ISBN 978-2-8322-7713-3

– 2 – IEC 62351-3:2014/AMD2:2020
© IEC 2020
FOREWORD
This amendment to International Standard IEC 62351-3 has been prepared by IEC technical
committee 57: Power systems management and associated information exchange.
The text of this standard is based on the following documents:
FDIS Report on voting
57/2149/FDIS 57/2167/RVD
Full information on the voting for the approval of this standard can be found in the report on
voting indicated in the above table.
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2.
A list of all parts in the IEC 62351 series, published under the general title Power systems
management and associated information exchange – Data and communications security, can
be found on the IEC website.
The committee has decided that the contents of this publication will remain unchanged until the
stability date indicated on the IEC web site under "http://webstore.iec.ch" in the data related to
the specific publication. At this date, the publication will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
____________
INTRODUCTION to Amendment 2
This amendment to International Standard IEC 62351-3 and its Amendment 1 (2018) has been
prepared in order to address the following issues:
– Support for TLS versions 1.1 and 1.0 is made optional instead of mandatory to address
known weaknesses. This is aligned with the defined security warnings for TLS versions 1.1
and 1.0.
– Update of TLS version handling during renegotiation and resumption to avoid TLS version
downgrade/upgrade within a same session.
– Updated explanatory text for session renegotiation to make the communication relations
clearer.
– Deprecation of RSA1024 and SHA-1 algorithms. This underlines the desire to disallow them
in the next edition.
– Inclusion of PICS section for mandatory and optional settings in TLS.
– Updated text for and enhancements of security events to better align with IEC 62351-14.
– Inclusion of general remarks for the security event handling.
– Update of references.
© IEC 2020
Moreover, explanatory text has been included to better describe certain options as well as an
adjustment to the requirements for referencing standards.
2 Normative references
Add the following new document to the list of references:
IEC 62351-7, Power systems management and associated information exchange – Data and
communications security – Part 7: Network and System Management (NSM) data object models
4 Security issues addressed by this standard
4.2 Security threats countered
Replace the existing text of the second paragraph of Subclause 4.2 as modified by Amendment
1 with the following new text:
TCP/IP and the security specifications in this part of IEC 62351 cover only the communication
transport layers (OSI layers 4 and lower). Specifically, TLS protects the transported messages
from OSI layer 5 and above in a transparent way. This part of IEC 62351 does not cover security
functionality specific for the communication application layers (OSI layers 5 and above) or
application-to-application security.
Add, after existing Subclause 4.3 as modified by Amendment 1, the following new
Subclause 4.4:
4.4 Handling of security events
Throughout the document security events are defined as warnings and alarms. These security
events are intended to support the error handling and thus to increase system resilience.
Implementations should provide a mechanism for announcing security events.
It is recommended that the security warning and alarms throughout the document are
implemented by cyber security events as specified by IEC 62351-14 or by monitoring objects
as specified by IEC 62351-7.
Note that warnings and alarms are used to indicate the severity of an event from a security
point of view. The following notion is used:
– A warning was intended to raise awareness but to indicate that it may be safe to proceed.
– An alarm is an indication to not proceed.
In any case, it is expected that an operator’s security policy determines the final handling based
on the operational environment.
5 Mandatory requirements
5.1 Deprecation of cipher suites
Replace the existing text of the second paragraph of Subclause 5.1 with the following new text:
If the communication connection is encrypted the following cipher suites may be used:
– TLS_RSA_WITH_NULL_SHA
– TLS_RSA_WITH_NULL_SHA256
Replace the existing text of the fourth paragraph of Subclause 5.1 as added by Amendment 1
with the following new text:
– 4 – IEC 62351-3:2014/AMD2:2020
© IEC 2020
The support of SHA-1 is deprecated. Its use is limited to backward compatibility. SHA-256 shall
be supported and is the preferred hash algorithm to be used.
Add, at the end of Subclause 5.1, the following new text:
The failure in finding a matching cipher suite during the TLS handshake shall raise a security
event ("alarm: no matching TLS cipher suites”).
