The Industrial Internet of Things (IIoT) introduces interconnectivity at all levels of the automation pyramid—from executive resource planning down to field devices, forming a nearly omnipotent digital network that extends the practical limits of data acquisition and control by an order of magnitude from current plant design standards.
The full potential of the technology unlocks disruptive business options for vendors to adapt to almost any limitation. Subscription and pay-as-you-go terms for platform as a service (PaaS) and data as a services (DaaS) models are early examples of IIoT benefits that vendors have already deployed. Looking slightly ahead, the promise in model driven data analytics can take automation to an even higher level—from the automation of product manufacturing to the automation of running a business.
Being able to extend executive resource planning (ERP) into the cloud—analyzing real-time data and automating business processes at the global level—is tremendously valuable. The first organizations to realize the concept will gain an incredible market advantage. The risks, however, are formidable.
Market stakeholders are fully aware of the benefits, but these benefits depend on the assurance of the underlying technology. Trusting globally connected cyber-physical systems to automate the control of product manufacturing and financial processes involves trusting a state machine of unfathomable complexity, forcing the question of security to the forefront.
The status quo security position of product vendors is to offer best in class cyber security solutions—firewalls, patching servers, IDS, etc. It is fair to question the accuracy and precision of such a position when said IT point solutions have proven to fail in epic proportions, which will keep many of the high valued projections of the IIoT parked at the launchpad.
Industrial standard organization such as the Industrial Internet Consortium attest that point solutions are not enough. The success of the IIoT depends on a holistic view of the system and requires a comprehensive framework for managing the vast complexities of the pyramid. The IIC published Industrial Internet Security Framework surpasses typical recommendations of security controls, documenting stakeholder viewpoints and concerns to ensure proposed solutions are rooted in requirements that comprehensively solve the problem. Coverage Includes:
Adopting any digitization security technology requires careful technical scrutiny to claims of assurance, interoperability with legacy systems, and life cycle maintenance costs. Lynx MOSA.icTM provides a pragmatic path of adoption that addresses both technical and business challenges.
To unlock the full potential of IIoT, trust must be established across a network. That trust begins with platform security—the assurance that computing components are authentic, initialize to a well-known state, and are resilient to unauthorized changes. Once platform security is in place, systems must incorporate network security and monitoring capabilities to ensure system-wide integrity is resilient to unauthorized changes.
Point solutions tend to address symptoms of engineering flaws—e.g patching, updating whitelists, malware signatures, etc. However, reactionary approaches lose effectiveness at scale and fail at catching the first exploit. Lynx MOSA.icTM gives product suppliers the ability to build in assurance with the knowledge that their device is precisely designed to execute securely in enterprise or control networks without having to rely on layers of firewalls, IDS, and patching systems.
The architecture configuration language of Lynx MOSA.icTM allows developers to design in security properties of system devices that must be trusted and need to survive in hostile environments. Examples of relevant security designs include:
With Lynx MOSA.icTM, evaluators of security properties such as government authorities or safety managers can trace configurations down to processor hardware control, providing formal evidence of robustness.
Ground zero of the IIoT starts with raw compute power featuring intelligent microprocessor and sophisticated software platforms at all levels of the automation pyramid.
Modern plants are distributed computing systems containing thousands of widely diverse embedded components comprised of new and legacy processing and software designs.
The underlying processor partitioning technology of Lynx MOSA.icTM preserves application binary compatibility and system interoperability. The technology can be applied to a broad set of computing devices. Designs can accommodate remote update capabilities while providing room for adaptive design changes that can incrementally adapt through modular construction. With Lynx MOSA.icTM, purpose-built security layers can be commonly applied to enterprise and real-time devices across business and control networks to recoup investments on security model engineering.