Home Cart Quotation Policy About-Us
www.ChineseStandard.net
Database: 221870 (13 Apr 2026)
SEARCH
Path: Home > GB > Page176 > GBZ140-2025

GBZ140-2025 PDF English

Price & Delivery

US$554.00 · In stock · Download in 9 seconds
GBZ140-2025: Cybersecurity aspects of devices used for power metering and monitoring, power quality monitoring, data collection and analysis
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid

GBZ140: Historical versions

Std IDVersionUSDBuyDeliver [PDF] inTitle (Description)
GB/Z 140-2025English554 Add to Cart 5 days [Need to translate] Cybersecurity aspects of devices used for power metering and monitoring, power quality monitoring, data collection and analysis
GBZ 140-2002English209 Add to Cart 3 days [Need to translate] Standard for controlling exposure to cosmic radiation of air crew

Click to Preview a similar PDF

Basic data

Standard ID GB/Z 140-2025 (GB/Z140-2025)
Description (Translated English) Cybersecurity aspects of devices used for power metering and monitoring, power quality monitoring, data collection and analysis
Sector / Industry National Standard
Classification of Chinese Standard N20
Classification of International Standard 17.220.20
Word Count Estimation 27,295
Date of Issue 2025-12-03
Date of Implementation 2025-12-03
Issuing agency(ies) State Administration for Market Regulation, Standardization Administration of China

GB/Z 140-2025: Cybersecurity aspects of devices used for power metering and monitoring, power quality monitoring, data collection and analysis





---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
GB /Z 140-2025.Network security for devices used for electrical quantity measurement and monitoring, power quality monitoring, data acquisition and analysis ICS 17.220.20 CCSN20 National Standardization Guiding Technical Documents of the People's Republic of China Used for power measurement and monitoring, power quality monitoring, Network security of data acquisition and analysis devices (IEC TS63383.2022, IDT) Published on 2025-12-03 State Administration for Market Regulation The State Administration for Standardization issued a statement.

Table of contents

Preface III Introduction IV 1.Scope 1 2 Normative References 1 3.Terms, Definitions, Symbols, and Abbreviations 1 3.1 Definitions related to network security 1 3.2 Definitions related to the apparatus 4 3.3 Symbols and Abbreviations 5 4.Safety Objectives 5. 5.Cybersecurity Risk Assessment (General Methodology) 6. 5.1 Risk Assessment 6 5.2 Risk Management 7 6.Network security management requirements 8. 6.1 Overview 8 6.2 Risk Assessment Requirements 8 6.3 Response Measures Requirements 9 6.4 Test Requirements 9 6.5 Lifecycle Safety Management Requirements 9 6.6 Requirements for the Instructions for Use 9 Appendix A (Informative) Example 11 of General Risk Assessment for PMD, PQI, DGW, EDL and ESE A.1 Overview 11 A.2 General Roles 11 A.3 General System Use Case 11 A.4 General functions implemented by devices within the system 12 A.5 Universality assessment of devices within the system 13 Appendix B (Informative) Example of General Countermeasures 18 B.1 Overview 18 B.2 Recommendations for Manufacturers During the Design Phase 18 B.3 Recommendations for Manufacturers During the Manufacturing Process 18 B.4 Recommendations for manufacturers to launch devices on the market 18 B.5 Recommendations for integrators building systems within the facility 18 B.6 Debugging Recommendations 18 B.7 Recommendations for facility management personnel regarding operating systems within the facility 18 B.8 Recommendations for facility management personnel during maintenance 18 B.9 Recommendations for facility management personnel during shutdowns 19 B.10 Recommendations for facility management personnel during the disposal process 19 References 20 Figure 1.A general example of device classification in an organizational environment. (6) Figure 2.Coordinate plot of acceptable and unacceptable risks. Figure 3 shows the five stages required. Figure 4.Example of device access 9 Figure A.1 Example 12 of a general system use case Figure A.2 Example of data processing within DGW, EDL, and ESE 13 Figure A.3 Example 17 of device assets and their interfaces Table 1.Example of a simple 3×3 risk matrix 7 Table A.1 Example 11 of General Roles Table A.2 Types of data measured by PMD and PQI 12 Table A.3 Events Requiring Attention for General-Purpose Devices (Potential Safety Issues) 14 Table A.4 Definitions of Events (Safety Issues) Requiring Attention from General Devices 15 Table A.5 General Examples of Device Access 17

