The IIC has defined a security framework that consists of several overlapping building blocks, including endpoint (edge to cloud) protection, communications and connectivity protection, security monitoring and analysis, and security configuration and management. These are surrounded by a data protection layer that is, in turn, surrounded by a security model and policy layer, as shown in the following diagram:
Protecting your IIoT infrastructure relies on taking the proper steps needed to protect physical components, related software components, and data.
The four core ...