Menu

Smart Factories FEATURE NEWS

Industrial Internet Consortium Publishes Data Protection Best Practices Paper

By Ken Briodagh July 22, 2019

The Industrial Internet Consortium (IIC) recently announced the publication of its Data Protection Best Practices White Paper. Designed for stakeholders involved in cybersecurity, privacy and IIoT trustworthiness, the paper describes best practices that can be applied to protect various types of IIoT data and systems. The 33-page paper covers multiple adjacent and overlapping data protection domains, including data security, data integrity, data privacy, and data residency.

Without data protection measures, IIoT systems can suffer extreme consequences like service disruptions, industrial accidents and critical data leaks. These problems, the paper states, can result in significant losses, heavy regulatory fines, loss of IP and negative impact on brand reputation.

“Protecting IIoT data during the lifecycle of systems is one of the critical foundations of trustworthy systems,” said Bassam Zarkout, EVP, IGnPower and one of the paper’s authors. “To be trustworthy, a system and its characteristics, namely security, safety, reliability, resiliency and privacy, must operate in conformance with business and legal requirements. Data protection is a key enabler for compliance with these requirements, especially when facing environmental disturbances, human errors, system faults and attacks.”

Categories of Data to be Protected
Data protection is needed for all data and information in an organization. In a complex IIoT system, the report says this includes operational data from things like sensors at a field site; system and configuration data like data exchanged with an IoT device; personal data that identifies individuals; and audit data that chronologically records system activities.

Different data protection mechanisms and approaches may be needed for data at rest (data stored at various times during its lifecycle), data in motion (data being shared or transmitted from one location to another), or data in use (data being processed).

“Security is the cornerstone of data protection. Securing an IIoT infrastructure requires a rigorous in-depth security strategy that protects data in the cloud, over the internet, and on devices,” said Niheer Patel, Product Manager, Real-Time Innovations (RTI) and one of the paper’s authors. “It also requires a team approach from manufacturing, to development, to deployment and operation of both IoT devices and infrastructure. This white paper covers the best practices for various data security mechanisms, such as authenticated encryption, key management, root of trust, access control, and audit and monitoring.”

As a prime example of data privacy requirements, the paper focuses on the EU General Data Protection Regulation (GDPR), which grants data subjects a wide range of rights over their personal data. The paper describes how IIoT solutions can leverage data security best practices in key management, authentication and access control can empower GDPR-centric privacy processes.

The Data Protection Best Practices White Paper complements the IoT Security Maturity Model Practitioner’s Guide and builds on the concepts of the Industrial Internet Reference Architecture and Industrial Internet Security Framework. IT is available on the IIC website.




Edited by Ken Briodagh

Editorial Director

SHARE THIS ARTICLE
Related Articles

IIoT Adoption: How to Connect, Monitor, Analyze and Improve

By: Ken Briodagh    8/19/2019

The IIoT industry is ambitious, looking to meet big business and societal goals. Some of these are: asset tracking and monitoring, predictive maintena…

Read More

Cepton and ThinkReps Partner on Physical Security, Smart Cities and IIoT

By: Ken Briodagh    8/16/2019

Cepton Technologies, a provider of 3D lidar solutions IoT, security, and industrial applications,partnered with ThinkReps, a physical security manufac…

Read More

ADVICS and Macnica Networks Deploy FogHorn Edge Software for Smart Factory

By: Ken Briodagh    8/13/2019

$5B automotive brake system manufacturer deploys FogHorn Lightning Edge Computing Software Platform for real-time data processing, machine learning an…

Read More

The IIC Publishes Advice for Managing and Assessing Trustworthiness for IIoT

By: Ken Briodagh    8/6/2019

Whitepaper provides practical guidance for trustworthiness including definitions, examples and best practices

Read More

IBM Acquires Oniqua Holdings to Expand Asset Optimization Practice

By: Chrissie Cluney    7/23/2019

IBM has acquired Oniqua Holdings Pty Ltd. This company is a global innovator in Maintenance Repair and Operations (MRO) Inventory Optimization solutio…

Read More