Book Image

Practical Industrial Internet of Things Security

By : Sravani Bhattacharjee
Book Image

Practical Industrial Internet of Things Security

By: Sravani Bhattacharjee

Overview of this book

Securing connected industries and autonomous systems is of primary concern to the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security directly ties to system reliability as well as human and environmental safety. This hands-on guide begins by establishing the foundational concepts of IIoT security with the help of real-world case studies, threat models, and reference architectures. You’ll work with practical tools to design risk-based security controls for industrial use cases and gain practical knowledge of multi-layered defense techniques, including identity and access management (IAM), endpoint security, and communication infrastructure. You’ll also understand how to secure IIoT lifecycle processes, standardization, and governance. In the concluding chapters, you’ll explore the design and implementation of resilient connected systems with emerging technologies such as blockchain, artificial intelligence, and machine learning. By the end of this book, you’ll be equipped with the all the knowledge required to design industry-standard IoT systems confidently.
Table of Contents (22 chapters)
Title Page
Copyright and Credits
Dedication
Packt Upsell
Foreword
Contributors
Disclaimer
Preface
I
I
Index

Understanding security roles


A sustainable IIoT security implementation depends on the well-orchestrated efforts of various ecosystem partners and stakeholders. The preceding section of this chapter (Securing processes across the IIoT life cycle) discussed actionable steps to integrate security across IIoT life cycle processes. These processes are also linked to multiple roles; each role is associated with its respective security onus. Effective security governance depends on role-based accountability. This section dissects and evaluates security responsibilities based on four broad role categories. Figure 7.3 illustrates these broad roles as four pillars (Author's note: the diagram only presents the roles, not necessarily the relational connections between these roles):

Figure 7.3: IIoT security responsibilities based on broad roles

Solution provider

Solution provider in Figure 7.3 is a generalized category representing providers of IIoT endpoint technologies, crypto solutions, software applications...