The broad footprint of IIoT solutions can make securing these solutions challenging. Security considerations must extend from devices in the field at the edge to the data center and include the networking that ties them together.
In this chapter, we explored cybersecurity, including methods of attack, core building blocks, frameworks and guidelines, securing devices and the edge-to-the-cloud gateways, and securing backend services, and considered the scope that is covered in risk assessments and best security practices. We applied some of these techniques to the supply chain example.
You should now have gained an understanding as to where potential vulnerabilities might occur. You should also better understand how the components that are part of your architecture design can be secured.
Various compliance standards exist around the world that the IIoT architecture must...