Path:
Home >
GB >
Page176 > GBZ140-2025
Price & Delivery
US$554.00 · In stock · Download in 9 secondsGBZ140-2025: Cybersecurity aspects of devices used for power metering and monitoring, power quality monitoring, data collection and analysis
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
GBZ140: Historical versions
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GB/Z 140-2025 | English | 554 |
Add to Cart
|
5 days [Need to translate]
|
Cybersecurity aspects of devices used for power metering and monitoring, power quality monitoring, data collection and analysis
|
| GBZ 140-2002 | English | 209 |
Add to Cart
|
3 days [Need to translate]
|
Standard for controlling exposure to cosmic radiation of air crew
|
Click to Preview a similar PDF
Basic data
| Standard ID | GB/Z 140-2025 (GB/Z140-2025) |
| Description (Translated English) | Cybersecurity aspects of devices used for power metering and monitoring, power quality monitoring, data collection and analysis |
| Sector / Industry | National Standard |
| Classification of Chinese Standard | N20 |
| Classification of International Standard | 17.220.20 |
| Word Count Estimation | 27,295 |
| Date of Issue | 2025-12-03 |
| Date of Implementation | 2025-12-03 |
| Issuing agency(ies) | State Administration for Market Regulation, Standardization Administration of China |
GB/Z 140-2025: Cybersecurity aspects of devices used for power metering and monitoring, power quality monitoring, data collection and analysis
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
GB /Z 140-2025.Network security for devices used for electrical quantity measurement and monitoring, power quality monitoring, data acquisition and analysis
ICS 17.220.20
CCSN20
National Standardization Guiding Technical Documents of the People's Republic of China
Used for power measurement and monitoring, power quality monitoring,
Network security of data acquisition and analysis devices
(IEC TS63383.2022, IDT)
Published on 2025-12-03
State Administration for Market Regulation
The State Administration for Standardization issued a statement.
Table of contents
Preface III
Introduction IV
1.Scope 1
2 Normative References 1
3.Terms, Definitions, Symbols, and Abbreviations 1
3.1 Definitions related to network security 1
3.2 Definitions related to the apparatus 4
3.3 Symbols and Abbreviations 5
4.Safety Objectives 5.
5.Cybersecurity Risk Assessment (General Methodology) 6.
5.1 Risk Assessment 6
5.2 Risk Management 7
6.Network security management requirements 8.
6.1 Overview 8
6.2 Risk Assessment Requirements 8
6.3 Response Measures Requirements 9
6.4 Test Requirements 9
6.5 Lifecycle Safety Management Requirements 9
6.6 Requirements for the Instructions for Use 9
Appendix A (Informative) Example 11 of General Risk Assessment for PMD, PQI, DGW, EDL and ESE
A.1 Overview 11
A.2 General Roles 11
A.3 General System Use Case 11
A.4 General functions implemented by devices within the system 12
A.5 Universality assessment of devices within the system 13
Appendix B (Informative) Example of General Countermeasures 18
B.1 Overview 18
B.2 Recommendations for Manufacturers During the Design Phase 18
B.3 Recommendations for Manufacturers During the Manufacturing Process 18
B.4 Recommendations for manufacturers to launch devices on the market 18
B.5 Recommendations for integrators building systems within the facility 18
B.6 Debugging Recommendations 18
B.7 Recommendations for facility management personnel regarding operating systems within the facility 18
B.8 Recommendations for facility management personnel during maintenance 18
B.9 Recommendations for facility management personnel during shutdowns 19
B.10 Recommendations for facility management personnel during the disposal process 19
References 20
Figure 1.A general example of device classification in an organizational environment. (6)
Figure 2.Coordinate plot of acceptable and unacceptable risks.
Figure 3 shows the five stages required.
Figure 4.Example of device access 9
Figure A.1 Example 12 of a general system use case
Figure A.2 Example of data processing within DGW, EDL, and ESE 13
Figure A.3 Example 17 of device assets and their interfaces
Table 1.Example of a simple 3×3 risk matrix 7
Table A.1 Example 11 of General Roles
Table A.2 Types of data measured by PMD and PQI 12
Table A.3 Events Requiring Attention for General-Purpose Devices (Potential Safety Issues) 14
Table A.4 Definitions of Events (Safety Issues) Requiring Attention from General Devices 15
Table A.5 General Examples of Device Access 17
Foreword
This document is a standard or guiding technical document.
