7 IISF Functional Viewpoint................................................................................................ 46 | |
7.1 |
Security Building Blocks..................................................................................................... 46 |
7.2 |
IIoT System, IIRA Functional Viewpoint and IISF Functional Viewpoint................................ 47 |
7.3 |
Endpoint Protection.......................................................................................................... 48 |
7.4 |
Communications and Connectivity Protection.................................................................... 50 |
7.5 |
Security Monitoring and Analysis....................................................................................... 52 |
7.6 |
Security Configuration And Management........................................................................... 53 |
7.7 |
Data Protection................................................................................................................. 55 |
7.8 |
Security Model and Policy.................................................................................................. 56 |
7.9 |
From Functional to Implementation Viewpoint.................................................................. 58 |
8 Protecting Endpoints....................................................................................................... 60 | ||
8.1 |
Security Threats and Vulnerabilities on Endpoints.............................................................. 61 |
|
8.2 |
Architectural Considerations for Protecting Endpoints........................................................ 63 |
|
8.2.1 |
Endpoint Security Lifecycle............................................................................................... 64 |
|
8.2.2 |
Hardware versus Software................................................................................................ 64 |
|
8.2.3 |
Brownfield Endpoint Considerations................................................................................ 65 |
|
8.3 |
Endpoint Physical Security................................................................................................. 66 |
|
8.4 |
Establish Roots of Trust..................................................................................................... 67 |
|
8.5 |
Endpoint Identity............................................................................................................... 68 |
|
8.6 |
Endpoint Access Control.................................................................................................... 70 |
|
8.6.1 |
Endpoint Authentication................................................................................................... 70 |
|
8.6.2 |
Endpoint Communication Authorization.......................................................................... 71 |
|
8.7 |
Endpoint Integrity Protection............................................................................................. 71 |
|
8.7.1 |
Boot Process Integrity....................................................................................................... 71 |
|
8.7.2 |
Runtime Integrity.............................................................................................................. 72 |
|
8.8 |
Endpoint Data Protection.................................................................................................. 73 |
|
8.8.1 |
Data Confidentiality.......................................................................................................... 73 |
|
8.8.2 |
Data Integrity.................................................................................................................... 74 |
|
8.9 |
Endpoint Monitoring and Analysis..................................................................................... 75 |
|
8.10 Endpoint Configuration and Management.......................................................................... 75 | ||
8.11 Cryptography Techniques for Endpoint Protection.............................................................. 75 | ||
8.12 Isolation Techniques for Endpoint Protection..................................................................... 76 | ||
8.12.1 |
Process isolation............................................................................................................... 76 |
|
8.12.2 |
Container Isolation............................................................................................................ 77 |
|
8.12.3 |
Virtual Isolation................................................................................................................. 78 |
|
8.12.4 |
Physical Isolation............................................................................................................... 80 |
|
8.13 Resource-Constrained Device Considerations..................................................................... 80 |
9 Protecting Communications and Connectivity................................................................. 82 | ||
9.1 |
Cryptographic Protection of Communications & Connectivity............................................. 83 |
|
9.1.1 |
Security Controls in Communication and Connectivity Protocols.................................... 83 |
|
9.1.2 |
Building Blocks for Protecting Exchanged Content........................................................... 84 |
|
9.1.3 |
Connectivity Standards and Security................................................................................ 84 |
|
9.1.4 |
Cryptographic Protection for Different Communications and Connectivity Paradigms.. 85 |
|
9.2 |
Information Flow Protection.............................................................................................. 86 |
|
9.2.1 |
Controlling Information Flows in Brownfield Deployments............................................. 86 |