Appendix G: Acknowledgment of 3rd Party Icons¶ The icons used in this document come from the Open Security Architecture.