OPC unified architecture - Part 2: Security Model (IEC 62541-2:2026)

IEC 62541-2:2026 describes the OPC Unified Architecture (OPC UA) security model. It describes the security threats of the physical, hardware, and software environments in which OPC UA is expected to run. It describes how OPC UA relies upon other standards for security. It provides definition of common security terms that are used in this and other parts of the IEC 62541 series. It gives an overview and concept of the security features that are specified in other parts of the series. It references services, mappings, and Profiles that are specified normatively in other parts of the 62541 series. It provides suggestions or best practice guidelines on implementing security. Any seeming ambiguity between this document and one of the other normative parts does not remove or reduce the requirement specified in the other normative part.
There are many different aspects of security that are addressed when developing applications. However, since OPC UA specifies a communication protocol, the focus is on securing the data exchanged between applications. This does not mean that an application developer can ignore the other aspects of security like protecting persistent data against tampering. It is important that the developers look into all aspects of security and decide how they can be addressed in the application. Common security features for industrial Controls are defined in IEC 62443-4-2 and OPC UA defined a relationship to them in Annex A.
This document is directed to readers who will develop OPC UA applications. It is also for end Users that wish to understand the various security features and functionality provided by OPC UA. It also offers some recommendations that can be applied when deploying systems. These recommendations are generic in nature since the details would depend on the actual implementation of the OPC UA applications and the choices made for the site security.
This edition cancels and replaces the third edition of IEC TR 62541-2, published in 2020.This edition constitutes a technical revision.

OPC Unified Architecture – Teil 2: Modell für die IT-Sicherheit (IEC 62541-2:2026)

Architecture unifiée OPC - Partie 2: Modèle de sécurité (IEC 62541-2:2026)

IEC 62541-2:2026 décrit le modèle de sécurité de l'Architecture unifiée OPC (OPC UA). Elle décrit les menaces pour la sécurité des environnements physiques, matériels et logiciels dans lesquels l'OPC UA est destinée à fonctionner. Elle décrit de quelle manière l'OPC UA s'appuie sur d'autres normes de sécurité. Elle fournit une définition des termes de sécurité communs utilisés dans la présente partie et dans les autres parties de la série IEC 62541. Elle donne une vue d'ensemble des fonctions de sécurité spécifiées dans d'autres parties de la série et en décrit le concept. Elle fait référence aux services, mappings et Profils spécifiés de manière normative dans d'autres parties de la série IEC 62541. Elle fournit des suggestions ou des lignes directrices sur les meilleures pratiques relatives à la mise en œuvre de la sécurité. Aucune ambiguïté apparente entre le présent document et l'une des autres parties normatives ne supprime ni ne réduit l'exigence spécifiée dans l'autre partie normative.
Il existe de nombreux aspects différents de la sécurité qui sont traités lors du développement d'applications. Cependant, étant donné que l'OPC UA spécifie un protocole de communication, l'attention est portée sur la sécurisation des données échangées entre les applications. Cela ne signifie pas qu'un développeur d'applications peut ignorer les autres aspects de la sécurité, comme la protection des données persistantes contre toute falsification. Il est important que les développeurs examinent tous les aspects de la sécurité et décident de la manière dont ces aspects peuvent être traités dans l'application. Les fonctions de sécurité communes pour les commandes industrielles sont définies dans l'IEC 62443‑4‑2; elles sont mises en corrélation avec l'OPC UA à l'Annexe A.
Le présent document s'adresse aux lecteurs qui développeront des applications OPC UA. Il s'applique également aux utilisateurs finaux qui souhaitent comprendre les différentes fonctions de sécurité fournies par l'OPC UA. Il fournit, par ailleurs, certaines recommandations qui peuvent être appliquées lors du déploiement de systèmes. Ces recommandations sont génériques par nature, car les détails dépendent de la mise en œuvre réelle des applications OPC UA et des choix effectués pour la sécurité du site.
Cette édition annule et remplace la troisième édition de l’IEC TR 62541-2 parue en 2020. Cette édition constitue une révision technique.

Enotna arhitektura OPC - 2. del: Varnostni model (IEC 62541-2:2026)

