O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IIoT security guidelines

Protecting the IoT, including IIoT deployment, is often seen as being in the national interests of a country. This has led to many of the standards from around the world, which we will describe in the next chapter.

In the United States, the US Department of Homeland Security (DHS) (https://www.dhs.gov/securingtheIoT) stepped in to also provide guidelines regarding securing the IoT. The DHS defined the seven strategic principles for securing the IoT:

  • Incorporate security at the design phase
  • Promote security updates and vulnerability management
  • Build on recognized security practices
  • Prioritize security measures according to potential impact
  • Promote transparency across IoT
  • Connect carefully and deliberately

The strategic ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required