2 Reference documents
The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
Part 1: OPC UA Specification: Part 2 – Seurity Model http://www.opcfoundation.org/UA/Part1/ Part 4: OPC UA Specification: Part 4 – Services http://www.opcfoundation.org/UA/Part4/ Part 5: OPC UA Specification: Part 5 – Information Model http://www.opcfoundation.org/UA/Part5/ Part 6: OPC UA Specification: Part 6 – Mappings http://www.opcfoundation.org/UA/Part6/ Part 7: OPC UA Specification: Part 7 – Profiles http://www.opcfoundation.org/UA/Part7/ Part 12: OPC UA Specification: Part 12 – Discovery http://www.opcfoundation.org/UA/Part12/ SOAP Part 1: SOAP Version 1.2 Part 1: Messaging Framework http://www.w3.org/TR/soap12-part1/ SOAP Part 2: SOAP Version 1.2 Part 2: Adjuncts http://www.w3.org/TR/soap12-part2/ XML Encryption: XML Encryption Syntax and Processing http://www.w3.org/TR/xmlenc-core/ XML Signature: XML-Signature Syntax and Processing http://www.w3.org/TR/xmldsig-core/ WS Security: SOAP Message Security 1.1 <http://www.oasis-open.org/committees/download.php/16790/wss-v1.1-spec-os- SOAPMessageSecurity.pdf> WS Addressing: Web Services Addressing (WS-Addressing) http://www.w3.org/Submission/ws-addressing/ WS Trust: Web Services Trust Language (WS-Trust) http://specs.xmlsoap.org/ws/2005/02/trust/WS-Trust.pdf WS Secure Conversation: Web Services Secure Conversation Language (WS-SecureConversation) http://specs.xmlsoap.org/ws/2005/02/sc/WS-SecureConversation.pdf SSL/TLS: RFC 2246: The TLS Protocol Version 1.0 http://www.ietf.org/rfc/rfc2246.txt X509: X.509 Public Key Certificate Infrastructurehttp://www.itu.int/rec/T-REC-X.509-200003-I/e HTTP: RFC 2616: Hypertext Transfer Protocol - HTTP/1.1 http://www.ietf.org/rfc/rfc2616.txt HTTPS: RFC 2818: HTTP Over TLS http://www.ietf.org/rfc/rfc2818.txt IS Glossary: Internet Security Glossary http://www.ietf.org/rfc/rfc2828.txt NIST 800-12: Introduction to Computer Security http://csrc.nist.gov/publications/nistpubs/800-12/ NIST 800-57: Part 3: Application-Specific Key Management Guidance http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_PART3_key- management_Dec2009.pdf NERC CIP: CIP 002-1 through CIP 009-1, by North-American Electric Reliability Council http://www.nerc.com/page.php?cid=2|20 IEC 62351: Data and Communications Security http://www.iec.ch/heb/d_mdoc-e050507.htm SPP-ICS: System Protection Profile – Industrial Control System, by Process Control Security Requirements Forum (PCSRF) http://www.isd.mel.nist.gov/projects/processcontrol/SPP-ICSv1.0.pdf SHA-1: Secure Hash Algorithm RFC http://tools.ietf.org/html/rfc3174 PKI: Public Key Infrastructure article in Wikipedia http://en.wikipedia.org/wiki/Public_key_infrastructure X509 PKI: Internet X.509 Public Key Infrastructure http://www.ietf.org/rfc/rfc3280.txt RFC 5958: Asymmetric Key Packages http://tools.ietf.org/search/rfc5208 PKCS #10: Certification Request Syntax Specification http://tools.ietf.org/html/rfc2986