5.2 Negotiation of versions
Replace the existing text of the first paragraph of Subclause 5.2 with the following new text:
TLS v1.2 as defined in RFC 5246 (sometimes referred to as SSL v3.3) is the default version
that shall be supported. Higher versions may be supported.
NOTE 1 This document refers to features defined for TLS 1.2. Higher versions of TLS, like TLS 1.3, do not
necessarily support all features listed in this document.
It is recommended that the TLS client initiating a TLS connection indicates the highest TLS
version supported in the ClientHello message of the TLS handshake. The receiving TLS
server may accept higher versions if functional supported and allowed by the security policy of
the operating environment.
To ensure backward compatibility implementations may optionally support TLS version 1.0 and
1.1 (sometimes referred to as SSL v3.1 and v3.2). The TLS handshake provides a built-in
mechanism that shall be used to support version negotiation. The peer initiating a TLS
connection shall always indicate the highest TLS version supported during the TLS handshake
message. The application of TLS versions other than v1.2 is a matter of the local security policy.
Proposal of versions prior to TLS 1.0 shall result in no secure connection being established
(see also RFC 6176).
NOTE 2 For TLS 1.0 and TLS 1.1 certain security issues are known, The optional support is only intended for
backward compatibility and it is strongly recommended to switch to TLS 1.2.
Replace the existing text of the second and third paragraphs of Subclause 5.2 with the following
new text:
The proposal of versions prior to TLS 1.0 or SSL 3.1 shall raise a security event ("alarm:
unsecure communication").
NOTE 3 The option to remotely monitor security events is preferred.
The proposal of versions TLS 1.0 or TLS 1.1 shall raise a security event ("warning: insecure
TLS version").
Add, at the end of Subclause 5.2, the following new text:
If the negotiated TLS version from the initial TLS handshake changes in an ongoing TLS session
during a TLS session renegotiation or a session resumption handshake from either side the
TLS session shall be terminated. The termination of the session should raise a security event
("alarm: TLS Version change detected").
5.3 Session Resumption
Replace the reference to RFC 5280 in the first paragraph of Subclause 5.3 as modified by
Amendment 1 with the following new reference:
RFC 5246
© IEC 2020
Replace the last sentence of the first paragraph of Subclause 5.3 as modified by Amendment 1
with the following new text:
Session resumption is expected to be more frequent than session renegotiation leading to a
smaller session resumption interval than the session renegotiation interval. (0 < session
resumption interval < session renegotiation interval <= 24h).
Replace the reference to PIXIT in the second paragraph of Subclause 5.3 as modified by
Amendment 1 with the following new reference:
PICS
At the end of Subclause 5.3 as modified by Amendment 1 add the following note:
NOTE An informative example regarding the configuration is provided at the end of Subclause 5.4.
5.4 Session renegotiation
Replace the reference to "PIXIT (Protocol Implementation eXtra Information for Testing)" in the
third paragraph of Subclause 5.4 as modified by Amendment 1 with the following new reference:
PICS
Replace the existing text of the sixth paragraph of Subclause 5.4 as added by Amendment 1
with the following new text:
The calling (TLS client) and the called (TLS server) entity are responsible for verifying that the
TLS session renegotiation takes place at the expected intervals. If the calling entity does not
receive a TLS session renegotiation request (HelloRequest) from the called entity at the
expected interval, then the calling entity shall initiate the TLS renegotiation itself using a
ClientHello. If the called entity does not receive a TLS renegotiation (ClientHello) in
response to a HelloRequest, the called entity shall terminate the connection. The termination
of a connection due to a missed TLS session renegotiation should raise a security event ("alarm:
session renegotiation interval expired").
Add the following new text at the end of Subclause 5.4:
The following Informative example is provided:
– The assumed CRL refresh time (or OCSP response validity) is 24h.
– Session renegotiation involves the validation of the peer certificates including the revocation
check. Session renegotiation involving the peer certificates for authentication may be
performed at least every 12 hours.
– To allow for a session key update during the 12-hour session renegotiation interval session
resumption is performed every 2 hours during the session. The maximum time to resume a
previously ended session is 24 hours.
