Industrial Internet Security Framework v 1.0 | Page 39

Security Framework • • • 6: Permeation of Trust in the IIoT System Lifecycle Component builders are hardware vendors, software publishers and service publishers who provide specific capabilities as a standardized product or service. System builders are system integrators and solution providers who integrate or adapt these built components in usage-specific individual solutions or service capabilities. The operational user is the system owner/operator that uses the components, solutions or services for their intended purposes. Once again, hardware, software and service components are built upon other components, so trust permeates from a base component up to higher-level components. System builders are responsible for integrating components from multiple sources properly. The components may be delivered through many delivery mechanisms: custom development, commercial off the shelf (COTS) integration or integration of another system. Each of these approaches has their respective processes for assuring trust. For some types of equipment, such as medical, aeronautics, and railroad, well-founded and defendable assurance is addressed by assurance cases and supporting evidence.1 Trust in custom development environments relies on in-house or third-party developers to build components that comply with specified requirements. COTS integration requires verification for compliance of existing products with trust requirements. If the COTS components are not capable of delivering on those requirements, then system integrators may encapsulate or isolate the COTS components in environments capable of delivering the required level of trust. Integration of other systems depends on defining clear interface specifications or interface standardscoupled service level agreements (SLAs) that meet the specified trust requirements. In each of these system-building approaches, system builders will need to integrate hardware, software and services components. The component builders must show that their respective components meet the specified trust requirements. When these components are an aggregation of other components, the builder of the main component is responsible for assuring that all the components and their integration meet the specified trust requirements. The IIoT system owner/operator must trust that each prior step in the process has been implemented correctly to support the trust assumptions in the layers above him. Each layer of the trust model depends on the one below it: Each actor builds a trust relationship with the actor below, following the schema of Figure 6-2. Trust is achieved in the operational system when assurance that the operational requirements of the system have been met. This trust then permeates back down through all levels of actors, which created, integrated or supplied components or sub-systems of the operational system. The trustworthiness of the operational system produced by the manufacturers and vendors is transferred to the trustworthiness of the capabilities the system builders provide. These capabilities again are based on the trustworthiness in the integrated technical components. 1 See [AAMI-TIR2014] and [NASA-CR2015] IIC:PUB:G4:V1.0:PB:20160926 - 39 -