IEC 62541-2:2026 opisuje varnostni model OPC Unified Architecture (OPC UA). Opisuje varnostne grožnje fizičnega, strojnega in programskega okolja, v katerem naj bi OPC UA deloval. Opisuje, kako se OPC UA zanaša na druge standarde za varnost. Ponuja definicijo splošnih varnostnih izrazov, ki se uporabljajo v tem in drugih delih serije IEC 62541. Ponuja pregled in koncept varnostnih funkcij, ki so določene v drugih delih serije. Navedeni so sklici na storitve, preslikave in profile, ki so normativno določeni v drugih delih serije 62541. Ponuja predloge ali smernice za najboljše prakse pri izvajanju varnosti. Kakršna koli navidezna dvoumnost med tem dokumentom in enim od drugih normativnih delov ne odstrani ali zmanjša zahteve, določene v drugem normativnem delu.
Pri razvoju aplikacij se obravnavajo številni različni vidiki varnosti. Vendar, ker OPC UA določa komunikacijski protokol, je poudarek na varovanju podatkov, izmenjanih med aplikacijami. To ne pomeni, da lahko razvijalec aplikacij zanemari druge vidike varnosti, kot je zaščita trajnih podatkov pred posegi. Pomembno je, da razvijalci preučijo vse vidike varnosti in se odločijo, kako jih lahko obravnavajo v aplikaciji. Splošne varnostne funkcije za industrijske krmilnike so opredeljene v IEC 62443-4-2, OPC UA pa določa odnos do njih v Prilogi A.
Ta dokument je namenjen bralcem, ki bodo razvijali aplikacije OPC UA. Prav tako je namenjen končnim uporabnikom, ki želijo razumeti različne varnostne funkcije in funkcionalnosti, ki jih zagotavlja OPC UA. Ponuja tudi nekaj priporočil, ki jih je mogoče uporabiti pri uvajanju sistemov. Ta priporočila so splošne narave, saj podrobnosti odvisne od dejanske izvedbe aplikacij OPC UA in izbir, narejenih za varnost na lokaciji.
Ta izdaja preklicuje in nadomešča tretjo izdajo IEC TR 62541-2, objavljeno leta 2020. Ta izdaja predstavlja tehnično revizijo.

General Information

Status
Published
Public Enquiry End Date
30-Mar-2024
Publication Date
11-May-2026
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
31-Mar-2026
Due Date
05-Jun-2026
Completion Date
12-May-2026

Relations

Effective Date
10-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026
Effective Date
31-Mar-2026

Overview

SIST EN IEC 62541-2:2026, published by CLC, defines the security model for OPC Unified Architecture (OPC UA). This international standard outlines how OPC UA assesses and mitigates security threats in physical, hardware, and software environments. It explains the key security objectives relevant to OPC UA, describes common security terminology, and establishes OPC UA’s reliance on other security standards. The document is essential for OPC UA application developers and end users who want to understand, implement, and maintain robust security within industrial and IT systems that use OPC UA.

This latest edition replaces the previous IEC TR 62541-2:2020 and constitutes a technical revision, reflecting evolving best practices and aligning with security standards such as IEC 62443-4-2.


Key Topics

  • Security Architecture
    • Describes the OPC UA security environment and outlines the architecture, including client/server and publish/subscribe models.
  • Security Objectives
    • Authentication: Ensures identity verification for users and applications.
    • Authorization: Controls access based on roles and permissions.
    • Confidentiality: Protects sensitive data from unauthorized disclosure.
    • Integrity: Ensures information is not tampered with during transmission.
    • Non-Repudiation, Auditability, Availability: Covers proof of actions, audit trails, and system uptime.
  • Security Threats
    • Identifies common risks such as denial of service, eavesdropping, spoofing, message replay/alteration, session hijacking, and credential compromise.
  • Profiling and Best Practices
    • References to security services, mappings, security profiles, and configuration guidelines.
    • Suggests best practices for secure deployment, such as certificate management, cryptographic key handling, and timeout settings.
  • Implementation and Deployment Guidance
    • Recommendations on using cryptography, managing user roles, using OAuth2, JWT, HTTPS, TLS, Websockets, and rate limiting.

Applications

SIST EN IEC 62541-2:2026 is designed for practical use in a range of industrial and IT scenarios:

  • Industrial Automation: Ensures secure communications and data exchange in SCADA, DCS, and PLC environments.
  • Enterprise Integration: Provides secure integration between shop-floor and business IT systems.
  • Product Development: Assists developers in designing secure OPC UA applications with attention to data-in-transit security and persistent data protection.
  • System Deployment and Maintenance: Offers end users and system integrators actionable recommendations to safeguard OPC UA-based systems, including guidelines on certificate management and configuration of security profiles.
  • Regulatory Compliance: Facilitates compliance with broader cybersecurity standards and requirements, including referencing IEC 62443-4-2 for industrial control system security.

Related Standards

For comprehensive OPC UA implementation and integration, SIST EN IEC 62541-2:2026 references several key standards:

  • IEC 62541-1: OPC UA Overview and Concepts
  • IEC 62541-3: Address Space Model
  • IEC 62541-4: Services
  • IEC 62541-5: Information Model
  • IEC 62541-6: Mappings
  • IEC 62541-7: Profiles
  • IEC 62541-12: Discovery and Global Services
  • IEC 62541-14: PubSub
  • IEC 62541-18: Role-Based Security
  • IEC 62443-4-2: Security for Industrial Automation and Control Systems - Technical security requirements for IACS components

Additional references include international security protocols such as TLS (RFC 2246), HTTPS (RFC 2818), OAuth2, JWT (RFC 7519), and guidelines from NIST.


SIST EN IEC 62541-2:2026 is the definitive reference for anyone seeking to implement, evaluate, or deploy OPC UA solutions with advanced and standardized security features for industrial and enterprise environments. For optimal OPC UA security, integration with referenced standards and adherence to suggested best practices are critical.

Buy Documents

Standard

SIST EN IEC 62541-2:2026 - BARVE

English language (64 pages)
Preview
Preview
e-Library read for
1 day

Get Certified

Connect with accredited certification bodies for this standard

BSI Group

BSI (British Standards Institution) is the business standards company that helps organizations make excellence a habit.

