2 Normative References

The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.

OPC 10000-1, OPC UA Specification: Part 1 – Overview and Concepts
OPC 10000-3, OPC UA Specification: Part 3 – Address Space Model
OPC 10000-4, OPC UA Specification: Part 4 – Services
OPC 10000-5, OPC UA Specification: Part 5 – Information Model
OPC 10000-6, OPC UA Specification: Part 6 – Mappings
OPC 10000-7, OPC UA Specification: Part 7 – Profiles
OPC 10000-12, OPC UA Specification: Part 12 – Discovery
OPC 10000-14, OPC UA Specification: Part 14 – PubSub
OPC 10000-18, OPC UA Specification: Part 18: Role-Based Security
OPC 10000-21, OPC UA Specification: Part 21: Device Onboarding
OPC 10000-100, OPC UA Specification: Part 100 – Devices
OPC Security Policies - SecurityPolicy ClientServer
OPC Profiles – OPC UA Profiles and Facets
IEC 62351: Power systems management and associated information exchange - Data and communications security
TLS: RFC 2246: The TLS Protocol Version 1.0
TLS 1.2: RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2
X509: ISO/IEC 9594-8 (ITU-T Rec. X.509), Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks
HTTPS: RFC 9110: HTTP Semantics
IS Glossary: Internet Security Glossary Version 2
NIST 800-12: Introduction to Computer Security
NIST 800-57: Part 3: Application-Specific Key Management Guidance
NERC CIP: CIP 002-1 through CIP 009-1, by North-American Electric Reliability Council
SHA: US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)
PKI: Design and build a privately hosted Public Key Infrastructure
X509 PKI: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
RFC 5958: Asymmetric Key Packages
PKCS #10: Certification Request Syntax Specification
ZeroTrustArchitecture: NIST Special Publication 800-207
ZeroTrustCore: Zero Trust Core Principles