BSI 13/30283023 DC:2013 Edition
$13.70
BS EN 62541-2. OPC Unified Architecture Specification. Security Model
Published By | Publication Date | Number of Pages |
BSI | 2013 | 43 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
12 | 1 Scope 2 Reference documents |
14 | 3 Terms, definitions, and abbreviations 3.1 Terms and definitions |
18 | 3.2 Abbreviations 3.3 Conventions 3.3.1 Conventions for security model figures |
19 | 4 OPC UA Security architecture 4.1 OPC UA Security Environment |
20 | 4.2 Security Objectives 4.2.1 Overview 4.2.2 Authentication 4.2.3 Authorization 4.2.4 Confidentiality 4.2.5 Integrity 4.2.6 Auditability |
21 | 4.2.7 Availability 4.3 Security Threats to OPC UA Systems 4.3.1 Overview 4.3.2 Message Flooding 4.3.3 Eavesdropping 4.3.4 Message Spoofing |
22 | 4.3.5 Message Alteration 4.3.6 Message Replay 4.3.7 Malformed Messages 4.3.8 Server Profiling |
23 | 4.3.9 Session Hijacking 4.3.10 Rogue Server 4.3.11 Compromising User Credentials 4.4 OPC UA Relationship to Site Security |
24 | 4.5 OPC UA Security Architecture |
25 | 4.6 SecurityPolicies |
26 | 4.7 Security Profiles |
27 | 4.8 User Authorization 4.9 User Authentication 4.10 Application Authentication 4.11 OPC UA Security Related Services |
28 | 4.12 Auditing 4.12.1 General |
29 | 4.12.2 Single Client and Server |
30 | 4.12.3 Aggregating Server |
31 | 4.12.4 Aggregation through a non-auditing Server |
32 | 4.12.5 Aggregating Server with service distribution |
33 | 5 Security Reconciliation 5.1 Reconciliation of Threats with OPC UA Security Mechanisms 5.1.1 Overview 5.1.2 Message Flooding |
34 | 5.1.3 Eavesdropping 5.1.4 Message Spoofing 5.1.5 Message Alteration 5.1.6 Message Replay 5.1.7 Malformed Messages 5.1.8 Server Profiling 5.1.9 Session Hijacking |
35 | 5.1.10 Rogue Server 5.1.11 Compromising User Credentials 5.2 Reconciliation of Objectives with OPC UA Security Mechanisms 5.2.1 Overview 5.2.2 Authentication 5.2.2.1 Application Authentication 5.2.2.2 User Authentication |
36 | 5.2.3 Authorization 5.2.4 Confidentiality 5.2.5 Integrity 5.2.6 Auditability 5.2.7 Availability 6 Implementation and Deployment considerations 6.1 Overview |
37 | 6.2 Appropriate Timeouts: 6.3 Strict Message Processing 6.4 Random Number Generation 6.5 Special and Reserved Packets 6.6 Rate Limiting and Flow Control 6.7 Administrative Access |
38 | 6.8 Alarm related guidance 6.9 Program Access 6.10 Audit event management. |
39 | 6.11 Certificate Management |