Identity and access management
Trust underpins the reliability and resilience of M2CÂ communications.
Cloud-based IIoT deployments have a large attack surface prone to threats such as masquerade device identity, escalate privilege to compromise a device or application, snoop data in transit, send malicious data and control commands, and so on.
Devices and services must mutually authenticate to establish a trust relationship. Similarly, developers, applications, and users must also authenticate their identity before they can take action based on device data or send control commands. Roles and responsibilities of identity and access management are typically shared between the cloud vendor and the tenant or customer. For an IIoT deployment, identity, authentication, and authorization best practices include:
- Identity management using digital certificates and PKI infrastructure, federated identity schemes, and role and group-based identity and access. While many cloud vendors can generate device...