Industrial Internet Security Framework v 1.0 | Page 4

Security Framework Contents
Part III: The Functional and Implementation Viewpoints
7 IISF Functional Viewpoint................................................................................................ 46
7.1
Security Building Blocks..................................................................................................... 46
7.2
IIoT System, IIRA Functional Viewpoint and IISF Functional Viewpoint................................ 47
7.3
Endpoint Protection.......................................................................................................... 48
7.4
Communications and Connectivity Protection.................................................................... 50
7.5
Security Monitoring and Analysis....................................................................................... 52
7.6
Security Configuration And Management........................................................................... 53
7.7
Data Protection................................................................................................................. 55
7.8
Security Model and Policy.................................................................................................. 56
7.9
From Functional to Implementation Viewpoint.................................................................. 58
8 Protecting Endpoints....................................................................................................... 60
8.1
Security Threats and Vulnerabilities on Endpoints.............................................................. 61
8.2
Architectural Considerations for Protecting Endpoints........................................................ 63
8.2.1
Endpoint Security Lifecycle............................................................................................... 64
8.2.2
Hardware versus Software................................................................................................ 64
8.2.3
Brownfield Endpoint Considerations................................................................................ 65
8.3
Endpoint Physical Security................................................................................................. 66
8.4
Establish Roots of Trust..................................................................................................... 67
8.5
Endpoint Identity............................................................................................................... 68
8.6
Endpoint Access Control.................................................................................................... 70
8.6.1
Endpoint Authentication................................................................................................... 70
8.6.2
Endpoint Communication Authorization.......................................................................... 71
8.7
Endpoint Integrity Protection............................................................................................. 71
8.7.1
Boot Process Integrity....................................................................................................... 71
8.7.2
Runtime Integrity.............................................................................................................. 72
8.8
Endpoint Data Protection.................................................................................................. 73
8.8.1
Data Confidentiality.......................................................................................................... 73
8.8.2
Data Integrity.................................................................................................................... 74
8.9
Endpoint Monitoring and Analysis..................................................................................... 75
8.10 Endpoint Configuration and Management.......................................................................... 75
8.11 Cryptography Techniques for Endpoint Protection.............................................................. 75
8.12 Isolation Techniques for Endpoint Protection..................................................................... 76
8.12.1
Process isolation............................................................................................................... 76
8.12.2
Container Isolation............................................................................................................ 77
8.12.3
Virtual Isolation................................................................................................................. 78
8.12.4
Physical Isolation............................................................................................................... 80
8.13 Resource-Constrained Device Considerations..................................................................... 80
9 Protecting Communications and Connectivity................................................................. 82
9.1
Cryptographic Protection of Communications & Connectivity............................................. 83
9.1.1
Security Controls in Communication and Connectivity Protocols.................................... 83
9.1.2
Building Blocks for Protecting Exchanged Content........................................................... 84
9.1.3
Connectivity Standards and Security................................................................................ 84
9.1.4
Cryptographic Protection for Different Communications and Connectivity Paradigms.. 85
9.2
Information Flow Protection.............................................................................................. 86
9.2.1
Controlling Information Flows in Brownfield Deployments............................................. 86
IIC: PUB: G4: V1.0: PB: 20160926- iv-