The IIoT Security Review is a risk and control assessment tailored for device developers and control systems environments to seamlessly secure data flows along the supply chain.

The emerging digital environments are built on automation, analytics, cloud, cyber-physical systems, and the Industrial Internet of Things (IIoT). With the ease of creating new business models and flexibility in delivery comes the potential for malicious behavior. Data is exchanged and exposed by designers, the production team, and everyone along the supply chain to anyone intent on stealing intellectual property, damaging competitive advantage, or affecting the reliability and safety of these connected systems.

As a result, Trustedsec, a leader in information security, has compiled the latest industry standards and control guidelines to bring you the most effective assessment to attain the business’ goals. TrustedSec will review organizations’ security postures to ensure that systems meet or exceed risk tolerances in the following areas:

Availability: Ensuring reliable and timely use of information
Integrity: Guarding against improper modification or destruction
Confidentiality: Preserving the restrictions on access and disclosure
Authentication: Verifying the identity of systems or users
Non-repudiation: Assurance or proof of delivery and identity

TrustedSec utilizes both the NIST Cybersecurity Framework (CSF) – Manufacturing Profile and the International Electrotechnical Commission (IEC) standard for secure product development lifecycle as a baseline for the assessment.

In accordance with the emerging NIST international cybersecurity standardization for IIoT, TrustedSec can review security in the following areas:

• Incident Management
• Hardware Assurance
• Identity and Access Management
• Network Security
• Monitoring and Detection
• Software Assurance
• Supply Chain and Third-Party Vendor Security
• Information Security Management System (ISMS)
• IT Security Alignment
• Segmentation
• OT Security Controls Review
• IoT Device Security Review

Featured Content

Why Penetration Testing Needs Continual Evolution: Going Purple


Talk with an Expert

Author: Nathan Noll