Industrial Internet Security Framework v 1.0 | Page 58
Security Framework
•
•
7: IISF Functional Viewpoint
system and ensuring that it is enforced system-wide via the Network Configuration &
Management function.
Monitoring & Analysis Security Policy is the function block responsible for defining and
communication the security policy for all monitoring and analysis activities in the IIoT
system and making sure that it is enforced system-wide via the Monitoring & Analysis
function.
Configuration & Management Security Policy is responsible for setting and
communicating the security policy for the processes and controls associated with
configuration change and management in the IIoT system. The Security Management
capability is responsible for ensuring that this policy gets communicated to all the
endpoints and communications capabilities of the system.
The Security Policy includes policies for the system and sub-policies for the endpoint protection,
communications and connectivity protection, security monitoring and analysis, security
configuration and management and data protection (see individual sections 7.3 to 7.7). The
system threat analysis enables the creation of the security objectives for the system, derived
from regulations and standards. From these objectives, the applicable security policies are
selected based on the industry vertical, customer base, geographic location and other
considerations. The security policy describes the overall business-risk considerations and defines
the guidelines for securing the day-to-day proper functioning of the system. This policy is then
transformed into a security model, and determines and drives requirements to the functionality
of the building blocks of the security framework. For example, each machine-level security policy
specifically covers the security policies associated with the endpoint and the devices it may be
connected to or in control of.
7.9
FROM FUNCTIONAL TO IMPLEMENTATION VIEWPOINT
The functional viewpoint presented the six key building blocks for IIoT security. These functions
serve as guidance for implementing security end-to-end across IIoT systems in the context of
trustworthiness. A set of security design principles should guide the capabilities and techniques
employed in the implementation viewpoint of a specific implementation.
As per Saltzer and Schroeder, 1 implementers should consider eight design principles prior to
implementation of security capabilities for their IIoT system:
•
•
•
1
Principle of economy of mechanism: keep the design as simple and small as possible.
Principle of fail-safe defaults: base access decisions on permission rather than exclusion.
Principle of complete mediation: every access to every object must be checked for
authority.
See [Saltzer1974]
IIC:PUB:G4:V1.0:PB:20160926
- 58 -