Industrial Internet Security Framework v 1.0 | Page 5
Security Framework
Contents
9.2.2
9.2.3
9.2.4
9.2.5
9.2.6
9.2.7
9.2.8
9.3
Network Data Isolation ..................................................................................................... 86
Network Segmentation ..................................................................................................... 87
Gateways and Filtering ..................................................................................................... 88
Network Firewalls ............................................................................................................. 90
Unidirectional Gateways ................................................................................................... 91
Network Access Control.................................................................................................... 93
Using Security Gateways To Protect Legacy Endpoints, Communication and
Connectivity ...................................................................................................................... 94
Security Model and Policies for Protecting Communication ................................................ 95
10 Security Monitoring and Analysis .................................................................................... 96
10.1 Incident Prevention, Detection, Analysis and Response ...................................................... 97
10.1.1 Prior To An Incident .......................................................................................................... 97
10.1.2 During An Incident ............................................................................................................ 97
10.1.3 After An Incident ............................................................................................................... 98
10.2 Security Monitoring and Analytics...................................................................................... 98
10.2.1 Purposes and Kinds of Security Monitoring...................................................................... 98
10.2.2 Types of Security Analytics Systems ................................................................................. 99
10.3 Capturing and Storing Data for Analysis ........................................................................... 100
10.3.1 Logging And Event Monitoring ....................................................................................... 100
10.3.2 Capturing and Monitoring Security Data ........................................................................ 100
10.4 Security Data Protection .................................................................................................. 101
10.5 Special Considerations for Monitoring.............................................................................. 102
10.5.1 Security Model and Policy............................................................................................... 102
10.5.2 Greenfield versus Brownfield Considerations ................................................................ 102
10.5.3 Supply Chain Integrity Monitoring .................................................................................. 103
11 Security Configuration and Management .......................................................................105
11.1 Secure Operational Management vs. Security Management ............................................. 105
11.2 Security Communications Channels .................................................................................. 107
11.3 Secure Operational Management..................................................................................... 108
11.4 Security Management...................................................................................................... 108
11.4.1 Security Policy Management .......................................................................................... 109
11.4.2 Policy Authoring and Definition ...................................................................................... 110
11.4.3 Policy Assignment and Delivery ...................................................................................... 111
11.5 Endpoint Configuration and Management ........................................................................ 111
11.5.1 Secure Software Patching and Firmware Update ........................................................... 112
11.6 Communications Configuration and Management ............................................................ 113
11.7 Identity Management ...................................................................................................... 113
11.7.1 Enrollment Phase ............................................................................................................ 115
11.7.2 Credential Management Phase ...................................................................................... 116
11.7.3 Entity Authentication Phase ........................................................................................... 117
11.8 Security Model Change Control ........................................................................................ 118
11.9 Configuration and Management Data Protection.............................................................. 119
11.10 Security Model & Policy for Change Management ............................................................ 120
12 Looking Ahead—The Future of the IIoT ..........................................................................121
IIC:PUB:G4:V1.0:PB:20160926
-v-