This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
• Meeting Schedule for 2009Meeting Schedule for 2009
What is an AMI Security Component?What is an AMI Security Component?
Hardware and/or Software that meet the following Hardware and/or Software that meet the following criteria: criteria: – Must cover at least one requirements (SSR) category Must cover at least one requirements (SSR) category
and at least one security domainand at least one security domain– Must enable relevant security policyMust enable relevant security policy– Must not be a policyMust not be a policy– Can be an algorithmCan be an algorithm– Cannot be a productCannot be a product– Assures business value or system functionAssures business value or system function– Must be available in the marketMust be available in the market
SSR – Component Catalog MappingSSR – Component Catalog Mapping
• Meeting Schedule for 2009Meeting Schedule for 2009
Outreach – Washington, DCOutreach – Washington, DC
• Objective:Objective: Increase awareness in Washington, DC Increase awareness in Washington, DC that the electric power industry is proactively addressing that the electric power industry is proactively addressing this important issue in a productive mannerthis important issue in a productive manner
• Inform policy-makers:Inform policy-makers:1.1. Security for AMI is importantSecurity for AMI is important
2.2. Utilities are proactively and collaboratively addressing the Utilities are proactively and collaboratively addressing the issueissue
3.3. We have produced the first round of guidance for AMI and are We have produced the first round of guidance for AMI and are working on expansion for the Smart Gridworking on expansion for the Smart Grid
Outreach – Washington, DCOutreach – Washington, DC
AgendaAgenda
• IntroductionsIntroductions• RoadmapRoadmap
– Review of commentsReview of comments– Update of Scope, CharterUpdate of Scope, Charter
• System Security RequirementsSystem Security Requirements– OverviewOverview– Detail discussionDetail discussion