Evaluating Security of IIoT Testbeds
configured from engineering workstations
(Manufacturing Operation DMZ).
The threat model in Figure 5 provides helpful
automated information regarding threats.
However, some details such as the existence
of multiple owners and operators of the
trust boundaries are not currently within the
scope of STRIDE. Figure 6 provides a more
detailed view of the OT aspects of the
testbed.
The
sensors
and
actuators
have
instrumentation elements that directly
connect to and control the manufacturing
process. These devices are controlled by
Process Control Systems in the Supervisory
and Control Network.
In the detail for the OT side, Figure 6 displays
the functionality of the IoT gateway as the
main security component in OT, protecting
the edge devices and procuring the
connectivity to the cloud.
Figure 5 describes the threat analysis
conducted using STRIDE methodology. In
this model, the testbed provides information
about the endpoints, data stores, and how
data is transferred across the trust
boundaries.
Figure 6: STRIDE model for OT
IIC Journal of Innovation
- 57 -