Implement security for Industrial Internet of Things (IIoT) systems
Overview
This standard is about the design of IIoT security processes, the detection of threats and incidents and IIoT incident and recovery management.
IIoT security activities include designing security cases for IIoT systems and defining processes for detecting and responding to threats and incidents. This includes identifying and reducing the cyber security attack surface in a way that does not impede the normal functioning of the IIoT system. This involves the design and implementation of security for printed circuit board, device, software or platform and following the overall organisational security policy. This also includes evaluating security threat levels of IIoT assets and including remote and cloud-hosted operations and database security.
This also includes the delivery of IIoT assurance activities, security reviews, security testing and vulnerability assessment processes prior to and after the deployment of any IIoT infrastructure.
This standard is for those who implement security for IIoT systems.
Performance criteria
You must be able to:
- record, classify and prioritise information security incidents using standard templates and tools
- maintain documentation of security incidents to inform future security resilience as required
- review information on past IIoT security incidents and how these were managed and resolved
plan and carry out IIoT security audit reviews as required
produce documentation on IIoT security audits undertaken in line with organisational standards
detect IIoT security anomalies and events in a timely manner
reproduce IIoT security issues and determine root cause of anomalies detected
evaluate the impact of potential IIoT security anomalies to determine mitigations
collect information and perform deep dive analysis, diagnosis and troubleshooting of IIoT endpoint security issues
perform regular maintenance of IIoT security detection processes to maintain their effectiveness
apply security controls to IIoT solutions in line with security policies, procedures and guidelines
strengthen security IIoT security using active hardening processes
perform security assessments of IIoT gateway and edge devices using automated security assessment tools
design and develop dashboards for monitoring and reporting IIoT security incidents
perform threat analysis for IIoT systems to predict and extrapolate attack trends ahead of their occurrence
perform threat modelling to determine the potential impact to IIoT systems should a threat materialise into an attack
scan for critical security vulnerabilities across all layers of the IIoT solution to inform IIoT threat intelligence activities
carry out backups of security devices and applications in line with security policies, procedures, and guidelines
Knowledge and Understanding
You need to know and understand: