Industrial Internet Security Framework v 1.0 | Page 47

Security Framework 7: IISF Functional Viewpoint Security model and policy governs how security is implemented and the policies that ensure confidentiality, integrity and availability of the system throughout its lifecycle. It orchestrates how all the functional elements work together to deliver cohesive end-to-end security. We describe each of these functional building blocks and their interactions in this chapter. The specific implementation details, including security mechanisms and techniques, are covered in the implementation viewpoint, chapters 8 to 11. 7.2 IIOT SYSTEM, IIRA FUNCTIONAL VIEWPOINT AND IISF FUNCTIONAL VIEWPOINT The functional viewpoint in ‘Industrial Internet Reference Architecture’ (IIRA, [IIC-IIRA2016]) describes the functional building blocks in the architecture of an IIoT system, how they interact and how they interface with the outside world. They include actuators and sensors and are connected to the physical assets at the edge, and optional business domain elements in the cloud (shown in blue as the middle layer of Figure 7-2). These functional building blocks are implemented end-to-end from the edge to the cloud and supported by connectivity spanning both OT and IT (shown in purple). 1 As shown by the top layer with red contour, the IISF building blocks address security end-to-end across all the functional domains described in the IIRA. 1 Although cloud deployment is called out, IIC does not endorse any specific deployment model and actual deployment of applications can occur anywhere in an IIoT architecture. IIC:PUB:G4:V1.0:PB:20160926 - 47 -