O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security considerations for the usage viewpoint

Following are the security considerations for implementing the usage viewpoint:

  • Security monitoring continuously collects security-related data from events or activities, and analyzes it for security risks
  • Security auditing collects, stores, and analyzes security-related information
  • Security policy defines the usage and constraints for each user, role, and component
  • Cryptographic support management stores, manages, grants, and revokes secure credentials, and provides global key management

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required