Beckhoff TwinCAT Scope
Industrial Ethernet Book Issue 104 / 3
Request Further Info   Print this Page   Send to a Friend  

Secure Configuration and Operation of OPC UA

THE OPC FOUNDATION HAS PUBLISHED a set of practical guidelines for the secure configuration and use of OPC UA in industry.

Rapid growth in the networking and digitization of industrial systems has introduced a host of new security challenges that must be addressed systematically to be effectively mitigated. In particular, beyond the need for implementing secure network infrastructures, it is essential to protect product and production data moving throughout the systems. Device vendors, engineers, and system integrators need to ensure they use these technologies in a secure way. While industry acknowledges the need for data security, OT and IT professionals alike are often unsure on how to best get started.

"Currently, users and developers are overwhelmed with making security decisions during their daily job. Incorrect use of security features causes many security vulnerabilities, due to difficulties to use software and a lack of security knowledge. Documentation, tutorials, and good examples are often missing", said Dr.

Eric Bodden, professor of Software Engineering at Paderborn University and director of Software Engineering at Fraunhofer IEM.

The OPC Foundation established a security user group. The aim of this group is to develop best practices and guidelines for typical OPC UA security use cases.

The document is available on the OPC Foundation website (

News from OPC Foundation.

Source: Industrial Ethernet Book Issue 104 / 3
Request Further Info    Print this Page    Send to a Friend  


WoMaster Embedded Smart City Box
Analog Devices: Time Sensitive Networking
DINSpace fiber optic and Cat 6 patch panels
embedded world 2019

Get Social with us:

© 2010-2019 Published by IEB Media GbR · Last Update: 17.01.2019 · 30 User online · Privacy Policy · Contact Us