IIoT cloud security architecture and design

IIoT cloud security is very important to the functioning of the IIoT application. Some of the common guidelines are shown in the following table for reference:

Password security Recommendations
Insecure data storage Store only what is absolutely required. Never use public storage areas, for example, SD cards. Leverage secure containers and platform-provided file encryption APIs, and do not grant files world readable or world writeable permissions.
Weak server-side controls Understand the additional risks that mobile applications can introduce into existing architectures. Use the wealth of knowledge already available, for example, OWASP Web Top 10, Cloud Top 10, cheat sheets, and development ...

Get Industrial Internet Application Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.