UKAS United Kingdom Verified

DVS-ZERT GmbH

German welding certification society.

DAKKS Germany Verified

CARES (UK Certification Authority for Reinforcing Steels)

UK certification for reinforcing steels and construction.

UKAS United Kingdom Verified

Sponsored listings

Frequently Asked Questions

SIST EN IEC 62541-2:2026 is a standard published by the Slovenian Institute for Standardization (SIST). Its full title is "OPC unified architecture - Part 2: Security Model (IEC 62541-2:2026)". This standard covers: IEC 62541-2:2026 describes the OPC Unified Architecture (OPC UA) security model. It describes the security threats of the physical, hardware, and software environments in which OPC UA is expected to run. It describes how OPC UA relies upon other standards for security. It provides definition of common security terms that are used in this and other parts of the IEC 62541 series. It gives an overview and concept of the security features that are specified in other parts of the series. It references services, mappings, and Profiles that are specified normatively in other parts of the 62541 series. It provides suggestions or best practice guidelines on implementing security. Any seeming ambiguity between this document and one of the other normative parts does not remove or reduce the requirement specified in the other normative part. There are many different aspects of security that are addressed when developing applications. However, since OPC UA specifies a communication protocol, the focus is on securing the data exchanged between applications. This does not mean that an application developer can ignore the other aspects of security like protecting persistent data against tampering. It is important that the developers look into all aspects of security and decide how they can be addressed in the application. Common security features for industrial Controls are defined in IEC 62443-4-2 and OPC UA defined a relationship to them in Annex A. This document is directed to readers who will develop OPC UA applications. It is also for end Users that wish to understand the various security features and functionality provided by OPC UA. It also offers some recommendations that can be applied when deploying systems. These recommendations are generic in nature since the details would depend on the actual implementation of the OPC UA applications and the choices made for the site security. This edition cancels and replaces the third edition of IEC TR 62541-2, published in 2020.This edition constitutes a technical revision.

IEC 62541-2:2026 describes the OPC Unified Architecture (OPC UA) security model. It describes the security threats of the physical, hardware, and software environments in which OPC UA is expected to run. It describes how OPC UA relies upon other standards for security. It provides definition of common security terms that are used in this and other parts of the IEC 62541 series. It gives an overview and concept of the security features that are specified in other parts of the series. It references services, mappings, and Profiles that are specified normatively in other parts of the 62541 series. It provides suggestions or best practice guidelines on implementing security. Any seeming ambiguity between this document and one of the other normative parts does not remove or reduce the requirement specified in the other normative part. There are many different aspects of security that are addressed when developing applications. However, since OPC UA specifies a communication protocol, the focus is on securing the data exchanged between applications. This does not mean that an application developer can ignore the other aspects of security like protecting persistent data against tampering. It is important that the developers look into all aspects of security and decide how they can be addressed in the application. Common security features for industrial Controls are defined in IEC 62443-4-2 and OPC UA defined a relationship to them in Annex A. This document is directed to readers who will develop OPC UA applications. It is also for end Users that wish to understand the various security features and functionality provided by OPC UA. It also offers some recommendations that can be applied when deploying systems. These recommendations are generic in nature since the details would depend on the actual implementation of the OPC UA applications and the choices made for the site security. This edition cancels and replaces the third edition of IEC TR 62541-2, published in 2020.This edition constitutes a technical revision.

SIST EN IEC 62541-2:2026 is classified under the following ICS (International Classification for Standards) categories: 25.040 - Industrial automation systems; 25.040.40 - Industrial process measurement and control; 35.240.50 - IT applications in industry. The ICS classification helps identify the subject area and facilitates finding related standards.

SIST EN IEC 62541-2:2026 has the following relationships with other standards: It is inter standard links to SIST EN IEC 62541-1:2026, SIST EN 62541-6:2012, SIST EN 62541-4:2012, SIST EN 62769-6:2015, SIST-TP CLC IEC/TR 62541-1:2021, SIST EN 62541-4:2015, SIST EN 62769-7:2015, SIST EN IEC 62769-6:2021, SIST EN IEC 62769-150-1:2023, SIST EN IEC 62769-7:2021, SIST EN IEC 62541-4:2020, SIST EN IEC 62541-6:2020, SIST EN 62769-1:2015, SIST EN IEC 62541-12:2020, SIST EN IEC 62541-14:2020. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

SIST EN IEC 62541-2:2026 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.

Standards Content (Sample)


SLOVENSKI STANDARD
01-junij-2026
Enotna arhitektura OPC - 2. del: Varnostni model (IEC 62541-2:2026)
OPC unified architecture - Part 2: Security Model (IEC 62541-2:2026)
OPC Unified Architecture – Teil 2: Modell für die IT-Sicherheit (IEC 62541-2:2026)
Architecture unifiée OPC - Partie 2: Modèle de sécurité (IEC 62541-2:2026)
Ta slovenski standard je istoveten z: EN IEC 62541-2:2026
ICS:
25.040.40 Merjenje in krmiljenje Industrial process
industrijskih postopkov measurement and control
35.240.50 Uporabniške rešitve IT v IT applications in industry
industriji
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD EN IEC 62541-2

NORME EUROPÉENNE
EUROPÄISCHE NORM March 2026
ICS 25.040
Supersedes CLC IEC/TR 62541-2:2021
English Version
OPC unified architecture - Part 2: Security Model
(IEC 62541-2:2026)
Architecture unifiée OPC - Partie 2: Modèle de sécurité OPC Unified Architecture - Teil 2: Modell für die IT-
(IEC 62541-2:2026) Sicherheit
(IEC 62541-2:2026)
This European Standard was approved by CENELEC on 2026-03-19. CENELEC members are bound to comply with the CEN/CENELEC
Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration.
Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC
Management Centre or to any CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by translation
under the responsibility of a CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the
same status as the official versions.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,
Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the
Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland,
Türkiye and the United Kingdom.

