Device considerations

When customized devices and sensors must be considered to provide the necessary metrics, the design phase assumes even more importance in minimizing the possibility of future security breaches. The hardware should be scoped to minimum requirements at access points such as I/O ports and should be made tamper proof. Secure software upgrade procedures for firmware and applications must also be planned.

In many situations, you will be faced with defining security measures around predefined devices that lack the features needed to put into place adequate security measures. In these situations, much of the focus often turns to securing field gateways at the edge to control unauthorized access from the outside world.

Many of ...

Get Architecting the Industrial Internet now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.