Industrial Internet Security Framework v 1.0 | Page 36
Security Framework
6: Permeation of Trust in the IIoT System Lifecycle
6 PERMEATION OF TRUST IN THE IIOT SYSTEM LIFECYCLE
A typical Industrial Internet of Things (IIoT) system is a complex assembly of system elements.
The trustworthiness of the system depends on trust in all of these elements, how they are
integrated and how they interact with each other. Permeation of trust is the hierarchical flow of
trust within a system from its overall usage to all its components.
Each IIoT system has a unique permeation of trust. Each element has actors (designers,
developers, manufacturers, operators etc.) that execute the various roles in the creation,
integration and usage of the hardware and software of an IIoT system. These roles cut across
multiple organizations, each with its own interests.
Permeation of trust cuts across the complete system lifecycle, not only operation. It depends on
the integrity of the chain of custody of each element of the system and its data. Everything from
supply chain, commissioning, provisioning, regular usage and end-of-life decommissioning must
be carefully monitored to ensure the initial trustworthiness is preserved throughout.
6.1
SYSTEM LIFECYCLE
Figure 6-1 shows the permeation of trust from an industrial operator, such as a hospital or a
nuclear power plant, throughout the hardware and software that makes up the system. This trust
should be explicitly described, verified, controlled and supervised and not be based only on the
reputation of the vendor, without validation that the trust is warranted.
Figure 6-1: Permeation of Trust
The trust lifecycle starts with the specification of requirements that result in the delivery of
capabilities. The assurance that these capabilities meet the stated requirements becomes the
basis of trust in the system.
IIC:PUB:G4:V1.0:PB:20160926
- 36 -