Industrial Internet Security Framework v 1.0 | Page 8
Security Framework
Contents
Figure 10-2: Security Monitoring During Timeline ..................................................................................... 98
Figure 10-3: Security Monitoring Data Analysis Variants ......................................................................... 100
Figure 10-4: Security Monitoring Special Considerations ......................................................................... 102
Figure 11-1: Functional Breakdown for Security Configuration and Management.................................. 105
Figure 11-2: Secure Operational Management ........................................................................................ 106
Figure 11-3: Hierarchical Communications Channels ............................................................................... 108
Figure 11-4: Policy Relationship ................................................................................................................ 109
Figure 11-5: IIoT Management and Monitoring Feedback Loop .............................................................. 110
Figure 11-6: IIoT Identity Management Lifecycle ..................................................................................... 114
Figure 11-7: Endpoint Security Lifecycle ................................................................................................... 118
Figure 11-8: Flow of Management Data ................................................................................................... 120
Figure B-1: A Sample C2M2 Score Report................................................................................................. 137
TABLES
Table 8-1: Endpoint Objectives, Functions and Techniques (Chapter 8 Outline) ....................................... 60
Table 11-1: APIs for Interoperable Endpoint Security .............................................................................. 107
Table C-1: Cryptographic Techniques, their Objectives and Requirements ............................................. 139
Table C-2: Techniques and Processes for Enabling System Integrity........................................................ 140
Table C-3: Techniques and Processes for Enabling System Availability.................................................... 141
Table C-4: Techniques and Processes for Enabling System Confidentiality.............................................. 142
Table C-5: Techniques and Processes for Enabling System Access Control.............................................. 143
IIC:PUB:G4:V1.0:PB:20160926
- viii -