European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2026 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.
Ref. No. EN IEC 62541-2:2026 E

European foreword
The text of document 65E/1201/FDIS, future edition 1 of IEC 62541-2, prepared by SC 65E "Devices
and integration in enterprise systems" of IEC/TC 65 "Industrial-process measurement, control and
automation" was submitted to the IEC-CENELEC parallel vote and approved by CENELEC as
The following dates are fixed:
• latest date by which the document has to be implemented at national (dop) 2027-03-31
level by publication of an identical national standard or by endorsement
• latest date by which the national standards conflicting with the (dow) 2029-03-31
document have to be withdrawn
This document supersedes CLC IEC/TR 62541-2:2021 and all of its amendments and corrigenda (if
any).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CENELEC shall not be held responsible for identifying any or all such patent rights.
Any feedback and questions on this document should be directed to the users’ national committee. A
complete listing of these bodies can be found on the CENELEC website.
Endorsement notice
The text of the International Standard IEC 62541-2:2026 was approved by CENELEC as a European
Standard without any modification.
In the official version, for Bibliography, the following notes have to be added for the standard indicated:
IEC 62541-3 NOTE Approved as EN IEC 62541-3
IEC 62541-4 NOTE Approved as EN IEC 62541-4
IEC 62541-5 NOTE Approved as EN IEC 62541-5
IEC 62541-6 NOTE Approved as EN IEC 62541-6
IEC 62541-7 NOTE Approved as EN IEC 62541-7
IEC 62541-12 NOTE Approved as EN IEC 62541-12
IEC 62541-14 NOTE Approved as EN IEC 62541-14
IEC 62541-18 NOTE Approved as EN IEC 62541-18
IEC 62541-21 NOTE Approved as EN IEC 62541-21
IEC 62443-4-2 NOTE Approved as EN IEC 62443-4-2
Annex ZA
(normative)
Normative references to international publications
with their corresponding European publications
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments)
applies.
NOTE 1  Where an International Publication has been modified by common modifications, indicated by (mod),
the relevant EN/HD applies.
NOTE 2  Up-to-date information on the latest versions of the European Standards listed in this annex is available
here: www.cencenelec.eu.
Publication Year Title EN/HD Year
IEC 62541-1 - OPC Unified Architecture - Part 1: EN IEC 62541-1 -
Overview and concepts
IEC 62541-2 ®
Edition 1.0 2026-02
INTERNATIONAL
STANDARD
OPC unified architecture –
Part 2: Security Model
ICS 25.040  ISBN 978-2-8327-1035-7

