Elements of an IIoT security program
The security posture of an IIoT deployment depends on how safely it can weather instabilities during the operation phase. In spite of multiple layers of security checkpoints in the pre-operation phases, vulnerabilities do exist at runtime. In enterprise IT deployments, a security program provides well-orchestrated governance, protecting organizational assets and infrastructure from external and internal threats during the operational phase. Data availability, privacy, and integrity are the primary goals of an enterprise IT security program.
As we have already discussed in this book, the stakes in an IIoT deployment are much higher than enterprise IT. IIoT involves critical infrastructures and human safety. In addition to data availability, privacy, and integrity, an IIoT security program must ensure resilience and reliability in the event of an attack, which can be from external or internal adversaries, or due to inadvertent misconfigurations or natural...