5.6.1 Multiple Certification Authorities (CAs)
Replace the existing text of the last paragraph of Subclause 5.6.1 with the following new text:
The failure of selecting a matching CA issued certificate shall raise a security event ("alarm:
CA certificate not found").
5.6.2 Certificate size
Add, at the end of Subclause 5.6.2, the following new text:

– 6 – IEC 62351-3:2014/AMD2:2020
© IEC 2020
Exceeding the maximum size of a certificate during a TLS handshake shall raise a security
event ("alarm: TLS certificate size exceeded”).
5.6.3 Certificate exchange
Replace the existing text of the last paragraph of Subclause 5.6.3 as modified by Amendment
1 with the following new text:
The connection termination due to the lack of a certificate of either side shall raise a security
event ("alarm: certificate unavailable").
5.6.4.2 Verification based upon CA
Add, at the end of Subclause 5.6.4.2, the following new text:
The failure of finding a matching CA certificate during a TLS handshake shall raise a security
event ("alarm: certificate validation: CA certificate not available”).
5.6.4.3 Verification based upon individual certificates
Add, at the end of Subclause 5.6.4.3, the following new text:
The failure of finding a matching individual certificate during a TLS handshake shall raise a
security event ("alarm: certificate validation: trusted individual certificate not available”).
5.6.4.4 Certificate revocation
Add, after the fourth paragraph of Subclause 5.6.4.4 as modified by Amendment 1, the following
new text:
The unavailability of a CRL shall raise a security event ("warning: CRL not accessible").
NOTE 1 The CRL may be distributed in different ways (manual as file, fetched from CRL distribution point, etc.).
NOTE 2 If there are no revoked certificates, the CRL is an empty list, but still needs to be available.").
The expiry of a CRL shall raise a security event ("warning: CRL expired")."
If OCSP is applied for certificate revocation checks, the inaccessibility to the OCSP responder
shall raise a security event: ("warning: OCSP responder not accessible")". The expiry of an
OCSP response shall raise a security event ("warning: OCSP response expired")."
Replace the existing text of the last paragraph of Subclause 5.6.4.4 as modified by Amendment
1 with the following new text:
The refusal / termination of a connection due to a revoked certificate shall raise a security event
("alarm: revoked certificate").
Renumber the existing note at the end of Subclause 5.6.4.4 as modified by Amendment 1 as
NOTE 3.
5.6.4.5 Expired certificates
Replace the existing text of the last paragraph of Subclause 5.6.4.5 as modified by Amendment
1 with the following new text:
The refusal of a connection due to an expired certificate shall raise a security event ("alarm:
expired certificate").
© IEC 2020
5.6.4.6 Signing
Delete the following bullet point in the second paragraph of Subclause 5.6.4.6:
– Optional: Signature-operation: RSA with a key length of 1 024 Bits (legacy mode);
Delete the following text from the second bullet point in the second paragraph of Subclause
5.6.4.6:
(modern mode)
Replace the existing text of the third paragraph of Subclause 5.6.4.6 with the following new text:
The support of RSA with 1 024 bit keys is deprecated. Its use is limited to backward compatibility.
RSA with 2 048 bit keys must be supported and is the preferred signature algorithm to be used.
Replace the existing text of the ninth paragraph of Subclause 5.6.4.6 as added by Amendment
1 with the following new text:
The support of SHA-1 is deprecated. Its use is limited to backward compatibility. SHA-256 shall
be supported and is the preferred hash algorithm to be used.
Add, at the end of Subclause 5.6.4.6, the following new text:
The failure of finding a matching signature algorithm to the certificate components during a TLS
handshake shall raise a security event ("alarm: certificate validation: algorithms not supported”).
The failure of validating the signature of received certificate during a TLS handshake shall raise
a security event ("alarm: certificate validation: certificate signature could not be validated”).
