Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 758

OPC UA

What is OPC UA?

OPC UAOPC Unified Architecture, a service-oriented industrial protocol with built-in authentication and encryption used to exchange semantic data across OT and IT systems.


OPC UA (Unified Architecture, IEC 62541) is the modern successor of classic OPC and the dominant secure interoperability standard in industrial automation. It exposes a semantic, object-oriented information model and supports both client-server and pub-sub interactions over TCP, HTTPS, or MQTT, making it suitable for everything from field-level devices to cloud analytics. Unlike Modbus or DNP3, OPC UA includes X.509 certificate-based authentication, role-based authorization, message signing, and AES encryption by default. Misconfigurations remain a risk: anonymous endpoints, weak certificate validation, exposed discovery services, and outdated stacks have been exploited in penetration tests and real attacks, so secure deployment requires a strong PKI and explicit security policies.

Examples

  1. 01

    An MES querying tag values from PLCs through an OPC UA server using signed and encrypted sessions.

  2. 02

    A cloud analytics platform receiving production data over OPC UA pub-sub via MQTT.

Frequently asked questions

What is OPC UA?

OPC Unified Architecture, a service-oriented industrial protocol with built-in authentication and encryption used to exchange semantic data across OT and IT systems. It belongs to the OT / ICS / IoT category of cybersecurity.

What does OPC UA mean?

OPC Unified Architecture, a service-oriented industrial protocol with built-in authentication and encryption used to exchange semantic data across OT and IT systems.

How does OPC UA work?

OPC UA (Unified Architecture, IEC 62541) is the modern successor of classic OPC and the dominant secure interoperability standard in industrial automation. It exposes a semantic, object-oriented information model and supports both client-server and pub-sub interactions over TCP, HTTPS, or MQTT, making it suitable for everything from field-level devices to cloud analytics. Unlike Modbus or DNP3, OPC UA includes X.509 certificate-based authentication, role-based authorization, message signing, and AES encryption by default. Misconfigurations remain a risk: anonymous endpoints, weak certificate validation, exposed discovery services, and outdated stacks have been exploited in penetration tests and real attacks, so secure deployment requires a strong PKI and explicit security policies.

How do you defend against OPC UA?

Defences for OPC UA typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for OPC UA?

Common alternative names include: OPC Unified Architecture, IEC 62541.

Related terms