Menu

Smart Factories FEATURE NEWS

Industrial Internet Consortium Publishes Data Protection Best Practices Paper

By Ken Briodagh July 22, 2019

The Industrial Internet Consortium (IIC) recently announced the publication of its Data Protection Best Practices White Paper. Designed for stakeholders involved in cybersecurity, privacy and IIoT trustworthiness, the paper describes best practices that can be applied to protect various types of IIoT data and systems. The 33-page paper covers multiple adjacent and overlapping data protection domains, including data security, data integrity, data privacy, and data residency.

Without data protection measures, IIoT systems can suffer extreme consequences like service disruptions, industrial accidents and critical data leaks. These problems, the paper states, can result in significant losses, heavy regulatory fines, loss of IP and negative impact on brand reputation.

“Protecting IIoT data during the lifecycle of systems is one of the critical foundations of trustworthy systems,” said Bassam Zarkout, EVP, IGnPower and one of the paper’s authors. “To be trustworthy, a system and its characteristics, namely security, safety, reliability, resiliency and privacy, must operate in conformance with business and legal requirements. Data protection is a key enabler for compliance with these requirements, especially when facing environmental disturbances, human errors, system faults and attacks.”

Categories of Data to be Protected
Data protection is needed for all data and information in an organization. In a complex IIoT system, the report says this includes operational data from things like sensors at a field site; system and configuration data like data exchanged with an IoT device; personal data that identifies individuals; and audit data that chronologically records system activities.

Different data protection mechanisms and approaches may be needed for data at rest (data stored at various times during its lifecycle), data in motion (data being shared or transmitted from one location to another), or data in use (data being processed).

“Security is the cornerstone of data protection. Securing an IIoT infrastructure requires a rigorous in-depth security strategy that protects data in the cloud, over the internet, and on devices,” said Niheer Patel, Product Manager, Real-Time Innovations (RTI) and one of the paper’s authors. “It also requires a team approach from manufacturing, to development, to deployment and operation of both IoT devices and infrastructure. This white paper covers the best practices for various data security mechanisms, such as authenticated encryption, key management, root of trust, access control, and audit and monitoring.”

As a prime example of data privacy requirements, the paper focuses on the EU General Data Protection Regulation (GDPR), which grants data subjects a wide range of rights over their personal data. The paper describes how IIoT solutions can leverage data security best practices in key management, authentication and access control can empower GDPR-centric privacy processes.

The Data Protection Best Practices White Paper complements the IoT Security Maturity Model Practitioner’s Guide and builds on the concepts of the Industrial Internet Reference Architecture and Industrial Internet Security Framework. IT is available on the IIC website.




Edited by Ken Briodagh

Editorial Director

SHARE THIS ARTICLE
Related Articles

Ericsson Automated Smart Factory Operational in China

By: Ken Briodagh    9/18/2019

Company says production modernized and cellular IoT, Industry 4.0 and AI tools and technologies implemented

Read More

GE Digital Launches Plant Applications 8 Multi-Modal Manufacturing Execution System

By: Ken Briodagh    9/17/2019

Plant Applications 8.0 enables discrete, process and multi-modal manufacturers to turn real-time, mission-critical production data into actionable ins…

Read More

Nuremberg Institute of Technology Study Reveals QoS on IoT Deployments

By: Juhi Fadia    9/12/2019

In a study from the Nuremberg Institute of Technology, results showed that there are marked differences in performance among a variety of protocols an…

Read More

Kaon Interactive Creates VR Demo Tool

By: Chrissie Cluney    9/12/2019

Kaon Interactive, a provider of 3D marketing and sales applications for global B2B brands, has introduced its lab configuration tool.

Read More

CONTACT Software and Mitsubishi Electric Partner on Smart Factory

By: Ken Briodagh    9/10/2019

According to a recent announcement, CONTACT Software has become a new member of Mitsubishi Electric's e-F@ctory Alliance.

Read More