Industrial Internet Security Framework v 1.0 | Page 54

Security Framework 7: IISF Functional Viewpoint Figure 7-6: Functional Breakdown for Security Configuration and Management Security configuration management includes following functions: • • • • • • • Secure Operational Management is responsible for managing the secure and controlled changes to all aspects of the operational system, except for security controls for which it is performed separately by Security Management. Security Management is responsible for ensuring and executing the secure and controlled changes to the security policy and functions throughout the system. It should remain separate from Secure Operational Management. Endpoint Identity Management generates, updates and revokes machine (and user) principals and cryptographic materials (keys, certificates, etc.) used in the identification of the endpoint. Endpoint Configuration & Management is responsible for configuring and managing secure and controlled changes to the endpoint including both endpoint operational and security function. This function may be performed by a local agent on the endpoint or through a shared trusted central facility. Communications Configuration & Management configures and manages the security controls specifically for communications and the network. Security Model Change Control is the process by which changes to the security model and security policy are managed in the configuration and management process. Configuration & Management Data Protection is the function that is responsible for protecting all data (at rest, in use and in motion) related to the configuration & management of the system. IIC:PUB:G4:V1.0:PB:20160926 - 54 -