Security requirements for procuring smart meters (draft, version 2.5)

This document specifies security requirements that grid operators can use when procuring new smart meters. The requirements can be used directly in tender documents. They cover the technical security features that the smart meter should have, and the measures vendors should take to ensure the correct implementation of these features.

The document is an update of the Security requirements for procuring smart meters and data concentrators. The smart meter requirements have been put in a separate document. This is a draft version 2.5 published to collect feedback from grid operators and vendors.


Security requirements for procuring data concentrators (draft, version 2.5)

This document specifies security requirements that grid operators can use when procuring new data concentrators for smart metering. The requirements can be used directly in tender documents. They cover the technical security features that the data concentrator should have, and the measures vendors should take to ensure the correct implementation of these features.

The document is an update of the Security requirements for procuring smart meters and data concentrators. The data concentrator requirements have been put in a separate document. This is a draft version 2.5 published to collect feedback from grid operators and vendors.


Security architecture for smart metering (draft, version 0.2)

This document describes a security architecture for smart metering systems specifying the technical security measures grid operators can implement. The architecture can act as a blueprint for system integrators and the departments maintaining the system. The architecture is intended to be used together with an information security management system (ISMS) based on ISO 27001:2013 or similar.


Options for product certification

Whitepaper comparing different options for security certifications for products.


Security requirements for procuring EV charging stations (draft version 1.9.3)

This document specifies security requirements that charge point operators can use when procuring charging stations. The requirements can be used directly in tender documents. They cover the technical security features that the charging station should have, and the measures vendors should take to ensure the correct implementation of these features.

The document is an update of the EV Charging Systems Security Requirements from 2016. This is a draft version published to collect feedback from grid operators and vendors.

ENCS is creating this document in collaboration with ElaadNL.


Security architecture for EV charging infrastructure (draft version 0.2)

This document describes a security architecture for electric vehicle charging infrastructure specifying the technical security measures charge poin operators can implement. The architecture can act as a blueprint for system integrators and the departments maintaining the system. The architecture is intended to be used together with an information security management system (ISMS) based on ISO 27001:2013 or similar.

ENCS is creating this document in collaboration with ElaadNL.


Security requirements for procuring DA RTUs (draft, version 1.4)

This document specifies security requirements that grid operators can use when procuring new distribution automation (DA) remote terminal units (RTUs). The requirements can be used directly in tender documents. They cover the technical security features that the RTU should have, and the measures vendors should take to ensure the correct implementation of these features.

The document is an update of the Distribution Automation RTU Security Requirements from 2016. This is a draft version 1.4 published to collect feedback from grid operators and vendors.


Security architecture for DA systems (draft, version 0.2)

This document describes a security architecture for DA systems specifying the technical security measures grid operators can implement. The architecture can act as a blueprint for system integrators and the departments maintaining the system. The architecture is intended to be used together with an information security management system (ISMS) based on ISO 27001:2013 or similar.


ISMS Best Practice Guide

The objective of the member project for Information Security Management was to gather and share best practices for implementing and running an Information Security Management System (ISMS), so that ENCS members can adopt and benefit from these best practices. The output of this member project is the ISMS Best Practice Guide from ENCS which covers both ISO/IEC 27001 and ISO/IEC 27019. This zip file contains guides and templates which can help you establish your ISMS and help streamline existing systems. Unzip the files and read the documents within “0. How To Use The Best Practice Guide” to begin.


ISMS Key Findings

The objective of the member project for Information Security Management was to gather and share best practices for implementing and running an Information Security Management System (ISMS), so that ENCS members can adopt and benefit from these best practices. This word document gives the key findings from ENCS member experiences in implementing their ISMS and advice on how to avoid the pitfalls while establishing and maintaining an ISMS.