Industrial Internet Security Framework v 1.0 | Page 36

Security Framework 6: Permeation of Trust in the IIoT System Lifecycle 6 PERMEATION OF TRUST IN THE IIOT SYSTEM LIFECYCLE A typical Industrial Internet of Things (IIoT) system is a complex assembly of system elements. The trustworthiness of the system depends on trust in all of these elements, how they are integrated and how they interact with each other. Permeation of trust is the hierarchical flow of trust within a system from its overall usage to all its components. Each IIoT system has a unique permeation of trust. Each element has actors (designers, developers, manufacturers, operators etc.) that execute the various roles in the creation, integration and usage of the hardware and software of an IIoT system. These roles cut across multiple organizations, each with its own interests. Permeation of trust cuts across the complete system lifecycle, not only operation. It depends on the integrity of the chain of custody of each element of the system and its data. Everything from supply chain, commissioning, provisioning, regular usage and end-of-life decommissioning must be carefully monitored to ensure the initial trustworthiness is preserved throughout. 6.1 SYSTEM LIFECYCLE Figure 6-1 shows the permeation of trust from an industrial operator, such as a hospital or a nuclear power plant, throughout the hardware and software that makes up the system. This trust should be explicitly described, verified, controlled and supervised and not be based only on the reputation of the vendor, without validation that the trust is warranted. Figure 6-1: Permeation of Trust The trust lifecycle starts with the specification of requirements that result in the delivery of capabilities. The assurance that these capabilities meet the stated requirements becomes the basis of trust in the system. IIC:PUB:G4:V1.0:PB:20160926 - 36 -