July 2018
Intermediate to advanced
324 pages
9h 31m
English
A sustainable IIoT security implementation depends on the well-orchestrated efforts of various ecosystem partners and stakeholders. The preceding section of this chapter (Securing processes across the IIoT life cycle) discussed actionable steps to integrate security across IIoT life cycle processes. These processes are also linked to multiple roles; each role is associated with its respective security onus. Effective security governance depends on role-based accountability. This section dissects and evaluates security responsibilities based on four broad role categories. Figure 7.3 illustrates these broad roles as four pillars (Author's note: the diagram only presents the roles, not necessarily the relational ...
Read now
Unlock full access