Industrial Internet Security Framework v 1.0 | Page 57

Security Framework 7: IISF Functional Viewpoint Figure 7-8: Functional Breakdown for Security Model and Policy The key functions provided in security model and policy are as follows: • • • • • • • System Threat Analysis function is responsible for performing the iterative and continuous process of identifying the threat capabilities, the threat’s possible access to the system and assessing the systems vulnerability to attack. System Security Objectives building block is responsible for setting the security objectives of the system in terms of the confidentiality, integrity, availability and accountability requirements for the system. These objectives serve to guide in the creation of the specific security policy for the IIoT system. Security Policy for the system is the living document that defines the processes, rules, security measures and controls to be enforced throughout the IIoT system. Security Model is the function that provides formal representation for specifying and enforcing the security policies for the IIoT system. Data Protection Security P