This document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents".
Drafting.
This document is equivalent to IEC TS63383.2022 "Equipment for electrical quantity measurement and monitoring, power quality monitoring, data acquisition and analysis".
The document type of "Network Security" has been changed from an IEC technical specification to a national guiding technical document of my country.
The following minimal editorial changes have been made to this document.
---The header of Table A.4 has been corrected and is now consistent with the main text description;
---To comply with the drafting regulations of Chinese standards, the symbols in Table A.5 have been corrected, and a note has been added to explain the meaning of the symbols.
Please note that some content in this document may involve patents. The issuing organization of this document assumes no responsibility for identifying patents.
This document was proposed by the China Machinery Industry Federation.
This document is under the jurisdiction of the National Technical Committee on Standardization of Electrical Instruments and Meters (SAC/TC104).
This document was drafted by. Harbin Electrical Instrument Research Institute Co., Ltd., Guangxi Power Grid Co., Ltd., and Shenzhen Kelun Electronics Technology Co., Ltd.
Joint-stock limited companies, Shenzhen Youxunda Technology Co., Ltd., Wuxi Hengtong Electric Co., Ltd., and Zhejiang Greet Electric Co., Ltd.
Company, Zhejiang Hengye Electronics Co., Ltd., State Grid Shandong Electric Power Company Marketing Service Center (Metering Center), Guangdong Power Grid Co., Ltd.
Guangzhou Power Supply Bureau, State Grid Chongqing Electric Power Company Marketing Service Center, Huali Technology Co., Ltd., and Guangdong Power Grid Co., Ltd.
Measurement Center, Heilongjiang Provincial Engineering Technology Research Center for Electrical Instruments and Meters Co., Ltd., Delixi Group Instruments and Meters Co., Ltd., Shenzhen Si
Da Instrument Co., Ltd., Marketing and Service Center of State Grid Zhejiang Electric Power Co., Ltd., Zhejiang Tianzheng Electric Co., Ltd., Shandong Electric Power Equipment Co., Ltd.
Group New Energy Technology Co., Ltd., State Grid Zhejiang Electric Power Co., Ltd., Guangdong Power Grid Energy Investment Co., Ltd., Inner Mongolia Power (Group) Co., Ltd.
Limited Liability Company, Anter Instrument Group Co., Ltd., Beijing State Grid Electric Power Technology Co., Ltd., Jiangsu Suyuan Jereh Technology Co., Ltd.
Qingdao Tuowei Technology Co., Ltd., China Enterprise Science and Technology Information Co., Ltd., Ningbo Canaan Intelligent Electric Co., Ltd., Beijing Yubang Electric Power
Technology Co., Ltd., Xi'an University of Technology, Beijing Tenghe Smart Energy Technology Co., Ltd., Shanghai Belling Co., Ltd., Yunnan Electric Power
Network Co., Ltd., Wuhan Zhongyuan Electronic Information Co., Ltd., Zhejiang Hengtong Electric Control Equipment Co., Ltd., Shandong Shenghe Electric Engineering Design Co., Ltd.
Limited Liability Company, Hubei Huazhong Electric Power Technology Development Co., Ltd., Henan Xuji Instrument Co., Ltd., Dongfang Electric (Chengdu) Innovation Research Co., Ltd.
The company, China Southern Power Grid Co., Ltd. Ultra-High Voltage Transmission Company, Wasion Information Technology Co., Ltd., and Qingdao Qiancheng Technology Co., Ltd.
Limited Liability Company, Zhejiang Kangge Electric Co., Ltd., Yangzhou Wantai Electronic Technology Co., Ltd., Leixi Intelligent Technology (Shanghai) Co., Ltd., Shenzhen Chao
Yanghui Technology Co., Ltd., China Electric Equipment Shandong Electronics Co., Ltd., Huaihua Jiannan Machinery Factory Co., Ltd., Shengli Oilfield Bangyuan Electric Co., Ltd.
Ren Company, Datang Northeast Electric Power Test and Research Institute Co., Ltd., Galaxy Power Group Co., Ltd., and Dongfang Bowo (Beijing) Technology Co., Ltd.
