Industrial Internet Security Framework v 1.0 | Page 47
Security Framework
7: IISF Functional Viewpoint
Security model and policy governs how security is implemented and the policies that ensure
confidentiality, integrity and availability of the system throughout its lifecycle. It orchestrates
how all the functional elements work together to deliver cohesive end-to-end security.
We describe each of these functional building blocks and their interactions in this chapter. The
specific implementation details, including security mechanisms and techniques, are covered in
the implementation viewpoint, chapters 8 to 11.
7.2
IIOT SYSTEM, IIRA FUNCTIONAL VIEWPOINT AND IISF FUNCTIONAL VIEWPOINT
The functional viewpoint in ‘Industrial Internet Reference Architecture’ (IIRA, [IIC-IIRA2016])
describes the functional building blocks in the architecture of an IIoT system, how they interact
and how they interface with the outside world. They include actuators and sensors and are
connected to the physical assets at the edge, and optional business domain elements in the cloud
(shown in blue as the middle layer of Figure 7-2).
These functional building blocks are implemented end-to-end from the edge to the cloud and
supported by connectivity spanning both OT and IT (shown in purple). 1 As shown by the top layer
with red contour, the IISF building blocks address security end-to-end across all the functional
domains described in the IIRA.
1
Although cloud deployment is called out, IIC does not endorse any specific deployment model and actual
deployment of applications can occur anywhere in an IIoT architecture.
IIC:PUB:G4:V1.0:PB:20160926
- 47 -