IoT expands the attack surface as it connects industrial control systems with cloud, analytics, and edge compute infrastructure.
INDUSTRY 4.0 SECURITY CHALLENGES
Industrial Edge Computing represents an attractive target for cyber-criminals due the likelihood of being able to acquire sensitive data from both cloud and a wide variety of IoT devices.
- Trust – Edge nodes that offer services to IoT devices should be able to validate that both hardware and software in requesting devices are genuine and trusted.
- Shared Technology/Virtualization – Insecure hypervisor can lead to a single point failure and privilege escalation attacks.
- Provisioning – Secure automatic configuration of access credentials, node management agents, and analytics software.
Effective cybersecurity depends on risk assessment & vulnerability threat modeling for all systems involved in the end-to-end system.
DRIVING A SECURITY EVOLUTION THROUGH INDUSTRIAL BEST PRACTICES
Security for emerging Industry 4.0 capabilities such as software defined networking, AI, and computer vision are fast evolving and will take time to mature. However, industry security best practices for devices and gateways commonly deployed in IIoT today are well defined.
Intel has taken a leadership position to help define best practice security architectures and standards. Intel helps accelerate ecosystem adoption of these practices by directly implementing many capabilities in our Intel® x86 architecture which delivers a consistent binary for industrial ecosystem innovation.
Read Intel’s contributions to the Industrial Internet Consortium’s Security Framework ›
Intel IoT Security Solutions
ENABLING INNOVATION WITH BASELINE SECURITY BUILT-INTO SILICON
A “Designed-in” security foundation, rooted in the added protections of hardware security can help counter unforeseen threats across the device’s full lifecycle. Intel offers a built-in foundation of four baseline capabilities called Intel® Security Essentials. These best practice capabilities are available across Intel® processor lines and enable security professionals to choose from a pick list of security enabling technologies.