Industrial Internet Security Framework v 1.0 | Page 53
Security Framework
•
•
•
7: IISF Functional Viewpoint
Endpoints & Communications: Monitoring data is gathered by a local agent running on
each of the endpoints and communications in the system obtaining information on the
implementation of security controls in accordance with the system security policy.
Secure Remote Logging: The sending and receiving of log messages using secure
communications.
Supply Chain: Collecting data from all components builders and integrators in the supply
chain to assure that security requirements are met.
Analyze. Analysis uses looks for events (for example, violation of security thresholds) and trends
that may uncover certain system security vulnerabilities or threats. This phase stores and saves
the information for audit or other mining purposes. There are two types of analysis:
•
•
Behavioral Analysis observes the usage patterns in the system and learns what is
appropriate behavior for the system.
Rule-Based Analysis monitors for violations of predefined policy rules that define events
that should never occur in the system.
Act. Having analyzed events and trends, action must be taken. There are three types:
•
•
•
Proactive/Predictive attempts to mitigate threats before the attack begins by observing
leading indicators of an imminent attack.
Reactive detection & Recovery provides manual and automated responses to attacks in
progress and tries to mitigate them to recover and return to normal runtime state.
Root Cause/Forensics analysis and forensics investigates the underlying vulnerabilities
and exploits after the attack.
Monitoring is supported by the other functions in this layer. Monitoring requires protection for
the collecting agents at the endpoint, and that the communication between the monitoring and
analysis agent, if required, is also protected. Monitoring encrypted channels may not be possible,
so monitoring of data-in-motion requires coordination with the policy defining the level of
protection of communication between endpoints.
The data collected is protected according to the monitoring and analysis data policy. This policy
may be more restrictive than policies for other data types, as it contains aggregated and sensitive
information about the system. The security model and policy determines the data captured
describing the overall state of the system that is input to the analysis phase.
7.6
SECURITY CONFIGURATION AND MANAGEMENT
Security Configuration & Management is responsible for the control of changes to both the
operational functionality of the system (including reliability and safety behavior) and the security
controls ensuring its protection. For example, security configuration and management provides
stability to the system by ensuring that all changes to the system are performed in a secure,
controlled and trusted way.
IIC:PUB:G4:V1.0:PB:20160926
- 53 -