This chapter presented an actionable roadmap to implement the multi-layered IIoT security model. Readers are now able to utilize practical insights on securing IIoT life cycle processes, security roles and responsibilities, the various elements of an IIoT security governance program, and how an organization can implement a practical and adaptive security governance program. The necessity of right-sizing security by setting the IIoT security objectives in the context of safety and reliability, an introduction to the security maturity model, and an evaluation of security roles were also discussed in this chapter.
In Chapter 8, IIoT Security Using Emerging Technologies, a few promising technologies that are still in the early phases of development are presented to help readers gain a basic understanding of their relevance and applicability.