September 2018
Intermediate to advanced
412 pages
11h 12m
English
Secure by design means designing software to be secure from the ground up. It is assumed that there will be bad actors who will try to hack the software, hence we should bake in the general guidelines, such as authentication, authorization, logging, monitoring, and so on, as part of the design. We will go into detail about different secure architectures in the following section.
Securing an IIoT application is an ongoing activity and is fundamentally about protecting the applications and services that make up the IIoT application, while protecting your sensitive data. Security should include design and architecture, in addition to fixing the issues identified on an ongoing basis.