Industrial Internet Security Framework v 1.0 | Page 8

Security Framework Contents Figure 10-2: Security Monitoring During Timeline ..................................................................................... 98 Figure 10-3: Security Monitoring Data Analysis Variants ......................................................................... 100 Figure 10-4: Security Monitoring Special Considerations ......................................................................... 102 Figure 11-1: Functional Breakdown for Security Configuration and Management.................................. 105 Figure 11-2: Secure Operational Management ........................................................................................ 106 Figure 11-3: Hierarchical Communications Channels ............................................................................... 108 Figure 11-4: Policy Relationship ................................................................................................................ 109 Figure 11-5: IIoT Management and Monitoring Feedback Loop .............................................................. 110 Figure 11-6: IIoT Identity Management Lifecycle ..................................................................................... 114 Figure 11-7: Endpoint Security Lifecycle ................................................................................................... 118 Figure 11-8: Flow of Management Data ................................................................................................... 120 Figure B-1: A Sample C2M2 Score Report................................................................................................. 137 TABLES Table 8-1: Endpoint Objectives, Functions and Techniques (Chapter 8 Outline) ....................................... 60 Table 11-1: APIs for Interoperable Endpoint Security .............................................................................. 107 Table C-1: Cryptographic Techniques, their Objectives and Requirements ............................................. 139 Table C-2: Techniques and Processes for Enabling System Integrity........................................................ 140 Table C-3: Techniques and Processes for Enabling System Availability.................................................... 141 Table C-4: Techniques and Processes for Enabling System Confidentiality.............................................. 142 Table C-5: Techniques and Processes for Enabling System Access Control.............................................. 143 IIC:PUB:G4:V1.0:PB:20160926 - viii -