The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
OPC 10000-1, OPC UA Specification: Part 1 – Overview and Concepts
https://www.opcfoundation.org/UA/Part1/
OPC 10000-3, OPC UA Specification: Part 3 – Address Space Model
https://www.opcfoundation.org/UA/Part3/
OPC 10000-4, OPC UA Specification: Part 4 – Services
https://www.opcfoundation.org/UA/Part4/
OPC 10000-5, OPC UA Specification: Part 5 – Information Model
https://www.opcfoundation.org/UA/Part5/
OPC 10000-6, OPC UA Specification: Part 6 – Mappings
https://www.opcfoundation.org/UA/Part6/
OPC 10000-7, OPC UA Specification: Part 7 – Profiles
https://www.opcfoundation.org/UA/Part7/
OPC 10000-12, OPC UA Specification: Part 12 – Discovery
https://www.opcfoundation.org/UA/Part12/
OPC 10000-14, OPC UA Specification: Part 14 – PubSub
https://www.opcfoundation.org/UA/Part14/
OPC 10000-18, OPC UA Specification: Part 18: Role-Based Security
https://www.opcfoundation.org/UA/Part18/
OPC 10000-21, OPC UA Specification: Part 21: Device Onboarding
https://www.opcfoundation.org/UA/Part21/OPC 10000-100, OPC UA Specification: Part 100 – Devices
https://www.opcfoundation.org/UA/Part100/
OPC Security Policies
https://profiles.opcfoundation.org/profilefolder/474
ISA/IEC 62443: Security for industrial automation and control systems
https://webstore.iec.ch/publication/33615
https://www.isa.org/products/ansi-isa-62443-4-2-2018-security-for-industrial-au
TLS: RFC 2246: The TLS Protocol Version 1.0
https://tools.ietf.org/html/rfc2246
X509: X.509 Public Key Certificate Infrastructure
https://tools.ietf.org/html/rfc2459
HTTP: RFC 2616: Hypertext Transfer Protocol - HTTP/1.1
https://tools.ietf.org/html/rfc2616
HTTPS: RFC 2818: HTTP Over TLS
https://tools.ietf.org/html/rfc2818
IS Glossary: Internet Security Glossary
https://tools.ietf.org/html/rfc2828https://tools.ietf.org/html/rfc2828
NIST 800-12: Introduction to Computer Security
https://csrc.nist.gov/publications/nistpubs/800-12/
NIST 800-57: Part 3: Application-Specific Key Management Guidance
https://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_PART3_key-management_Dec2009.pdf
NERC CIP: CIP 002-1 through CIP 009-1, by North-American Electric Reliability Council
https://www.nerc.com/pa/Stand/Cyber%20Security%20Permanent/Cyber_Security_FAQ.pdf
SPP-ICS: Guide to Industrial Control Systems (ICS) Security
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf
SHA-1: Secure Hash Algorithm RFC
https://tools.ietf.org/html/rfc3174
PKI: Public Key Infrastructure
X509 PKI: Internet X.509 Public Key Infrastructure
https://tools.ietf.org/html/rfc3280
"https://tools.ietf.org/html/rfc3280
RFC 5958: Asymmetric Key Packages
https://www.rfc-editor.org/info/rfc5958
PKCS #10: Certification Request Syntax Specification
https://tools.ietf.org/html/rfc2986https://tools.ietf.org/html/rfc2986
OAuth2: The OAuth 2.0 Authorization Framework
https://tools.ietf.org/html/rfc6749https://tools.ietf.org/html/rfc6749
JWT: JSON Web Token (JWT)
https://tools.ietf.org/html/rfc7519https://tools.ietf.org/html/rfc7519
OpenID: OpenID Connect Discovery 1.0
https://openid.net/specs/openid-connect-discovery-1_0.html
ZeroTrustArchitecture: NIST Special Publication 800-207
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf
ZeroTrustCore: Zero Trust Core Principles
https://pubs.opengroup.org/security/zero-trust-principles/
IEC62351: Cyber security: understanding IEC 62351
https://www.iec.ch/blog/cyber-security-understanding-iec-62351