Secure by design means designing software to be secure from the ground up. It is assumed that there will be bad actors who will try to hack the software, hence we should bake in the general guidelines, such as authentication, authorization, logging, monitoring, and so on, as part of the design. We will go into detail about different secure architectures in the following section.
Securing an IIoT application is an ongoing activity and is fundamentally about protecting the applications and services that make up the IIoT application, while protecting your sensitive data. Security should include design and architecture, in addition to fixing the issues identified on an ongoing basis.