Industrial Internet Security Framework v 1.0 | Page 37

Security Framework 6: Permeation of Trust in the IIoT System Lifecycle System owners and operators instigate the building of trust by specifying trust-related requirements as part of the operational system requirements. These requirements are then issued to the system builders as part of the system specification. System builders in turn break them down into specific trust requirements for each of the components of the system. Component builders respond to these requirements by delivering components that meet the specified requirements. Compliance of the delivered component capabilities to their specifications is a part of assurance performed by the vendors prior to delivery, by system builders on receipt and probably by (potentially independent) third-party agencies. System builders are responsible for integrating all the assured components and assuring that together, they meet the specified requirements for the integrated system. The delivered system capabilities are verified and assured in the operational context by the owner/operator, or an independent third party. Once operational assurance is achieved, trust is initiated in the system and permeates down from the owner/operator to the component builders via the system builders. Figure 6-2: Trust Relationship between Actors Trust flows down from the owner/operator to all parts of the system but trust must be built from the bottom up. Figure 6-2 also shows the case where the owner/operator may assign the overall operation management of the system to a third party. Either way, the owner/operator is responsible for ensuring the delivered system continues to deliver its business purpose while meeting operational requirements and maintaining stated levels of trustworthiness. IIC:PUB:G4:V1.0:PB:20160926 - 37 -