Industrial Internet Security Framework v 1.0 | Page 105

Security Framework
11 : Security Configuration and Management
11 SECURITY CONFIGURATION AND MANAGEMENT
Changes to the environment and the discovery of new vulnerabilities and threats will require updates to policy , firmware and software , so the security features of an Industrial Internet of Things system must be configurable and manageable , not statically defined . In addition , the deployed versions must be carefully controlled , configured and managed .
Periodic security compliance reports are often mandated and certainly advisable . Network and endpoint configurations should be analyzed periodically to report deviations from all relevant policies and to summarize compliance postures .
Figure 11-1 : Functional Breakdown for Security Configuration and Management
Security management must determine the security objectives of the system to be managed . These security objectives should identify the techniques to be used to ensure the confidentiality of information , the integrity of the endpoint and communications , and the availability of the system functions required for management .
11.1 SECURE OPERATIONAL MANAGEMENT VS . SECURITY MANAGEMENT IIoT system management has two related concerns .
Operational management is the configuration of the operational functionality of the system and its endpoints , including provisioning , operating system settings , physical and logical network settings , and the application configurations for the operational process .
IIC : PUB : G4 : V1.0 : PB : 20160926 - 105 -