The Industrial Internet Security Framework: A security framework built [PDF]

Sep 30, 2016 - Global cooperation is essential to protect the industrial internet, and developing the Industrial Interne

4 downloads 30 Views 173KB Size

Recommend Stories


The Security Policy Framework
Life is not meant to be easy, my child; but take courage: it can be delightful. George Bernard Shaw

E Security Assurance Framework
If your life's work can be accomplished in your lifetime, you're not thinking big enough. Wes Jacks

Spring Security Framework
If you are irritated by every rub, how will your mirror be polished? Rumi

the icas information security framework
When you talk, you are only repeating what you already know. But if you listen, you may learn something

Application and Data Security Framework
No amount of guilt can solve the past, and no amount of anxiety can change the future. Anonymous

Final Credentialing Security Framework[1]
The butterfly counts not months but moments, and has time enough. Rabindranath Tagore

Final Credentialing Security Framework[1]
Come let us be friends for once. Let us make life easy on us. Let us be loved ones and lovers. The earth

A Framework for Aviation Cyber Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

The Governing Framework for Global Health Security
Come let us be friends for once. Let us make life easy on us. Let us be loved ones and lovers. The earth

Internet Security
Your task is not to seek for love, but merely to seek and find all the barriers within yourself that

Idea Transcript


Industrial Internet Consortium Home Archives About 09/30/2016

The Industrial Internet Security Framework: A security framework built on cooperation by Dr. Jesus Molina, Security Consultant, Fujitsu Attacks to industrial sites will not be a local affair in the industrial internet, but an international one. Global cooperation is essential to protect the industrial internet, and developing the recently published Industrial Internet Security Framework (IISF) required intense collaboration from many contributors around the world. It was not easy, and it didn’t happen overnight. One of the main reason IISF required years to complete, is our promise to listen to everyone willing to work with us, and to be inclusive of many views: OT, IT, academia… you name it. We received hundreds of comments in each draft of the document, from companies and institutions across the world. In the process, we realized it was essential to get it right rather than rush the document out. But many drafts later, we believe the final document provides a comprehensive and balanced view on how to secure current and future industrial systems. Is also a living document, and we are already working in the next version. When asked what is the distinctive feature of this framework, my answer is the unprecedented collaboration during its development. In this blog I can provide for you two examples, our cooperation with NIST in the USA and with Industrie 4.0 in Germany, but we are also working with many more institutions around the world. NIST and Industrie 4.0 Trustworthiness is the new word du jour in the IoT. The National Institute of Standards and Technology (NIST) held a two-day workshop on August 30 and 31 focusing on it: “Exploring the Dimensions of Trustworthiness: Challenges and Opportunities”. With distinguished attendees like Vint Cerf (aka as the internet codaddy), Tony Scott (the white house CIO) and the Secretary of Cyber Policy for the Department of Homeland Security, this is no doubt an essential topic. We covered trustworthiness in my previous blog, and trustworthiness is also covered in the IISF. This is no coincidence: the IIC has been cooperating with NIST, sharing a common vocabulary and building on the Cyber Physical Systems (CPS) architecture to structure our evaluation of IIoT systems. In the European side, the German platform for manufacturing in the industrial internet, Industrie 4.0 and the IIC are also cooperating. In the security front, we have hold several calls to evaluate the path going forward, and with the release of the IISF we could start bringing the knowledge and experience in the manufacturing by the Industrie 4.0 membership. As part of the IIC quarterly meeting in Germany, we had a whole day of presentations to coordinate our activities. The IISF in context The IISF complements the currently released documents from both institutions. NIST released the CPS architecture, focusing on the evaluation of CPS systems based on multiple characteristics that require evaluation. The IISF complements this evaluation by creating functional building blocks in security, that can be evaluated from each characteristic. In the other hand, Industrie 4.0 are focused on securing a specific vertical, manufacturing, and such provide an in-depth exploration of particular topics that correspond to the IISF functional building blocks. For example, while building a IIoT deployment, the identity building block in endpoints can be cross evaluated with a privacy framework or any other characteristic that becomes relevant to a specific CPS trustworthy deployment. Consequently, an automotive deployment should leverage strong identities with privacy, for example following the 1609.2 standard to anonymize identities. At the same time, if the deployment is on manufacturing the Industrie 4.0 Secure Identities provides important information for implementation. Conclusion The IIC membership spans 250 members from 30 countries, including enterprise, national bodies and academia. We also have liaisons with other organizations committed to security that provided invaluable input that made the IISF possible. As such, this framework is the combined effort of many experts from all security areas, providing a balanced view and guidance that complements other efforts, including the documents released by NIST and Industrie 4.0. This security framework required many contributions, patience and testing to get it right. All parallel efforts to protect the industrial internet need to converge, and we expect the IISF to complement the ecosystem of security documents for a comprehensive protection of industrial systems. And I agree, the Industrial IoT is inching towards a consensus on security. The Industrial Internet Security Framework is free and available here. Additional Resources: Learn more at the upcoming Industrial Internet Security Forum. Download the Industrial Internet Security Framework. Read the Business Viewpoint for Securing the Industrial Internet (Whitepaper).

0

18

12

1

53

Posted at 12:30 PM in Security | Permalink Reblog (0) Comments Verify your Comment Previewing your Comment Posted by: | This is only a preview. Your comment has not yet been posted. Post Edit Your comment could not be posted. Error type: Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment The letters and numbers you entered did not match the image. Please try again. As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments. Having trouble reading this image? View an alternate.

Type the text Privacy & Terms

Continue Industrial Internet Consortium Powered by Typepad

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.