Industrial Internet Security Framework v 1.0 | Page 61

Security Framework 8: Protecting Endpoints Along with the building blocks for endpoints, two techniques that apply to all building blocks, isolation and cryptography, are described in this chapter. Cryptography Techniques is a discipline that embodies principles, means, and mechanisms for the transformation of data to hide its information content, prevent its undetected modification and prevent its unauthorized use. Concealment of resources sometimes uses Isolation Techniques (see section 8.12) to provide visibility only to those that have authorization. 8.1 SECURITY THREATS AND VULNERABILITIES ON ENDPOINTS Endpoints have many potential vulnerabilities susceptible to malicious or unintentional errors. Figure 8-2 shows a broad range of solutions stacks ranging from a bare metal application (left side) to a guest OS running in a virtual machine on a hypervisor (right side) that isolates applications in their respective containers. Each configuration has strengths and weaknesses that must be evaluated for each application. For example, bare metal applications generally have fewer security controls implemented, but run on more resource-constrained hardware. On the other hand, a hypervisor-based security solution requires more processing power, but can dedicate an entire virtualized instance to security. Figure 8-2: Threat and Vulnerabilities to IIoT Endpoints As shown in Figure 8.2, a broad range of threat and vulnerabilities exist in different facets of the endpoints in each of the following areas: IIC:PUB:G4:V1.0:PB:20160926 - 61 -