IIoT security core building blocks

The IIC has defined a security framework that consists of several overlapping building blocks, including endpoint (edge to cloud) protection, communications and connectivity protection, security monitoring and analysis, and security configuration and management. These are surrounded by a data protection layer that is, in turn, surrounded by a security model and policy layer, as shown in the following diagram:

Figure 8.2: Building blocks of security

Protecting your IIoT infrastructure relies on taking the proper steps needed to protect physical components, related software components, and data.

The four core ...

Get Architecting the Industrial Internet now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.