KEYnote 33 English - Spring 2017 - Page 12

INFORMATION

OPC UA and CodeMeter

OPC Unified Architecture ( UA ) is increasingly establishing itself as the accepted standard in the automation industry . The open IEC 62541 standard guarantees platform independence , object orientation , and type safety , and now adds IT security as another technological cornerstone . It is completely interoperable from the smallest device to enterprise-level IT , and even cloud solutions . As a world-leading protection and licensing technology , CodeMeter is an ideal partner for OPC UA , storing keys and certificates in secure hardware and adding not just greater security , but also new business opportunities with licensing for OPC UA devices .
OPC UA Client Application Layer
■ User Authorization
■ User Authentication
Communication Layer
■ Confidentiality
■ Integrity
■ App Authentication
OPC UA offers exceptional security on the protocol level
OPC UA is more than a communication protocol . The open standard covers :
■■ Confidentiality : Encrypting data
■■ Integrity : Signing data
■■ Application authentication
■■ User authentication
■■ User authorization
■■ Auditing
■■
Availability
Session
Secure Channel
Transport Layer
OPC UA Server Application Layer
■ User Authorization
■ User Authentication
Communication Layer
■ Confidentiality
■ Integrity
■ App Authentication
Source : OPC Foundation
It offers authentication on the transport layer , with X . 509 certificates and trust managed with a public key infrastructure . OPC UA also guarantees top security during data transmission .
Broad support OPC UA has won extensive support e . g . from the Industrial Internet Consortium ( IIC ) the Chinese Alliance Industrial Internet ( AII ), and Plattform Industrie 4.0 . Germany ’ s Federal Office of Information Security has evaluated its security . It will not be the only standard accepted around the world , as e . g . DDS by Object Management Group ( OMG ) is also available and as its use depends on the specific application .
Endpoint security In a connected world , all endpoints need to be secure , whether they are sensors or actuators , controllers , or historians in the cloud .
Cloud Computing
Computational Network ( Core , Fog )
Edge
The Industrial Internet Security Framework ( IISF ) published in September 2016 describes the many elements of endpoint protection .
Holistic security does not stop at the protocol layer
In addition to communication , the security of endpoints is just as important .
Endpoints are where operating systems , libraries , drivers , and applications are exposed
12