The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.

OPC 10000-1, OPC UA Specification: Part 1 – Overview and Concepts

DOCPROPERTY Part1URL \* MERGEFORMAT https://www.opcfoundation.org/UA/Part1/

OPC 10000-3, OPC UA Specification: Part 3 – Address Space Model

DOCPROPERTY Part3URL \* MERGEFORMAT https://www.opcfoundation.org/UA/Part3/

OPC 10000-4, OPC UA Specification: Part 4 – Services

https://www.opcfoundation.org/UA/Part4/

OPC 10000-5, OPC UA Specification: Part 5 – Information Model

DOCPROPERTY Part5URL \* MERGEFORMAT https://www.opcfoundation.org/UA/Part5/

OPC 10000-6, OPC UA Specification: Part 6 – Mappings

DOCPROPERTY Part6URL \* MERGEFORMAT https://www.opcfoundation.org/UA/Part6/

OPC 10000-7, OPC UA Specification: Part 7 – Profiles

DOCPROPERTY Part7URL \* MERGEFORMAT https://www.opcfoundation.org/UA/Part7/

OPC 10000-12, OPC UA Specification: Part 12 – Discovery

DOCPROPERTY Part12URL \* MERGEFORMAT https://www.opcfoundation.org/UA/Part12/

OPC 10000-14, OPC UA Specification: Part 14 – PubSub

DOCPROPERTY Part14URL \* MERGEFORMAT https://www.opcfoundation.org/UA/Part14/

OPC 10000-18, OPC UA Specification: Part 18: Role-Based Security

DOCPROPERTY Part18URL \* MERGEFORMAT https://www.opcfoundation.org/UA/Part18/

OPC 10000-21, OPC UA Specification: Part 21: Device Onboarding

https://www.opcfoundation.org/UA/Part21/

OPC 10000-100, OPC UA Specification: Part 100 – Devices

https://www.opcfoundation.org/UA/Part100/

OPC Security Policies - SecurityPolicy ClientServer

https://profiles.opcfoundation.org/profilefolder/474

OPC Profiles – OPC UA Profiles and Facets

https://profiles.opcfoundation.org/

ISA/IEC 62443-4-2: Security for industrial automation and control systems

https://webstore.iec.ch/publication/33615

https://www.isa.org/products/ansi-isa-62443-4-2-2018-security-for-industrial-au

IEC 62351: Power systems management and associated information exchange - Data and communications security

https://webstore.iec.ch/en/publication/6912

TLS: RFC 2246: The TLS Protocol Version 1.0

https://tools.ietf.org/html/rfc2246

TLS 1.2: RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2

https://tools.ietf.org/html/rfc5246

X509: ISO/IEC 9594-8 (ITU-T Rec. X.509), Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks

https://www.itu.int/rec/T-REC-X.509

HTTPS: RFC 9110: HTTP Semantics

https://tools.ietf.org/html/rfc9110

IS Glossary: Internet Security Glossary Version 2

https://tools.ietf.org/html/rfc4949https://tools.ietf.org/html/rfc4949

NIST 800-12: Introduction to Computer Security

https://csrc.nist.gov/publications/nistpubs/800-12/

NIST 800-57: Part 3: Application-Specific Key Management Guidance

https://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_PART3_key-management_Dec2009.pdf

NERC CIP: CIP 002-1 through CIP 009-1, by North-American Electric Reliability Council

https://www.nerc.com/pa/Stand/Cyber%20Security%20Permanent/Cyber_Security_FAQ.pdf

SPP-ICS: Guide to Operational Technology (OT) Security

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf

SHA: US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)

https://tools.ietf.org/html/rfc6234

PKI: Design and build a privately hosted Public Key Infrastructure

https://www.ncsc.gov.uk/collection/in-house-public-key-infrastructure/introduction-to-public-key-infrastructure/components-of-a-pki

X509 PKI: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile

https://tools.ietf.org/html/rfc5280

"https://tools.ietf.org/html/rfc5280

RFC 5958: Asymmetric Key Packages

https://tools.ietf.org/html/rfc5958

PKCS #10: Certification Request Syntax Specification

https://tools.ietf.org/html/rfc2986https://tools.ietf.org/html/rfc2986

OAuth2: The OAuth 2.0 Authorization Framework

https://tools.ietf.org/html/rfc6749https://tools.ietf.org/html/rfc6749

JWT: JSON Web Token (JWT)

https://tools.ietf.org/html/rfc7519https://tools.ietf.org/html/rfc7519

OpenID: OpenID Connect Discovery 1.0

https://openid.net/specs/openid-connect-discovery-1_0.html

ZeroTrustArchitecture: NIST Special Publication 800-207

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf

ZeroTrustCore: Zero Trust Core Principles

https://pubs.opengroup.org/security/zero-trust-principles/