Foreword

This document is a standard or guiding technical document. This document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents". Drafting. This document is equivalent to IEC TS63383.2022 "Equipment for electrical quantity measurement and monitoring, power quality monitoring, data acquisition and analysis". The document type of "Network Security" has been changed from an IEC technical specification to a national guiding technical document of my country. The following minimal editorial changes have been made to this document. ---The header of Table A.4 has been corrected and is now consistent with the main text description; ---To comply with the drafting regulations of Chinese standards, the symbols in Table A.5 have been corrected, and a note has been added to explain the meaning of the symbols. Please note that some content in this document may involve patents. The issuing organization of this document assumes no responsibility for identifying patents. This document was proposed by the China Machinery Industry Federation. This document is under the jurisdiction of the National Technical Committee on Standardization of Electrical Instruments and Meters (SAC/TC104). This document was drafted by. Harbin Electrical Instrument Research Institute Co., Ltd., Guangxi Power Grid Co., Ltd., and Shenzhen Kelun Electronics Technology Co., Ltd. Joint-stock limited companies, Shenzhen Youxunda Technology Co., Ltd., Wuxi Hengtong Electric Co., Ltd., and Zhejiang Greet Electric Co., Ltd. Company, Zhejiang Hengye Electronics Co., Ltd., State Grid Shandong Electric Power Company Marketing Service Center (Metering Center), Guangdong Power Grid Co., Ltd. Guangzhou Power Supply Bureau, State Grid Chongqing Electric Power Company Marketing Service Center, Huali Technology Co., Ltd., and Guangdong Power Grid Co., Ltd. Measurement Center, Heilongjiang Provincial Engineering Technology Research Center for Electrical Instruments and Meters Co., Ltd., Delixi Group Instruments and Meters Co., Ltd., Shenzhen Si Da Instrument Co., Ltd., Marketing and Service Center of State Grid Zhejiang Electric Power Co., Ltd., Zhejiang Tianzheng Electric Co., Ltd., Shandong Electric Power Equipment Co., Ltd. Group New Energy Technology Co., Ltd., State Grid Zhejiang Electric Power Co., Ltd., Guangdong Power Grid Energy Investment Co., Ltd., Inner Mongolia Power (Group) Co., Ltd. Limited Liability Company, Anter Instrument Group Co., Ltd., Beijing State Grid Electric Power Technology Co., Ltd., Jiangsu Suyuan Jereh Technology Co., Ltd. Qingdao Tuowei Technology Co., Ltd., China Enterprise Science and Technology Information Co., Ltd., Ningbo Canaan Intelligent Electric Co., Ltd., Beijing Yubang Electric Power Technology Co., Ltd., Xi'an University of Technology, Beijing Tenghe Smart Energy Technology Co., Ltd., Shanghai Belling Co., Ltd., Yunnan Electric Power Network Co., Ltd., Wuhan Zhongyuan Electronic Information Co., Ltd., Zhejiang Hengtong Electric Control Equipment Co., Ltd., Shandong Shenghe Electric Engineering Design Co., Ltd. Limited Liability Company, Hubei Huazhong Electric Power Technology Development Co., Ltd., Henan Xuji Instrument Co., Ltd., Dongfang Electric (Chengdu) Innovation Research Co., Ltd. The company, China Southern Power Grid Co., Ltd. Ultra-High Voltage Transmission Company, Wasion Information Technology Co., Ltd., and Qingdao Qiancheng Technology Co., Ltd. Limited Liability Company, Zhejiang Kangge Electric Co., Ltd., Yangzhou Wantai Electronic Technology Co., Ltd., Leixi Intelligent Technology (Shanghai) Co., Ltd., Shenzhen Chao Yanghui Technology Co., Ltd., China Electric Equipment Shandong Electronics Co., Ltd., Huaihua Jiannan Machinery Factory Co., Ltd., Shengli Oilfield Bangyuan Electric Co., Ltd. Ren Company, Datang Northeast Electric Power Test and Research Institute Co., Ltd., Galaxy Power Group Co., Ltd., and Dongfang Bowo (Beijing) Technology Co., Ltd. Company, Zhuhai Ganxing Automation Equipment Co., Ltd., Zhejiang Chentai Technology Co., Ltd., Hunan Zhikun Energy Technology Co., Ltd., Hangzhou Xili Intelligent Technology Co., Ltd., Nanjing Electric Power Design Institute Co., Ltd., and Jiangsu Dayan Energy Technology Co., Ltd. The main drafters of this document are. Yang Zhou, Zhou Zhenglei, Huang Shihui, Guo Xiaoguang, Wu Bin, Peng Yong, Hu Meng, Guo Hongxia, Zhao Ying, Cheng Yingying, and Jiang Bin. Fan Xingyuan, Zeng Shitu, Zhang Yongwang, Wang Huiwu, Ding Zhengguang, Lu Tao, Yu Lei, Wang Peng, Zeng Yan, Liu Shouchao, Yang Yang, Li Kun, Li Chen, Wang Weifeng Zhang Chuang, Zhang Zongji, Jiang Weiping, Wang Mingyue, Cai Yantong, Qiu Dequan, Jia Huaping, Li Ning, Zhuang Yiming, Wang Ning, Zhao Hongjun, Zhou Ziguan, Diao Ruipeng Zhao Cong, Shen Xin, Wei Xin, Jiang Lianggang, Li Hongquan, Cai Licong, Zhang Tao, Liu Yan, Huang Wenjie, Lin Xiangyang, Wu Guoqiang, Chen Chang, Tian Jun, Huang Haibo Long Tao, He Zhaohui, Li Bohao, Guo Yafei, Yan Ke, Sun Jianrui, Yang Wei, Ma Wei, Qin Ling, Yang Zhimeng, Shen Haihong, Sun Guangfu, Wang Baotong, Qian Yanjun Yan Qiaona and Liu Zongquan.

