Industrial Internet Security Framework v 1.0 | Page 26

Security Framework 4: Distinguishing Aspects of Securing the IIoT Part II: The Business Viewpoint Effective business decision-making is an important component of industrial security programs. Security risks, as well as the costs and benefits of different defensive postures, should be communicated to business decision makers, especially as they are often unfamiliar with the details of security risks and countermeasures. IIoT system manufacturers, system integrators, owners and operators should establish and maintain a security program that provides governance, planning and sponsorship for the organization’s security activities. These activities should align with the overall business objectives and risk strategy of the organization. Such a security program should keep policies, mechanisms and associated security processes up-to-date in response to changes in business priorities and resource availability, new risks and new protection goals. Investment in IIoT systems and their operations must be protected against the risk of damage. This damage may include interruption or stoppage of operations, destruction of systems, and leaking sensitive business and personal data resulting in loss of intellectual property, harm to the business reputation, and loss of customers. But heightened security may lead to additional investment and greater times to deploy. It may affect user experience negatively. These additional costs must be justified to stakeholders by reference to the business risks they are taking and the costs saved by averting damages. Industrial systems security engineering protects systems from errors, mischance and malice by consistent, comprehensive and well-defined operational procedures and protection policies. These policies must be informed by protection goals, risk strategy and business priorities with protection mechanisms to realize them with high-assurance. An evaluation framework enables organizations to evaluate security capabilities consistently, communicate the capability levels meaningfully and prioritize security investments. (This framework is used internally and is different from a security audit.) Managing risk is an important goal of a security (and privacy) program. This often consists of deriving an adversary model, then evolving a threat model and finally defining the security controls and capabilities to manage the risk taking into account the lifetime of the system. These models and decisions should consider the parties with different roles in the system (i.e., equipment vendor, system integrator or operator). IIC:PUB:G4:V1.0:PB:20160926 - 26 -