The Industrial Internet Consortium recently published a white paper that explains detailed security concepts related to IoT devices and networking. In my opinion it does a superb job of presenting all the available tools and how they should perform. For companies in the connected systems marketplace this should be required reading. The paper provides best practices around security key management, authentication and encryption. The paper also points out the importance of auditing and ensuring that the security measures that are in place track the data to make sure the data is safe.
The Industrial Internet Consortium® (IIC™) today announced the publication of the Data Protection Best Practices White Paper. Designed for stakeholders involved in cybersecurity, privacy and IIoT trustworthiness, the paper describes best practices that can be applied to protect various types of IIoT data and systems. The 33-page paper covers multiple adjacent and overlapping data protection domains, for example data security, data integrity, data privacy, and data residency.
Failure to apply appropriate data protection measures can lead to serious consequences for IIoT systems such as service disruptions that affect the bottom-line, serious industrial accidents and data leaks that can result in significant losses, heavy regulatory fines, loss of IP and negative impact on brand reputation.
“Protecting IIoT data during the lifecycle of systems is one of the critical foundations of trustworthy systems,” said Bassam Zarkout, Executive Vice President, IGnPower and one of the paper’s authors. “To be trustworthy, a system and its characteristics, namely security, safety, reliability, resiliency and privacy, must operate in conformance with business and legal requirements. Data protection is a key enabler for compliance with these requirements, especially when facing environmental disturbances, human errors, system faults and attacks.”