25.12.2012 Views

Security Profile for Advanced Metering Infrastructure - Open Smart ...

Security Profile for Advanced Metering Infrastructure - Open Smart ...

Security Profile for Advanced Metering Infrastructure - Open Smart ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 1 shows one of the scenarios as an example. From diagrams of this kind, we extracted<br />

• Components: each swim lane depicts a different entity involved in the business flow<br />

captured in the scenario's activity diagram. Some components represent system<br />

components, while others represent human actors. For our purposes, we restricted our<br />

attention to system components. Additionally, some components were deemed outside<br />

the scope of the AMI profile.<br />

• Communication: arrows between nodes often represent some communication of<br />

in<strong>for</strong>mation or control signals between components. Other times, arrows simply represent<br />

the sequence of activities. Some interpretation was necessary. The key in<strong>for</strong>mation<br />

extracted at this point was the nature of in<strong>for</strong>mation and control exchanged between<br />

components.<br />

Some inconsistencies and oversights were encountered in analyzing the use cases and scenarios.<br />

For example, in scenario 9 of use case B1, a meter is shown communicating with the MDMS<br />

without going through a Head End. This was inconsistent with many other scenarios, and<br />

assumed to be an oversight. Such corrections were made in several places to arrive at a<br />

consistent logical architecture.<br />

4.2 Logical architecture<br />

A logical architectural view depicts logical components and their interactions. By logical<br />

components, we refer to conceptual elements defined by common functionality. A logical<br />

architectural view does not attempt to capture deployment in<strong>for</strong>mation, such as allocation of<br />

functionality to hosts or network segments. Nor does it attempt to capture all terminology and<br />

physical configurations represented by different products.<br />

The logical architectural components have only the meaning defined in this document,<br />

regardless of how some other party may define the same terms.<br />

As such, any product implementing the function of a logical component, shall satisfy all security<br />

requirements identified in Section 5 that apply to that component—regardless of whether the<br />

product uses that component's name or whether it implements the functions of multiple<br />

components. Products that implement the functions of multiple components shall satisfy all<br />

security requirements of each component whose functions it implements.<br />

<strong>Security</strong> <strong>Profile</strong> <strong>for</strong> <strong>Advanced</strong> <strong>Metering</strong> <strong>Infrastructure</strong> Version 1.0<br />

UtiliSec Working Group (UCAIug) December 10, 2009<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!