Menu

IoT FEATURE NEWS

Industrial Internet Consortium Announces Software Trustworthiness Whitepaper

By

The Industrial Internet Consortium (IIC), an organization for accelerating the adoption of the Industrial Internet of Things (IIoT), recently announced the publication of its Software Trustworthiness Best Practices Whitepaper. Written for developers, owner-operators and decision makers, the whitepaper addresses various aspects of creating, acquiring and protecting software for IIoT systems. It also reportedly provides practical and actionable best practices for recognizing, addressing, managing and mitigating risks and their sources, and includes numerous use cases.

“You cannot talk about the trustworthiness of today's systems without an in-depth understanding of the trustworthiness of the software in these systems,” said Mark Hermeling, one of the authors of the whitepaper and Senior Director, Product Marketing, GrammaTech. “This paper concisely lays out the topics to consider when reasoning about the trustworthiness of software, during the entire lifecycle of the system, from inception to disposal.”

“Systems depend on software to function in potentially hostile environments that are inherently untrustworthy,” said Simon Rix, one of the authors of the whitepaper, and Security Evangelist at Irdeto. “As a security practitioner, I like the practical nature of this whitepaper as it presents techniques and methodologies to ensure that software is protected and not a target of attacks, thereby enabling successful business objectives in hostile, untrustworthy environments.”

“Software is an essential part of almost all modern systems,” said Frederick Hirsch of Fujitsu, co-chair of the IIC Trustworthiness Task Group and another one of the authors of the whitepaper. “Ensuring that software is trustworthy is essential to assuring the trustworthiness of these systems, to make them appropriately secure, safe, reliable, resilient and privacy protecting.”

“The specific aspects of trustworthiness in a system depend on the system, the industry and the consequences of failure,” said Marcellus Buchheit, another author of the whitepaper, co-chair of the IIC Trustworthiness Task Group, President & CEO, Wibu-Systems. “Confidence is not only dependent on the quality of the software itself but also on an organization and its processes. If you want to convince others that your software should be trusted, you must be transparent, providing concrete evidence of best practices.”

“This new whitepaper addresses the critical and often misunderstood aspects of creating trustworthy systems,” said Bob Martin, one of the authors of the whitepaper, co-chair of the IIC Trustworthiness Task Group, member of the IIC Steering Committee and Senior Principal Engineer from MITRE's Trust & Assurance Cyber Technologies Department. “It will help anyone who uses software and systems to create, buy, operate and maintain them in a trustworthy manner.”


Ken Briodagh is a storyteller, writer and editor with about two decades of experience under his belt. He is in love with technology and if he had his druthers would beta test everything from shoe phones to flying cars.

Edited by Ken Briodagh
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

KORE Wireless Group Acquires Twilio's IoT Division

By: Alex Passett    3/27/2023

KORE Wireless Group, a MVNO, announced that it signed a deal to acquire the IoT division of the customer engagement platform and programmable communic…

Read More

Quectel's New CC200A-LB Satellite Module, Reliable and Ready for a Wide Range of IoT Applications

By: Alex Passett    3/24/2023

Quectel has launched its CC200A-LB satellite module, which is designed to provide reliable global connectivity at a cost-effective price point, making…

Read More

'Hello' from Quectel's New Wi-Fi HaLow Module, Launched for Improved Indoor and Outdoor IoT

By: Alex Passett    3/23/2023

Quectel launched its IEE 802.11ah wireless networking protocol, known as Wi-Fi HaLow, for augmented IoT applications both indoors and outdoors.

Read More

The Future of IoT Core and Debating Build vs. Buy Options

By: Matthew Vulpis    3/23/2023

With large third-party providers sunsetting their IoT solutions, the time is now for organizations to make the choice to either build or buy.

Read More

Keyfactor Joins the CSA to Deepen IoT Connectivity and Secure Digital Trust

By: Alex Passett    3/21/2023

As the latest member of the Connectivity Standards Alliance (CSA), software company and IoT identity platform Keyfactor looks to better tap into the u…

Read More