Industrial Internet Security Framework v 1.0 | Page 35
Security Framework
5: Managing Risk
Managing IIoT security involves coordinated action within the organization, and focus on rapid
response to ensure timely execution of security tasks.
Figure 5-1 Trustworthiness Management Considerations
There is considerable complexity in orchestrating security responses, and the problem space
quickly becomes a multidimensional challenge. Security measures should be able to adapt as
needed to continually changing threats and system configurations (adaptivity), provide
responses that will minimize the impact on the IIoT system if a security threat does materialize
(responsivity), and enable different organizations work together to ensure the early identification
of security threats (cooperativity). 1
Security must be adaptable to maintain effectiveness over time. Security management must
adapt to the changes in the environment, new threats to which the system is exposed, and new
vulnerabilities that are found. Threats should be dealt with before they materialize.
To achieve this, management, engineering, operations and human resources need to cooperate
continually. In addition to choosing the improvements to make based on systematically
identifying the new threats and other changes to which the system is exposed and assessing the
risks they present, they must establish improvement practices for cyberspace, physical space,
and operational management, and formulate implementation plans based on these
improvement practices. An important factor in this work is risk assessment.
Formulation of a rapid response when an incident occurs, based on an assessment of the scope
of the security threat, is important to protect systems and minimize damage.
1
See [HIT-ISA-65-5] and [IEC-FOTF]
IIC:PUB:G4:V1.0:PB:20160926
- 35 -