OPC 10000-2: UA Part 2: Security


Released 1.05.04

2024-11-29

This document is subject to the license terms described here.

The general OPC Foundation specification license agreement also applies and can be found here.

This document is a copy of the original which can be found here.


1 Scope 2 Normative References 3 Terms, definitions, abbreviated terms and conventions 3.1 Terms and definitions 3.1.1 AccessRestriction 3.1.3 AccessToken 3.1.5 ApplicationInstance 3.1.7 ApplicationInstanceCertificate 3.1.9 Asymmetric Cryptography 3.1.11 Asymmetric Encryption 3.1.13 Asymmetric Signature 3.1.15 Auditability 3.1.17 Auditing 3.1.19 AuthenticatedEncryption 3.1.20 Authentication 3.1.22 Authorization 3.1.24 AuthorizationService 3.1.26 Availability 3.1.28 Certificate Authority 3.1.30 CertificateStore 3.1.32 Claim 3.1.34 Confidentiality 3.1.36 Cryptography 3.1.38 Cyber Security Management System 3.1.40 Diffie Hellman Key Exchange (DH) 3.1.42 Digital Signature 3.1.44 Elliptic Curve Cryptography (ECC) 3.1.46 Hash Function 3.1.48 Hashed Message Authentication Code 3.1.50 Integrity 3.1.52 Identity Provider 3.1.54 Key Exchange Algorithm 3.1.56 Message Authentication Code 3.1.58 Message Signature 3.1.60 Non-Repudiation 3.1.62 Nonce 3.1.64 Permission 3.1.66 Private Key 3.1.68 Public Key 3.1.70 Public Key Infrastructure 3.1.72 Resource 3.1.74 Rivest-Shamir-Adleman (RSA) 3.1.76 Role 3.1.78 Scope 3.1.80 SecureChannel 3.1.82 SecurityGroup 3.1.84 SecurityKeyService 3.1.86 Symmetric Cryptography 3.1.88 Symmetric Encryption 3.1.90 SymmetricKey 3.1.92 Symmetric Signature 3.1.94 TrustList 3.1.96 Transport Layer Security 3.1.98 UnauthenticatedEncryption 3.1.99 X.509 Certificate 3.2 Abbreviated terms 3.3 Conventions for security model figures 4 OPC UA security architecture 4.1 OPC UA security environment 4.2 Security objectives 4.2.1 Overview 4.2.2 Authentication 4.2.3 Authorization 4.2.4 Confidentiality 4.2.5 Integrity 4.2.6 Non- Repudiation 4.2.7 Auditability 4.2.8 Availability 4.2.9 Perfect Forward Secrecy 4.3 Security threats to OPC UA systems 4.3.1 Overview 4.3.2 Denial of service 4.3.2.1 Overview 4.3.2.2 Message flooding 4.3.2.3 Resource Exhaustion 4.3.2.4 Application Crashes 4.3.3 Eavesdropping 4.3.4 Message spoofing 4.3.5 Message alteration 4.3.6 Message replay 4.3.7 Malformed Messages 4.3.8 Server profiling 4.3.9 Session hijacking 4.3.10 Rogue Server 4.3.11 Rogue Publisher 4.3.12 Rogue Local Discover Server 4.3.13 Compromising user credentials 4.3.14 Compromising identity services 4.3.15 Repudiation 4.3.16 Message suppression 4.3.17 Downgrade Attack 4.4 OPC UA relationship to site security 4.5 OPC UA security architecture 4.5.1 Overview 4.5.2 Client / Server 4.5.2.1 Overview 4.5.2.2 Session application layer 4.5.2.3 Session communication layer 4.5.2.4 Transport layer 4.5.2.5 Session-less Service invocation 4.5.3 Publish-Subscribe 4.5.3.1 Overview 4.5.3.2 Broker-less 4.5.3.3 Broker 4.6 SecurityPolicies 4.7 Security Profiles 4.8 Security Mode settings 4.9 User Authentication 4.10 Application Authentication 4.11 User Authorization 4.12 Roles 4.13 OPC UA security related Services 4.14 Auditing 4.14.1 General 4.14.2 Single Client and Server 4.14.3 Aggregating Server 4.14.4 Aggregation through a non-auditing Server 4.14.5 Aggregating Server with service distribution 5 Security reconciliation 5.1 Reconciliation of threats with OPC UA security mechanisms 5.1.1 Overview 5.1.2 Denial of Service 5.1.2.1 Overview 5.1.2.2 Message flooding 5.1.2.3 Resource exhaustion 5.1.2.4 Application Crashes 5.1.3 Eavesdropping 5.1.4 Message spoofing 5.1.5 Message alteration 5.1.6 Message replay 5.1.7 Malformed Messages 5.1.8 Server profiling 5.1.9 Session hijacking 5.1.10 Rogue Server or Publisher 5.1.11 Rogue Local Discover Server 5.1.12 Compromising user credentials 5.1.13 Repudiation 5.1.14 Message Suppression 5.1.15 Downgrade Attack 5.2 Reconciliation of objectives with OPC UA security mechanisms 5.2.1 Overview 5.2.2 Application Authentication 5.2.3 User Authentication 5.2.4 Authorization 5.2.5 Confidentiality 5.2.6 Integrity 5.2.7 Auditability 5.2.8 Availability 6 Implementation and deployment considerations 6.1 Overview 6.2 Appropriate timeouts: 6.3 Strict Message processing 6.4 Random number generation 6.5 Special and reserved packets 6.6 Rate limiting and flow control 6.7 Administrative access 6.8 Cryptographic Keys 6.9 Alarm related guidance 6.10 Program access 6.11 Audit event management 6.12 OAuth2, JWT and User roles 6.13 HTTPs, TLS & Websockets 6.14 Reverse Connect 6.15 Passwords 6.16 Additional Security considerations 6.17 Least privilege principle 6.18 Zero trust environments 6.19 Diagnostic related issues 7 Unsecured Services 7.1 Overview 7.2 Discovery 7.3 Multicast Discovery 8 GlobalDiscoveryServer Security 8.1 Overview 8.2 Rogue GDS 8.3 Threats against a GDS 8.4 Certificate management threats 9 Certificate management 9.1 Overview 9.2 Self signed certificate management 9.3 CA Signed Certificate management 9.4 GDS Certificate Management 9.4.1 Overview 9.4.2 Certificate management for developers Annex A Mapping to ISA/IEC 62443 Annex B ECC vs RSA B.1 Overview B.2 RSA B.3 ECC