BSI 24/30484357 DC 2024
$13.70
BS EN IEC 62541-2 OPC Unified Architecture – Part 2: Security Model
Published By | Publication Date | Number of Pages |
BSI | 2024 | 47 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
11 | 1 Scope 2 Normative References |
12 | 3 Terms, definitions, and abbreviations 3.1 Terms and definitions |
17 | 3.2 Abbreviations 3.3 Conventions for security model figures 4 OPC UA security architecture 4.1 OPC UA security environment |
18 | 4.2 Security objectives 4.2.1 Overview 4.2.2 Authentication |
19 | 4.2.3 Authorization 4.2.4 Confidentiality 4.2.5 Integrity 4.2.6 Non- Repudiation 4.2.7 Auditability 4.2.8 Availability 4.3 Security threats to OPC UA systems 4.3.1 Overview 4.3.2 Denial of Service 4.3.2.1 Overview |
20 | 4.3.2.2 Message flooding 4.3.2.3 Resource Exhaustion 4.3.2.4 Application Crashes 4.3.3 Eavesdropping |
21 | 4.3.4 Message spoofing 4.3.5 Message alteration 4.3.6 Message replay 4.3.7 Malformed Messages 4.3.8 Server profiling |
22 | 4.3.9 Session hijacking 4.3.10 Rogue Server 4.3.11 Rogue Publisher 4.3.12 Compromising user credentials 4.3.13 Repudiation 4.4 OPC UA relationship to site security |
23 | 4.5 OPC UA security architecture 4.5.1 Overview |
24 | 4.5.2 Client / Server |
25 | 4.5.3 Publish-Subscribe 4.5.3.1 Overview 4.5.3.2 Broker-less |
26 | 4.5.3.3 Broker 4.6 SecurityPolicies 4.7 Security Profiles |
27 | 4.8 Security Mode Settings 4.9 User Authentication 4.10 Application Authentication 4.11 User Authorization |
28 | 4.12 Roles 4.13 OPC UA security related Services |
29 | 4.14 Auditing 4.14.1 General |
30 | 4.14.2 Single Client and Server 4.14.3 Aggregating Server |
31 | 4.14.4 Aggregation through a non-auditing Server |
32 | 4.14.5 Aggregating Server with service distribution |
33 | 5 Security reconciliation 5.1 Reconciliation of threats with OPC UA security mechanisms 5.1.1 Overview 5.1.2 Denial of Service 5.1.2.1 Overview 5.1.2.2 Message flooding |
34 | 5.1.2.3 Resource exhaustion 5.1.2.4 Application Crashes 5.1.3 Eavesdropping 5.1.4 Message spoofing |
35 | 5.1.5 Message alteration 5.1.6 Message replay 5.1.7 Malformed Messages 5.1.8 Server profiling 5.1.9 Session hijacking 5.1.10 Rogue Server or Publisher |
36 | 5.1.11 Compromising user credentials 5.1.12 Repudiation 5.2 Reconciliation of objectives with OPC UA security mechanisms 5.2.1 Overview 5.2.2 Application Authentication 5.2.3 User Authentication 5.2.4 Authorization |
37 | 5.2.5 Confidentiality 5.2.6 Integrity 5.2.7 Auditability 5.2.8 Availability |
38 | 6 Implementation and deployment considerations 6.1 Overview 6.2 Appropriate timeouts: 6.3 Strict Message processing 6.4 Random number generation |
39 | 6.5 Special and reserved packets 6.6 Rate limiting and flow control 6.7 Administrative access 6.8 Cryptographic Keys 6.9 Alarm related guidance |
40 | 6.10 Program access 6.11 Audit event management 6.12 OAuth2, JWT and User roles 6.13 HTTPs, TLS & Websockets |
41 | 6.14 Reverse Connect 6.15 Passwords 6.16 Additional Security considerations 7 Unsecured Services 7.1 Overview 7.2 Multi Cast Discovery |
42 | 7.3 Global Discovery Server Security 7.3.1 Overview 7.3.2 Rogue GDS 7.3.3 Threats against a GDS |
43 | 7.3.4 Certificate management threats 8 Certificate management 8.1 Overview 8.2 Self signed certificate management |
44 | 8.3 CA Signed Certificate management |
45 | 8.4 GDS Certificate Management 8.4.1 Overview 8.4.2 Developers Certificate management |