IEC 62541-2:2026-02(en)
IEC 62541-2:2026 © IEC 2026
CONTENTS
FOREWORD . 4
1 Scope . 6
2 Normative references . 6
3 Terms, definitions, abbreviated terms and conventions . 6
3.1 Terms and definitions . 6
3.2 Abbreviated terms. 11
3.3 Conventions for security model figures. 12
4 OPC UA security architecture . 12
4.1 OPC UA security environment . 12
4.2 Security objectives . 13
4.2.1 Overview . 13
4.2.2 Authentication . 14
4.2.3 Authorization . 14
4.2.4 Confidentiality . 14
4.2.5 Integrity . 14
4.2.6 Non-Repudiation . 14
4.2.7 Auditability . 14
4.2.8 Availability . 14
4.3 Security threats to OPC UA systems . 14
4.3.1 Overview . 14
4.3.2 Denial of Service . 15
4.3.3 Eavesdropping. 16
4.3.4 Message spoofing . 16
4.3.5 Message alteration . 16
4.3.6 Message replay . 17
4.3.7 Malformed Messages . 17
4.3.8 Server profiling . 17
4.3.9 Session hijacking . 17
4.3.10 Rogue Server . 17
4.3.11 Rogue Publisher . 18
4.3.12 Compromising user credentials . 18
4.3.13 Repudiation . 18
4.4 OPC UA relationship to site security . 18
4.5 OPC UA security architecture . 19
4.5.1 Overview . 19
4.5.2 Client / Server . 20
4.5.3 Publish-Subscribe . 21
4.6 SecurityPolicies . 22
4.7 Security Profiles . 23
4.8 Security Mode settings . 23
4.9 User Authentication . 23
4.10 Application Authentication . 24
4.11 User Authorization . 24
4.12 Roles . 24
4.13 OPC UA security related Services . 25
4.14 Auditing . 26
4.14.1 General. 26
IEC 62541-2:2026 © IEC 2026
4.14.2 Single Client and Server . 26
4.14.3 Aggregating Server . 27
4.14.4 Aggregation through a non-auditing Server . 28
4.14.5 Aggregating Server with service distribution. 28
5 Security reconciliation . 29
5.1 Reconciliation of threats with OPC UA security mechanisms . 29
5.1.1 Overview . 29
5.1.2 Denial of Service . 30
5.1.3 Eavesdropping. 31
5.1.4 Message spoofing . 31
5.1.5 Message alteration . 32
5.1.6 Message replay . 32
5.1.7 Malformed Messages . 32
5.1.8 Server profiling . 32
5.1.9 Session hijacking . 32
5.1.10 Rogue Server or Publisher . 33
5.1.11 Compromising user credentials . 33
5.1.12 Repudiation . 33
5.2 Reconciliation of objectives with OPC UA security mechanisms . 33
5.2.1 Overview . 33
5.2.2 Application Authentication . 33
5.2.3 User Authentication . 34
5.2.4 Authorization . 34
5.2.5 Confidentiality . 34
5.2.6 Integrity . 34
5.2.7 Auditability . 35
5.2.8 Availability . 35
6 Implementation and deployment considerations . 35
6.1 Overview . 35
6.2 Appropriate timeouts . 35
6.3 Strict Message processing . 35
6.4 Random number generation . 36
6.5 Special and reserved packets . 36
6.6 Rate limiting and flow control . 36
6.7 Administrative access . 36
6.8 Cryptographic Keys. 37
6.9 Alarm related guidance . 37
6.10 Program access. 37
6.11 Audit event management . 38
6.12 OAuth2, JWT and User roles. 38
6.13 HTTPS, TLS & Websockets . 38
6.14 Reverse connect. 38
6.15 Passwords . 39
6.16 Additional Security considerations . 39
7 Unsecured Services . 39
7.1 Overview . 39
7.2 Multi Cast Discovery . 39
7.3 Global Discovery Server Security . 39
7.3.1 Overview . 39
IEC 62541-2:2026 © IEC 2026
7.3.2 Rogue GDS . 40
7.3.3 Threats against a GDS . 40
7.3.4 Certificate management threats . 40
8 Certificate management . 41
8.1 Overview . 41
8.2 Self signed certificate management . 41
8.3 CA Signed Certificate management . 42
8.4 GDS Certificate Management . 43
8.4.1 Overview . 43
8.4.2 Developers Certificate management. 44
Annex A (informative) Mapping to IEC 62443-4-2 . 46
Bibliography . 59

Figure 1 – OPC UA network example . 13
Figure 2 – OPC UA security architecture – Client / Server . 19
Figure 3 – OPC UA security architecture- Publisher - Subscriber . 20
Figure 4 – Role overview . 24
Figure 5 – Simple Servers . 26
Figure 6 – Aggregating Servers. 27
Figure 7 – Aggregation with a non-auditing Server . 28
Figure 8 – Aggregating Server with service distribution . 29
Figure 9 – Manual Certificate handling . 42
Figure 10 – CA Certificate handling . 43
Figure 11 – Certificate handling . 44

Table 1 – Security Reconciliation Threats Summary . 30
Table A.1 – IEC 62443 Mapping FR 1 Identification and authentication control . 47
Table A.2 – IEC 62443 mapping FR 2 Use control . 50
Table A.3 – IEC 62443 Mapping FR 3 System integrity . 52
Table A.4 – IEC 62443 Mapping FR 4 Data confidentiality . 55
Table A.5 – IEC 62443 Mapping FR 5 Restricted data flow . 56
Table A.6 – IEC 62443 Mapping FR 6 Timely response to events . 56
Table A.7 – IEC 62443 Mapping FR 7 Resource availability . 57

