Industrial Internet Security Framework v 1.0 | Page 56
Security Framework
•
7: IISF Functional Viewpoint
Monitoring Data Protection refers to all data generated by the system in response to
tracking current state and changes of key system parameters, indicators and activities
relevant in ensuring system trustworthiness.
The data protection strategies for each type of data fall into three categories:
•
•
•
Data-at-Rest (DAR) is data in persistent storage, for example, on a long-term networkattached cloud storage drive, on a local USB drive, or in a solid state disk (SSD) on an edge
device.
Data-in-Use (DIU) is data placed in non-persistent storage such as random access memory
(RAM) and CPU caches and registers.
Data-in-Motion (DIM) is data moving between two or multiple connected endpoints.
Data, whether in-motion, in-use, or at-rest, must be protected against unauthorized access and
uncontrolled changes by applying functions such as confidentiality controls, integrity controls,
access control, isolation and replication. The level of protection should be commensurate with
the impact of data loss or falsification, and the retention period should be defined.
7.8
SECURITY MODEL AND POLICY
The Security Model & Policy covers regulatory, organizational and machine levels of security (see
Figure 7-8). The Security Policy describes the security objectives of the system, and the Security
Model is a formal representation of security policies enforced in the system. Various security
models may be applicable in a system, and the scope of these models may address different
security functions or security domains within it. Security Model & Policy encompasses all security
aspects of the system including how to protect endpoints, communications and data. It also
defines what is to be monitored, analyzed and recovered and who and how changes may be
made to all aspects of the system.
IIC:PUB:G4:V1.0:PB:20160926
- 56 -