Book Image

Industrial IoT for Architects and Engineers

By : Joey Bernal, Bharath Sridhar
Book Image

Industrial IoT for Architects and Engineers

By: Joey Bernal, Bharath Sridhar

Overview of this book

When it comes to using the core and managed services available on AWS for making decisions about architectural environments for an enterprise, there are as many challenges as there are advantages. This Industrial IoT book follows the journey of data from the shop floor to the boardroom, identifying goals and aiding in strong architectural decision-making. You’ll begin from the ground up, analyzing environment needs and understanding what is required from the captured data, applying industry standards and conventions throughout the process. This will help you realize why digital integration is crucial and how to approach an Industrial IoT project from a holistic perspective. As you advance, you’ll delve into the operational technology realm and consider integration patterns with common industrial protocols for data gathering and analysis with direct connectivity to data through sensors or systems. The book will equip you with the essentials for designing industrial IoT architectures while also covering intelligence at the edge and creating a greater awareness of the role of machine learning and artificial intelligence in overcoming architectural challenges. By the end of this book, you’ll be ready to apply IoT directly to the industry while adapting the concepts covered to implement AWS IoT technologies.
Table of Contents (19 chapters)
1
Part 1:An Introduction to Industrial IoT and Moving Toward Industry 4.0
6
Part 2: IoT Integration for Industrial Protocols and Systems
11
Part 3:Building Scalable, Robust, and Secure Solutions

OT cybersecurity best practices

We want to list some of the industry-leading best practices regarding OT cybersecurity. These are by no means exhaustive, and the nature of adoption depends on each solution and its implementation:

  • The strong presence of a continuous security program
  • Commitment from all stakeholders to uphold the best practices for security
  • Knowledge sharing and security training for all stakeholders
  • Standard network design with structure documentation
  • Clear inventory of assets and a program to refresh them periodically (hardware and software)
  • High availability and resilience by design
  • The DMZ is the only mechanism for data traversal from IT to OT networks and vice versa
  • Application of specific tools for the five CSF processes of identification, protection, detection, response, and recovery
  • Use of logical network segmentation and isolation where possible
  • Implementation of multi-factor authentication, zero-trust, and defense...