Industrial Internet Security Framework v 1.0 | Page 110

Security Framework 11: Security Configuration and Management To limit the risks of cross-contamination between operational and security concerns, different teams, with different roles and responsibilities, should each have the minimum level of access possible for any particular operation. The security management platform should balance security and the other key system characteristics. 11.4.2 POLICY AUTHORING AND DEFINITION Security policy is assigned to an endpoint or a group of them. The policy should be composite in nature. Creating baseline policies simplifies applying them to many endpoints in complex IIoT systems. The baseline policy is then adjusted for individual endpoints or groups of endpoints, eliminating the need to rebuild the entire policy each time. Providing a consistent policy format, and enabling the endpoints to interpret the policy eases identifying security gaps. It must be possible for a person to understand how the security is expected to behave, based on regulatory or organizational policy, and translate that into machine policy settings. There are at least two places where security must be simplified for human understanding: policy definition and the results of the event analysis. Policy definition begins with a person defining the desired behaviors in the IIoT environment. These are then translated into security settings that are stored in the machine policy sent to the endpoint. Event analysis begins with security events being sent from the endpoint to an adequately secure location for analysis. That may trigger alarms and generate notifications in the form of dashboards, UI alerts, email notifications and reports. A person must be able to initially define the organizational security policy in terms of machine policies. Applying appropriate updates to the security policy based on security event analysis creates a feedback loop by which the security can be maintained (or even increased) over time. It may be possible to automate this feedback loop. Figure 11-5: IIoT Management and Monitoring Feedback Loop The feedback loop in Figure 11-5 begins with pushing machine policy to the endpoints. The endpoints gather events based on the machine policy settings, especially violations to the security policy, and communicate the events out for security analytics. The security event data is correlated, alarms triggered when security thresholds are exceeded, and automated responses executed to mitigate the security events. The automated responses may be as simple as setting an alert on a dashboard or sending an email, or as complex as sending out new machine policy IIC:PUB:G4:V1.0:PB:20160926 - 110 -