Implement security for Industrial Internet of Things (IIoT) systems

URN: TECIS1201405
Business Sectors (Suites): IT(Networking)
Developed by: e-skills
Approved on: 2021

Overview

This standard is about the design of IIoT security processes, the detection of threats and incidents and IIoT incident and recovery management.

IIoT security activities include designing security cases for IIoT systems and defining processes for detecting and responding to threats and incidents. This includes identifying and reducing the cyber security attack surface in a way that does not impede the normal functioning of the IIoT system. This involves the design and implementation of security for printed circuit board, device, software or platform and following the overall organisational security policy. This also includes evaluating security threat levels of IIoT assets and including remote and cloud-hosted operations and database security. 

This also includes the delivery of IIoT assurance activities, security reviews, security testing and vulnerability assessment processes prior to and after the deployment of any IIoT infrastructure.

This standard is for those who implement security for IIoT systems.


Performance criteria

You must be able to:

  1. record, classify and prioritise information security incidents using standard templates and tools
  2. maintain documentation of security incidents to inform future security resilience as required
  3. review information on past IIoT security incidents and how these were managed and resolved
  4. plan and carry out IIoT security audit reviews as required

  5. produce documentation on IIoT security audits undertaken in line with organisational standards

  6. detect IIoT security anomalies and events in a timely manner

  7. reproduce IIoT security issues and determine root cause of anomalies detected

  8. evaluate the impact of potential IIoT security anomalies to determine mitigations

  9. collect information and perform deep dive analysis, diagnosis and troubleshooting of IIoT endpoint security issues

  10. perform regular maintenance of IIoT security detection processes to maintain their effectiveness

  11. apply security controls to IIoT solutions in line with security policies, procedures and guidelines

  12. strengthen security IIoT security using active hardening processes 

  13. perform security assessments of IIoT gateway and edge devices using automated security assessment tools

  14. design and develop dashboards for monitoring and reporting IIoT security incidents

  15. perform threat analysis for IIoT systems to predict and extrapolate attack trends ahead of their occurrence

  16. perform threat modelling to determine the potential impact to IIoT systems should a threat materialise into an attack

  17. scan for critical security vulnerabilities across all layers of the IIoT solution to inform IIoT threat intelligence activities

  18. carry out backups of security devices and applications in line with security policies, procedures, and guidelines


Knowledge and Understanding

You need to know and understand:

1. the organisational policies, procedures and guidelines which relate to maintaining solution security 2. the organisational policies and procedures for sharing data 3. the organisational policies for documenting and implementing security procedures 4. who to involve while defining and executing IIoT security processes 5. the range of standard templates and tools available for security monitoring and how to use them 6. the fundamental network topologies, edge device configurations and connectivity in IIoT systems 7. the different contexts of IIoT security and the various levels that they need to cover including device, cloud, communications, databases and applications 8. the routine operational procedures and tasks required to co-ordinate and respond to IIoT information security incidents 9. how to identify and resolve IIoT security vulnerabilities and incidents 10. the common IIoT security issues and incidents that may require action and how to respond to these 11. how to prepare security escalations for activities that require specialised remediation 12. how to implement active security hardening in IIoT systems 13. how to identify and resolve vulnerabilities in systems 14. how to maintain auditable records of IIoT security monitoring activities 15. how to obtain and validate information related to IIoT security issues 16. how to prepare and submit security reports and who to share these with 17. how to identify and analyse anomalies in IIoT systems 18. how to maintain awareness of new IIoT security threats

Scope/range


Scope Performance


Scope Knowledge


Values


Behaviours


Skills


Glossary


Links To Other NOS


External Links


Version Number

1

Indicative Review Date

2024

Validity

Current

Status

Original

Originating Organisation

ODAG Consultants Ltd.

Original URN

TECIS1201405

Relevant Occupations

Information and Communication Technology Professionals

SOC Code

2135

Keywords

IIoT, IoT, Industry 4.0, networks