Company, Zhuhai Ganxing Automation Equipment Co., Ltd., Zhejiang Chentai Technology Co., Ltd., Hunan Zhikun Energy Technology Co., Ltd., Hangzhou Xili
Intelligent Technology Co., Ltd., Nanjing Electric Power Design Institute Co., Ltd., and Jiangsu Dayan Energy Technology Co., Ltd.
The main drafters of this document are. Yang Zhou, Zhou Zhenglei, Huang Shihui, Guo Xiaoguang, Wu Bin, Peng Yong, Hu Meng, Guo Hongxia, Zhao Ying, Cheng Yingying, and Jiang Bin.
Fan Xingyuan, Zeng Shitu, Zhang Yongwang, Wang Huiwu, Ding Zhengguang, Lu Tao, Yu Lei, Wang Peng, Zeng Yan, Liu Shouchao, Yang Yang, Li Kun, Li Chen, Wang Weifeng
Zhang Chuang, Zhang Zongji, Jiang Weiping, Wang Mingyue, Cai Yantong, Qiu Dequan, Jia Huaping, Li Ning, Zhuang Yiming, Wang Ning, Zhao Hongjun, Zhou Ziguan, Diao Ruipeng
Zhao Cong, Shen Xin, Wei Xin, Jiang Lianggang, Li Hongquan, Cai Licong, Zhang Tao, Liu Yan, Huang Wenjie, Lin Xiangyang, Wu Guoqiang, Chen Chang, Tian Jun, Huang Haibo
Long Tao, He Zhaohui, Li Bohao, Guo Yafei, Yan Ke, Sun Jianrui, Yang Wei, Ma Wei, Qin Ling, Yang Zhimeng, Shen Haihong, Sun Guangfu, Wang Baotong, Qian Yanjun
Yan Qiaona and Liu Zongquan.
Introduction
This document is a common cybersecurity document cited in other SAC/TC104 publications, and includes information related to low-voltage applications.
General information on network security measurement devices and related systems.
With measuring devices (such as electrical quantity measuring and monitoring devices as defined in IEC 61557-12), power quality instruments (as defined in IEC 62586-1)
The use of data acquisition, collection, and analysis devices (such as gateways and energy servers as defined in IEC 62974-1) is increasing, and the network...
Network security risks are also increasing, especially with the growing use of interconnected devices in electrical installations.
Therefore, facility managers limit risk by maintaining an acceptable level of information regarding facility and environmental strategies. To maintain maximum innovation...
When designing devices, it is best to base them on risk assessment methods to ensure that they can withstand cybersecurity threats throughout their entire lifecycle.
Used for power measurement and monitoring, power quality monitoring,
Network security of data acquisition and analysis devices
1 Scope
This document pertains to measuring devices intended for installation in restricted areas (PMDs conforming to IEC 61557-12 and those conforming to IEC 62586-1).
Network security related to the required PQI and data acquisition devices (devices conforming to IEC 62974-1).
This document covers cybersecurity aspects of devices used for power measurement and monitoring, power quality monitoring, and data acquisition (e.g., installation of...).
(Enhancing or restoring devices), but does not include the organization's cybersecurity requirements (such as end-user security policies).
Note. An organization's cybersecurity is critical to the reliable operation of its devices.
This document aims to raise awareness among manufacturers and other stakeholders regarding cybersecurity and to provide protection against security threats and vulnerabilities.
To reasonably reduce safety risks, basic guidance is provided.
---This document is consistent with the device/system approach described in relevant standards such as IEC 62443 (all parts) and ISO /IEC 27001.
Consistent;
---This document is based on general system use cases.
This document does not apply to instruments used for trade settlement covered by the IEC 62053-2X series of standards.
2 Normative references
This document has no normative references.
3.Terms, definitions, symbols and abbreviations
The following terms and definitions apply to this document.
The URLs for the terminology databases maintained by ISO and IEC for standardization are as follows.
3.1 Definitions related to network security
3.1.1
assets
An entity to which the component owner assigns value.
[Source. GB/T 18336.1-2015, 3.1.2, with modifications]
3.1.2
attack attack
Attempts to damage, disclose, tamper with, disable, steal, or access or use assets without authorization.
[Source. GB/T 29246-2023, 3.2]
3.1.3
attack vector
An attacker accesses a device to generate attack paths or methods.
...