by Niheer Patel, Product Manager for Aviation and Automotive Products, RTI
This blog originally appeared as an RTI blog
A few weeks ago, the U.S. celebrated the 50th anniversary of the Apollo 11 crew landing on the moon, an incredible feat set in motion some eight years earlier, ultimately involving over 400,000 people working together to break barriers in space exploration and propel the country into the future.
As we fast forward to today, there are parallels between the original Moonshot and Industrial IoT. This time, it’s a race for data in unchartered territory. To win, there must be a collaborative effort to enable secure, reliable, scalable and intelligent data to run tomorrow’s industrial systems. As John F Kennedy said of the original Moonshot, we do these things “not because it is easy but because it is hard.”
IIoT data protection is hard indeed – a task and a mission that the Industrial Internet Consortium (IIC) takes very seriously. Over the past year, I had the pleasure of working on the new Data Protection Best Practices White Paper, which supports the IIC’s goal of enabling the industry to build and secure scalable IIoT systems.
No one can deny the impact from the exponential proliferation of connected devices in Industrial IoT systems throughout the world. Over the next decade, we’ll see critical infrastructure and safety-critical OT systems connect with enterprise IT systems. This confluence will be a boon to disruptive business opportunities such as self-driving cars, distributed power grids, connected healthcare environments where preventable deaths are actually prevented, environmentally-friendly cities and much more.
This increased connectivity comes with increased risk of attack, as hackers seek to retrieve sensitive data or compromise the integrity of data to inflict harm to a business, property or worse, human lives. Check out my previous blog on autonomous vehicles for an example of the risks when data is compromised.
The new IIC white paper seeks to raise awareness that security is more than just a business problem. Security extends to a range of attributes that comprise what the IIC refers to as “IoT Trustworthiness”, which includes the safety of people directly impacted by these new technologies. The inherent complexity to IIoT security necessitates a team approach to tackling data protection.
Industrial IoT security has been widely debated by security experts over the past few years, with entire conferences covering the topic. So what’s the new information in the Data Protection Best Practices White Paper?
Quite simply, the paper moves away from the ‘why’ to the ‘how’. It delivers a comprehensive roadmap for tackling data protection requirements, plans and architectural considerations early in the lifecycle of a new system.
How do you use this paper? While it can be read by itself, it is more impactful when used with the previously-published IIC Industrial Internet Security Framework. Start by identifying your business and technical motivations, so you can put the answers to “why does this matter?” in that framework. Review the Data Protection Best Practices paper with your key business and technical stakeholders to understand different categories of data protection, corresponding use cases and the risk of not applying the right kind of protective measure.
Short on time? We are too! We created red boxes to summarize the best practices for each category. These are quick references to get you thinking about the main concepts to consider within your IIoT system.
I’d like to give a special shout out to my co-authors, Bassam Zarkout of IGNPower and Apurva Mohan of Schlumberger – plus the input of the various IIC security groups – for their many hours of lively debate and discussions in gathering and sharing their expertise to share with the world.
Just as it took a team to build this white paper, it takes a team to protect data within an IIoT system. Our hope in writing this paper is to provide your organization with a comprehensive roadmap to ensure your security is built into your IIoT system, from the ground up.
Additional Resources
- IIC Data Protection Best Practices White Paper – Press Release
- IIC Journal of Innovation, Trustworthiness edition
- IIC Managing and Assessing Trustworthiness for IIoT in Practice White Paper – Press Release
- IIC Technical Papers, Publications and White Papers