Industrial Internet Security Framework v 1.0 | Page 19
Security Framework
3: Key System Characteristics Enabling Trustworthiness
should be performed for normal and abnormal scenarios and examined as to whether an attacker
could purposely disrupt a combination of components.
Software must also be able to transfer over to alternate functionality, implementations,
configurations, locations or network segments that may have different weaknesses so the same
threats and hazards are not as disruptive to the replacement capabilities.1
3.6
PRIVACY
Privacy is the right of an individual or group to control or influence what information related to
them may be collected, processed, and stored and by whom, and to whom that information may
be disclosed.
Assurance of privacy depends on whether stakeholders expect, or are legally required, to have
information protected or controlled from certain uses. It is important to stay up to date with
regulations and standards, such as the new framework for transatlantic data flows called the EUUS Privacy Shield and the EU General Data Protection Regulation (GDPR) 2.
In the US, the Federal Trade Commission (FTC) maintains many guidelines that apply in
commercial environments. Rules apply to firms in healthcare, finance, education, auto sales,
direct marketing, entertainment and consumer credit. In each case, firms must abide by specific
guidelines. For example, in healthcare environments HIPAA 3 rules must be followed when
handling patient-related information.
Care needs to be taken to minimize the use of data and to address risks associated with
establishing the identity of parties when those identities should not be revealed. Identity might
be revealed through the examination of metadata associated with the party (fingerprinting) or
the correlation of data about the party. Integrating IIoT systems might increase this risk. Security
systems themselves might increase privacy risks by increasing the amount of data collected and
associated with a party.
Privacy risks may increase as industrial systems are interconnected with other systems that
contain sensitive data. For example, if a customer relationship management (CRM) system is
integrated with a manufacturing system then information about the items produced for certain
customers might be revealed through a security breach of either system. Additional risks may
involve the inappropriate sharing and distribution of information by third parties, should they
decide to share the sensitive data.
There are a number of frameworks that may apply, depending on regulation, but all may be
useful in understanding privacy effects on business models. Examples are GAPP from AICPA, PPTF
from OECD, FIPPS from FTC and ‘Regulation 2016/679’ from EU.4
See [NIST-800-160]
See [EU-GDPR]
3
See [HHS-HIPAA]
4
See [AICPA-GAPP], [OECD-PPTF], [FTC-FIPPS] and [EU-2016/679]
1
2
IIC:PUB:G4:V1.0:PB:20160926
- 19 -