IIC Journal of Innovation 7th Edition | Page 58

Evaluating Security of IIoT Testbeds configured from engineering workstations (Manufacturing Operation DMZ). The threat model in Figure 5 provides helpful automated information regarding threats. However, some details such as the existence of multiple owners and operators of the trust boundaries are not currently within the scope of STRIDE. Figure 6 provides a more detailed view of the OT aspects of the testbed. The sensors and actuators have instrumentation elements that directly connect to and control the manufacturing process. These devices are controlled by Process Control Systems in the Supervisory and Control Network. In the detail for the OT side, Figure 6 displays the functionality of the IoT gateway as the main security component in OT, protecting the edge devices and procuring the connectivity to the cloud. Figure 5 describes the threat analysis conducted using STRIDE methodology. In this model, the testbed provides information about the endpoints, data stores, and how data is transferred across the trust boundaries. Figure 6: STRIDE model for OT IIC Journal of Innovation - 57 -