Phase 3 – secure by design

Secure by design means designing software to be secure from the ground up. It is assumed that there will be bad actors who will try to hack the software, hence we should bake in the general guidelines, such as authentication, authorization, logging, monitoring, and so on, as part of the design. We will go into detail about different secure architectures in the following section.

Securing an IIoT application is an ongoing activity and is fundamentally about protecting the applications and services that make up the IIoT application, while protecting your sensitive data. Security should include design and architecture, in addition to fixing the issues identified on an ongoing basis.

Get Industrial Internet Application Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.