IIoT access control

As we know, the biggest threat to any network is the insider threat. When managing several devices on a network, it is necessary that identity access management for devices be implemented with certain best practices in mind. For example, scalability for the solution is very critical, and therefore, automatic load balancing should be part of the Access Control Service (ACS) for IIoT in order to provide robustness.

Similarly, denial of service detection should be an integral part of the solution, and so should adaptive authentication. Also, insider threats make IoT solutions in general susceptible to violations of privacy and personal data. So, features such as self-management for participating in communications and sharing ...

Get Industrial Internet Application Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.