Industrial Internet Connectivity Framework | Page 32

Connectivity Framework
4: Connectivity Framework Layer
• ensure data integrity and trustworthiness of the data delivery, so that received data is not tampered with while stored or in transit and
• selectively encrypt sensitive data flows.
This last point is important, since certain high volume data flows may not be sensitive enough to warrant the extra overhead of encrypting and decrypting the data. The decision to encrypt should be based on a risk-impact assessment.
The connectivity framework access-control-model should be sufficiently fine-grained to limit the permissions of each endpoint narrowly to the operations and services needed for performing their intended functions. This enables the application of the principle of least privilege that is essential to limit the consequence of security breaches and insider attacks.
The connectivity framework security mechanisms should provide secure logging and auditing capabilities to detect security attacks and assess their consequences.
For more details, please refer to the Industrial Internet Security Framework( IISF) 1. 4.1.12 API
IIoT systems involve multiple software components, developed by multiple parties over time, with a variety of programming languages. Therefore, IIoT software development requires an Application-Programming Interface( API) to support the design and implementation of application-specific data exchanges.
Some connectivity frameworks provide standardized APIs in various programming languages( e. g. C, C ++, C #, Java, Python, Lua, Javascript, and so on), to ease the portability of application code from one implementation to another and to decouple the application from the framework implementation. Others define a protocol interface, and let the implementers define the programming API. This makes it harder to switch implementations, but allows the APIs to be customized to taste.
4.1.13 GOVERNANCE
A connectivity framework should provide a means to configure, administer, and monitor its operation. These include all aspects of the connectivity framework functions, including data types, data quality of service, data security policies, resource management, and timing.
Some connectivity framework standards define the mechanisms for configuration, and administration. Others do not standardize on the mechanisms and leave it up to the implementations. Mechanisms may be file based or API based or both.
Monitoring is useful for diagnostics and troubleshooting of an operational IIoT system. It should be configurable to the desired level of detail. Connectivity framework standards may define the mechanisms for monitoring or may leave them up to the implementations.
1
See [ IIC-IISF2016 ] IIC: PUB: G5: V1.0: PB: 20170228- 32-