Introduction

This document is a common cybersecurity document cited in other SAC/TC104 publications, and includes information related to low-voltage applications. General information on network security measurement devices and related systems. With measuring devices (such as electrical quantity measuring and monitoring devices as defined in IEC 61557-12), power quality instruments (as defined in IEC 62586-1) The use of data acquisition, collection, and analysis devices (such as gateways and energy servers as defined in IEC 62974-1) is increasing, and the network... Network security risks are also increasing, especially with the growing use of interconnected devices in electrical installations. Therefore, facility managers limit risk by maintaining an acceptable level of information regarding facility and environmental strategies. To maintain maximum innovation... When designing devices, it is best to base them on risk assessment methods to ensure that they can withstand cybersecurity threats throughout their entire lifecycle. Used for power measurement and monitoring, power quality monitoring, Network security of data acquisition and analysis devices

1 Scope

This document pertains to measuring devices intended for installation in restricted areas (PMDs conforming to IEC 61557-12 and those conforming to IEC 62586-1). Network security related to the required PQI and data acquisition devices (devices conforming to IEC 62974-1). This document covers cybersecurity aspects of devices used for power measurement and monitoring, power quality monitoring, and data acquisition (e.g., installation of...). (Enhancing or restoring devices), but does not include the organization's cybersecurity requirements (such as end-user security policies). Note. An organization's cybersecurity is critical to the reliable operation of its devices. This document aims to raise awareness among manufacturers and other stakeholders regarding cybersecurity and to provide protection against security threats and vulnerabilities. To reasonably reduce safety risks, basic guidance is provided. ---This document is consistent with the device/system approach described in relevant standards such as IEC 62443 (all parts) and ISO /IEC 27001. Consistent; ---This document is based on general system use cases. This document does not apply to instruments used for trade settlement covered by the IEC 62053-2X series of standards.

2 Normative references

This document has no normative references. 3.Terms, definitions, symbols and abbreviations The following terms and definitions apply to this document. The URLs for the terminology databases maintained by ISO and IEC for standardization are as follows. 3.1 Definitions related to network security 3.1.1 assets An entity to which the component owner assigns value. [Source. GB/T 18336.1-2015, 3.1.2, with modifications] 3.1.2 attack attack Attempts to damage, disclose, tamper with, disable, steal, or access or use assets without authorization. [Source. GB/T 29246-2023, 3.2] 3.1.3 attack vector An attacker accesses a device to generate attack paths or methods.
...

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GBZ140-2025_English be delivered?


Answer: Upon your order, we will start to translate GBZ140-2025_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GBZ140-2025_English with my colleagues?


Answer: Yes. The purchased PDF of GBZ140-2025_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version GBZ140-2025?


Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GBZ140-2025 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
Refund Policy Privacy Policy Terms of Service