Industrial Internet Security Framework v 1.0 | Page 84

Security Framework 9: Protecting Communications and Connectivity transport level with TLS or DTLS) may not provide sufficient security for application-level traffic that requires fine-grained security controls. 9.1.2 BUILDING BLOCKS FOR PROTECTING EXCHANGED CONTENT Where possible, information exchange security among communicating endpoints for sensitive networks and equipment should employ: • • • • explicit endpoint communication policies, cryptographically strong mutual authentication between endpoints, authorization mechanisms that enforce access control rules derived from the policy and cryptographically backed mechanisms to ensure confidentiality, integrity and freshness of exchanged information A first step in establishing secured communication is mutual authentication using cryptographically backed authentication protocols (i.e., by exchanging identity certificates, if a public-key infrastructure is set up). The parties must then exchange data according to the access control rules defined in the policy. For example, an endpoint collecting medical metrics that has been deemed authentic may not be permitted to share some patient data. Confidentiality and integrity of exchanged messages should be achieved using standard techniques for encryption (i.e., symmetric algorithms such as AES and asymmetric algorithms such as RSA) and message authentication (i.e., digital signature schemes such as DSA and message authentication codes such as HMAC). These techniques often use cryptographic keys established during the mutual authentication process; encryption without message authentication should be avoided. Communication protocols that do not provide integrity and confidentiality of exchanged messages could be routed through encrypted and authenticated tunnels or otherwise be contained by information flow control techniques. This improves security of legacy protocols. 9.1.3 CONNECTIVITY STANDARDS AND SECURITY A core connectivity technology, as defined in ‘Industrial Internet of Things, Volume G5: Connectivity Framework’ 1, should: • • • • 1 be an open standard with strong independent, international governance, such as IEEE, IETF, OASIS, OMG, or W3C, be horizontal and neutral in its applicability across industries, be applicable, stable and proven across multiple industries and have standard-defined gateways to all other connectivity standards. See [IIC-IICF2017] IIC:PUB:G4:V1.0:PB:20160926 - 84 -