IEC 62541-2:2026 © IEC 2026
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
OPC unified architecture -
Part 2: Security Model
FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote international
co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and
in addition to other activities, IEC publishes International Standards, Technical Specifications, Technical Reports,
Publicly Available Specifications (PAS) and Guides (hereafter referred to as "IEC Publication(s)"). Their
preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with
may participate in this preparatory work. International, governmental and non-governmental organizations liaising
with the IEC also participate in this preparation. IEC collaborates closely with the International Organization for
Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence between
any IEC Publication and the corresponding national or regional publication shall be clearly indicated in the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) IEC draws attention to the possibility that the implementation of this document may involve the use of (a)
patent(s). IEC takes no position concerning the evidence, validity or applicability of any claimed patent rights in
respect thereof. As of the date of publication of this document, IEC had not received notice of (a) patent(s), which
may be required to implement this document. However, implementers are cautioned that this may not represent
the latest information, which may be obtained from the patent database available at https://patents.iec.ch. IEC
shall not be held responsible for identifying any or all such patent rights.
IEC 62541-2 has been prepared by subcommittee 65E: Devices and integration in enterprise
systems, of IEC technical committee 65: Industrial-process measurement, control, and
automation. It is an International Standard.
This edition cancels and replaces the third edition of IEC TR 62541-2, published in 2020.This
edition constitutes a technical revision.
The text of this International Standard is based on the following documents:
Draft Report on voting
65E/1201/FDIS 65E/1206/RVD
Full information on the voting for its approval can be found in the report on voting indicated in
the above table.
IEC 62541-2:2026 © IEC 2026
The language used for the development of this International Standard is English.
This document was drafted in accordance with ISO/IEC Directives, Part 2, and developed in
accordance with ISO/IEC Directives, Part 1 and ISO/IEC Directives, IEC Supplement, available
at www.iec.ch/members_experts/refdocs. The main document types developed by IEC are
described in greater detail at www.iec.ch/publications.
Throughout this document and the other Parts of the series, certain document conventions are
used:
Italics are used to denote a defined term or definition that appears in the "Terms and definitions"
clause in one of the parts of the series.
Italics are also used to denote the name of a service input or output parameter or the name of
a structure or element of a structure that are usually defined in tables.
The italicized terms and names are also often written in camel-case (the practice of writing
compound words or phrases in which the elements are joined without spaces, with each
element's initial letter capitalized within the compound). For example, the defined term is
AddressSpace instead of Address Space. This makes it easier to understand that there is a
single definition for AddressSpace, not separate definitions for Address and Space.
A list of all parts in the IEC 62541 series, published under the general title OPC Unified
Architecture, can be found on the IEC website.
The committee has decided that the contents of this document will remain unchanged until the
stability date indicated on the IEC website under webstore.iec.ch in the data related to the
specific document. At this date, the document will be
– reconfirmed,
– withdrawn, or
– revised.
IEC 62541-2:2026 © IEC 2026
1 Scope
This part of IEC 62541 describes the OPC Unified Architecture (OPC UA) security model. It
describes the security threats of the physical, hardware, and software environments in which
OPC UA is expected to run. It describes how OPC UA relies upon other standards for security.
It provides definition of common security terms that are used in this and other parts of the
IEC 62541 series. It gives an overview and concept of the security features that are specified
in other parts of the series. It references services, mappings, and Profiles that are specified
normatively in other parts of the 62541 series. It provides suggestions or best practice
guidelines on implementing security. Any seeming ambiguity between this document and one
of the other normative parts does not remove or reduce the requirement specified in the other
normative part.
There are many different aspects of security that are addressed when developing applications.
However, since OPC UA specifies a communication protocol, the focus is on securing the data
exchanged between applications. This does not mean that an application developer can ignore
the other aspects of security like protecting persistent data against tampering. It is important
that the developers look into all aspects of security and decide how they can be addressed in
the application. Common security features for industrial Controls are defined in IEC 62443-4-2
and OPC UA defined a relationship to them in Annex A.
This document is directed to readers who will develop OPC UA applications. It is also for end
Users that wish to understand the various security features and functionality provided by OPC
UA. It also offers some recommendations that can be applied when deploying systems. These
recommendations are generic in nature since the details would depend on the actual
implementation of the OPC UA applications and the choices made for the site security.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies.
For undated references, the latest edition of the referenced document (including any
amendments) applies.
IEC 62541-1, OPC Unified Architecture - Part 1: Overview and Concepts
3 Terms, definitions, abbreviated terms and conventions
3.1 Terms and definitions
For the purposes of this document, the terms and definitions given in IEC 62541-1 and the
following apply.
ISO and IEC maintain terminology databases for use in standardization at the following
addresses:
– IEC Electropedia: available at https://www.electropedia.org/
– ISO Online browsing platform: available at https://www.iso.org/obp
3.1.1
AccessRestriction
limit on the circumstances under which an operation, such as a read, write or a call, can be
performed on a Node
Note 1 to entry: Operations can only be performed on a Node if the Client has the necessary Permissions and has
satisfied all of the AccessRestrictions.
IEC 62541-2:2026 © IEC 2026
3.1.2
AccessToken
