July 2018
Intermediate to advanced
324 pages
9h 31m
English
In this chapter, we discussed multiple security controls for a cloud service to meet the industrial grade of trustworthiness. Table 6.2 provides an assessment matrix that can be used in conjunction with cloud security standards compliance to evaluate the security readiness of an IIoT cloud service:

As an illustration of the use of the table, Table 6.3 shows the mapping of the published security capabilities (at the time of writing) of the Predix IIoT platform in the security assessment matrix (PDX-BRF):
Read now
Unlock full access