The IIC has defined a security framework that consists of several overlapping building blocks, including endpoint (edge to cloud) protection, communications and connectivity protection, security monitoring and analysis, and security configuration and management. These are surrounded by a data protection layer that is, in turn, surrounded by a security model and policy layer, as shown in the following diagram:
Figure 8.2: Building blocks of security
Protecting your IIoT infrastructure relies on taking the proper steps needed to protect physical components, related software components, and data.
The four core building blocks are defined as follows:
- Endpoint (edge-to-cloud components) protection, including defensive capabilities such as physical security, cyber security, and authoritative security
- Communications and connectivity protection based...