digitally signed document that asserts that the subject is entitled to access a Resource
Note 1 to entry: The document includes the name of the subject and the Resource being accessed.
3.1.3
ApplicationInstance
individual installation of a program running on one computer
Note 1 to entry: There can be several ApplicationInstances of the same application running at the same time on
several computers or possibly the same computer.
3.1.4
ApplicationInstanceCertificate
Certificate of an individual ApplicationInstance that has been installed in an individual host
Note 1 to entry: Different installations of one software product would have different ApplicationInstanceCertificates.
The use of an ApplicationInstanceCertificate for uses outside of what is described in the specification could greatly
reduce the security provided by the ApplicationInstanceCertificate and should be discouraged.
Note 2 to entry: also written as ApplicationInstance Certificate
3.1.5
Asymmetric Cryptography
Cryptography method that uses a pair of keys, one that is designated the Private Key and kept
secret, the other called the Public Key that is generally made available
Note 1 to entry: 'Asymmetric Cryptography, also known as "public-key cryptography". In an Asymmetric Encryption
algorithm when an entity "A" requires Confidentiality for data sent to entity "B", then entity "A" encrypts the data with
a Public Key provided by entity "B". Only entity "B" has the matching Private Key that is needed to decrypt the data.
In an asymmetric Digital Signature algorithm when an entity "A" requires message Integrity or to provide
Authentication for data sent to entity "B", entity A uses its Private Key to sign the data. To verify the signature, entity
B uses the matching Public Key that entity A has provided. In an asymmetric key agreement algorithm, entity A and
entity B each send their own Public Key to the other entity. Then each uses their own Private Key and the other's
Public Key to compute the new key value.' according to IS Glossary.
3.1.6
Asymmetric Encryption
mechanism used by Asymmetric Cryptography for encrypting data with the Public Key of an
entity and for decrypting data with the associated Private Key
3.1.7
Asymmetric Signature
mechanism used by Asymmetric Cryptography for signing data with the Private Key of an entity
and for verifying the data's signature with the associated Public Key
3.1.8
Auditability
security objective that assures that any actions or activities in a system can be recorded
3.1.9
Auditing
tracking of actions and activities in the system, including security related activities where Audit
records can be used to review and verify system operations
3.1.10
Authentication
process that assures that the identity of an entity such as a Client, Server, Publisher or user
can be verified
IEC 62541-2:2026 © IEC 2026
3.1.11
Authorization
ability to grant access to a system resource
Note 1 to entry: Authorization of access to resources should be based on the need-to-know principle. It is important
that access is restricted in a system.
3.1.12
AuthorizationService
Server which validates a request to access a Resource returns an AccessToken that grants
access to the Resource
Note 1 to entry: The AuthorizationService is also called STS (Security Token Service) in other standards.
3.1.13
Availability
security objective that assures that the system is running normally. That is, no services have
been compromised in such a way to become unavailable or severely degraded
3.1.14
Certificate Authority
entity that can issue Certificates, also known as a CA
Note 1 to entry: The Certificate certifies the ownership of a Public Key by the named subject of the Certificate. This
allows others (relying parties) to rely upon signatures or assertions made by the Private Key that corresponds to the
Public Key that is certified. In this model of trust relationships, a CA is a trusted party that is trusted by both the
subject (owner) of the Certificate and the party relying upon the Certificate. CA s are characteristic of many Public
Key infrastructure (PKI) schemes
Note 2 to entry: A private CA system (or a private sub-CA) could be used as long as all parties trust it.
3.1.15
CertificateStore
persistent location where Certificates and Certificate revocation lists (CRLs) are stored
Note 1 to entry: It can be a disk resident file structure or on Windows platforms it can be a Windows registry location.
3.1.16
Claim
statement in an AccessToken that asserts information about the subject which the Authorization
Service knows to be true
Note 1 to entry: Claims can include username, email, and Roles granted to the subject.
3.1.17
Confidentiality
security objective that assures the protection of data from being read by unintended parties
3.1.18
Cryptography
algorithm to transform clear, meaningful information into an enciphered, unintelligible form
using an algorithm and a key
3.1.19
Cyber Security Management System
program designed by an organization to maintain the security of the entire organization's assets
to an established level of Confidentiality, Integrity, and Availability, whether they are on the
business side or the industrial automation and control systems side of the organization
IEC 62541-2:2026 © IEC 2026
3.1.20
Digital Signature
value computed with a cryptographic algorithm and appended to data in such a way that any
recipient of the data can use the signature to verify the data's origin and Integrity
3.1.21
Integrity
security objective that assures that information has not been modified or destroyed in an
unauthorized manner
Note 1 to entry: More information can be found in IS Glossary.
3.1.22
Identity Provider
Server which verifies credentials provided by a Security Principal and returns a token which can
be passed to an associated Authorization Service
3.1.23
Key Exchange Algorithm
protocol used for establishing a secure communication path between two entities in an
unsecured environment whereby both entities apply a specific algorithm to securely exchange
secret keys that are used for securing the communication between them
Note 1 to entry: A typical example of a Key Exchange Algorithm is the Handshake Protocol specified in TLS.
3.1.24
Message Signature
Digital Signature used to ensure the Integrity of Messages that are sent between two entities
Note 1 to entry: There are several ways to generate and verify Message Signatures however they can be
categorized as symmetric (see Entry 3.1.35 ) and asymmetric (see Entry 3.1.5) approaches.
3.1.25
Non-Repudiation
ability to prove the occurrence of a claimed event or action and its originating entities
Note 1 to entry: The purpose of non-repudiation is to resolve disputes about the occurrence or non-occurrence of
the event or action and involvement of entities in the event.
Note 2 to entry: This definition comes from IEC 62443-4-2 and can be different from the definition used in other
