O'Reilly logo

Architecting the Industrial Internet by Carla Romano, Robert Stackowiak, Shyam Nath

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IIoT security core building blocks

The IIC has defined a security framework that consists of several overlapping building blocks, including endpoint (edge to cloud) protection, communications and connectivity protection, security monitoring and analysis, and security configuration and management. These are surrounded by a data protection layer that is, in turn, surrounded by a security model and policy layer, as shown in the following diagram:

Figure 8.2: Building blocks of security

Protecting your IIoT infrastructure relies on taking the proper steps needed to protect physical components, related software components, and data.

The four core ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required