So far in this chapter, we have discussed the various concepts related to IIoT identity and access management. To put this concept into practice, certain key considerations and tools are presented in this section; they can be used to define an IAM strategy for a specific use case.
Managing identity and access control is costly and resource-intensive. Due to the heterogeneity and complexity of the associated technologies and platforms, an efficient and cost-effective IAM strategy must always be risk-based. In this section, the reader will find a few actionable steps to define IAM approaches for their IIoT use case:
- Identify the identity and access-related threats specific to the use case. The threat modeling and risk analysis methods described in Chapter 2, Industrial IoT Dataflow and Security Architecture, can be used for this purpose. The risk analysis needs to factor in threat scenarios in both OT and enterprise IT...