5.6.4.7 Key Exchange
Delete the following bullet point in the first paragraph of Subclause 5.6.4.7 as modified by
Amendment 1:
– Optional: Signature-operation: RSA with a key length of 1 024 Bits (legacy mode);
Delete the following text from the second bullet point in the first paragraph of Subclause 5.6.4.7
as modified by Amendment 1:
(modern mode)
Replace the existing text of the second paragraph of Subclause 5.6.4.7 as modified by
Amendment 1 with the following new text:
The support of RSA with 1 024 bit keys is deprecated. Its use is limited to backward compatibility.
RSA with 2 048 bit keys must be supported and is the preferred signature algorithm to be used.
The detection of RSA keys with 1024 Bit shall raise a security event ("warning: minimum key
length"). The detection of RSA keys with less than 1 024 Bit shall raise a security event ("alarm:
insufficient key length").
Replace the existing text of the seventh paragraph of Subclause 5.6.4.7 with the following new
text:
The support of SHA-1 is deprecated. Its use is limited to backward compatibility. SHA-256 shall
be supported and is the preferred hash algorithm to be used.

– 8 – IEC 62351-3:2014/AMD2:2020
© IEC 2020
7 Referencing standard requirements
Add the following new bullet after the first bullet point of Clause 7 as modified by Amendment
1:
– If other versions than TLS 1.2 are to be used, the referencing standard shall define the
required versions.
8 Conformance
Replace the existing text of Article 8 with the following new text:
8.1 General
Static conformance requirements specify what shall be implemented, what may be implemented
and what shall not be implemented for an implementation claiming compliance to this document.
Note that this section only refers to settings defined in Clause 5. The referencing standard will
provide further TLS related PICS statements in addition oar as specification of an optional
requirement.
8.2 Notation
The following notations are used for specifying conformance requirements:
m: Mandatory support. The item shall be implemented.
o: Optional support. The item may be, but need not be implemented.
x: Excluded. The item shall not be supported.
8.3 Conformance to selected cipher suites
Table 1 states the conformance requirements for TLS cipher suites, which are defined in
Subclause 5.1.
Table 1 – Conformance to TLS cipher suites
Client Server
Cipher suite Value/Comment
F/S Declared F/S Declared
TLS_NULL_WITH_NULL_NULL x x
TLS_RSA_WITH_NULL_MD5 x x
TLS_RSA_WITH_NULL_SHA o o SHA-1 deprecated
TLS_RSA_WITH_NULL_SHA256 o o
Note that Subclause 5.1 also allows other cipher suites for integrity only support. Moreover,
specific cipher suites considered mandatory or optional will be specified by the referencing
standard.
8.4 Conformance to selected TLS versions
Table 2 states the conformance requirements for TLS version, which are defined in Subclause
5.2.
© IEC 2020
Table 2 – Conformance to TLS versions
Client Server
TLS Version Value/Comment
F/S Declared F/S Declared
1.0 o o Weaknesses known, only for backward compatibility
1.1 o o Weaknesses known, only for backward compatibility
1.2 m m
1.3 o o Not all features specified in this document

8.5 Conformance to selected TLS protocol features
Table 3 states the conformance requirements for TLS version, which are defined in Subclauses
5.3, 5.4, and 5.6.
Table 3 – Conformance to TLS protocol features
Client Server
TLS feature Value/Comment
F/S Declared F/S Declared
TLS Session resumption at least every 24 hours m m
TLS Session resumption initiation using ClientHello m x
TLS Session resumption initiation using HelloRequest x m
TLS Session resumption using session tickets o o according to RFC
TLS Session renegotiation at least every 24 hours m m
TLS Session renegotiation initiation using ClientHello m x
TLS Session renegotiation initiation using x m
HelloRequest
TLS Session renegotiation extension m m according to RFC
Support of trusted CA extension (RFC 6066) o o

8.6 Conformance to certificate support
Table 4 states the conformance requirements for certificate support, which are defined in
Subclause 5.6 and Clause 6.
Table 4 – Conformance to certificate support
Client Server
Value/Comment
F/S Declared F/S Declared
Support of multiple CA (root certificates)  o o Referencing
standard define
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...