industries.
3.1.26
Nonce
random number that is used once typically by algorithms that generate security keys
3.1.27
Permission
right to execute an operation, such as a read, write or a call, on a Node
3.1.28
Private Key
secret component of a pair of cryptographic keys used for Asymmetric Cryptography
Note 1 to entry: Public Key and Private Key are always generated as a pair. If either is updated, the other will also
be updated.
IEC 62541-2:2026 © IEC 2026
3.1.29
Public Key
publicly-disclosed component of a pair of cryptographic keys used for Asymmetric Cryptography
Note 1 to entry: See IS Glossary.
Note 2 to entry: Public Key and Private Key are always generated as a pair. If either is updated the other must also
be updated.
3.1.30
Public Key Infrastructure
set of hardware, software, people, policies, and procedures needed to create, manage, store,
distribute, and revoke Certificates based on Asymmetric Cryptography
Note 1 to entry: The core PKI functions are to register users and issue their public-key Certificates, to revoke
Certificates when required, and to archive data needed to validate Certificates. Key pairs for data Confidentiality
could be generated by a Certificate authority (CA) but it is better to have the Private Key owner generate the key
pair locally, provided they have a trusted key generation capability, since it improves security because the Private
Key is never transmitted to the CA. See PKI and X.509v3 for more details on Public Key Infrastructures.
3.1.31
Resource
secured entity which an application accesses
Note 1 to entry: A Resource is usually a Server.
3.1.32
Role
function assumed by a Client when it accesses a Server
Note 1 to entry: A Role can refer to a specific job function such as operator or engineer.
3.1.33
SecurityKeyService
Server that accepts AccessTokens issued by the Authorization Service and returns security
keys that can be used to access the specified Resource
Note 1 to entry: The keys are typically used for cryptography operations such as encrypting or decrypting messages
sent on a PubSub stream.
3.1.34
Secure Channel
in OPC UA, a communication path established between an OPC UA Client and Server that have
authenticated each other using certain OPC UA services and for which security parameters
have been negotiated and applied
3.1.35
Symmetric Cryptography
branch of cryptography involving algorithms that use the same key for two different steps of the
algorithm (such as encryption and decryption, or signature creation and signature verification)
Note 1 to entry: See IS Glossary.
3.1.36
Symmetric Encryption
mechanism used by Symmetric Cryptography for encrypting and decrypting data with a
cryptographic key shared by two entities
3.1.37
SecurityGroup
Publisher(s) and Subscriber(s) that utilize a shared security context
Note 1 to entry: This context can include share keys.
IEC 62541-2:2026 © IEC 2026
3.1.38
Symmetric Signature
mechanism used by Symmetric Cryptography for signing data with a cryptographic key shared
by two entities
Note 1 to entry: The signature is then validated by generating the signature for the data again and comparing these
two signatures. If they are the same then the signature is valid, otherwise either the key or the data is different from
the two entities.
3.1.39
TrustList
list of Certificates that an OPC UA Application has been configured to trust
3.1.40
Transport Layer Security
standard protocol for creating Secure Channels over IP based networks
3.1.41
X.509 Certificate
Certificate in one of the formats defined by X.509 v1, 2, or 3
Note 1 to entry: An X.509 Certificate contains a sequence of data items and has a Digital Signature computed on
that sequence. OPC UA only uses V3.
3.2 Abbreviated terms
AES Advanced Encryption Standard
CA Certificate Authority
CRL Certificate Revocation List
CSMS Cyber Security Management System
DNS Domain Name System
DSA Digital Signature Algorithm
ECDH Elliptic Curve Diffie-Hellman
ECDSA Elliptic Curve Digital Signature Algorithm
GDS Global Discovery Server
HMAC Hash-based Message Authentication Code
JSON JavaScript Object Notation
JWT JSON Web Token
NIST National Institute of Standard and Technology
PKI Public Key Infrastructure
RSA public key algorithm for signing or encryption, Rivest-Shamir-Adleman
SHA Secure Hash Algorithm (Multiple versions exist SHA1, SHA256,…)
SKS Security Key Server
SSL Secure Sockets Layer
TLS Transport Layer Security
TPM Trusted Platform Module
UA Unified Architecture
UACP Unified Architecture Connection Protocol
UADP Unified Architecture Datagram Protocol
URI Uniform Resource Identifier
XML Extensible Mark-up Language
IEC 62541-2:2026 © IEC 2026
3.3 Conventions for security model figures
The figures in this document do not use any special conventions. Any conventions used in a
particular figure are explained for that figure.
4 OPC UA security architecture
4.1 OPC UA security environment
OPC UA is a protocol used between components in the operation of an industrial facility at
multiple levels: from high-level enterprise management to low-level direct process control of a
device. The use of OPC UA for enterprise management involves dealings with customers and
suppliers. It can be an attractive target for industrial espionage or sabotage and can also be
exposed to threats through untargeted malware, such as worms, circulating on public networks.
Disruption of communications at the process control could result in financial losses, affect
employee and public safety or cause environmental damage.
OPC UA will be deployed in a diverse range of operational environments with varying
assumptions about threats and accessibility, and with a variety of security policies and
enforcement regimes. OPC UA, therefore, provides a flexible set of security mechanisms.
Figure 1 is a composite that shows a combination of such environments. Some OPC UA
Applications are on the same host and can be easily protected from external attack. Some OPC
UA Applications are on different hosts in the same operations network and can be protected by
the security boundary protections that separate the operations network from external
connections. Some OPC UA Applications run in relatively open environments where users and
applications can be difficult to control. Other OPC UA Applications are embedded in control
systems that have no direct electronic connection to external systems. OPC UA also supports
multiple protocols and communication technologies, that can require different levels of security
and different security infrastructure. For example, both Client - Server and Publisher -
Subscriber communication is shown in Figure 1. OPC UA also defines global services such as
Certificate management, KeyCredential management, AuthorizationService, and
GlobalDiscoveryServer (GDS) to help manage security and other glob
...