上QQ阅读APP看书,第一时间看更新
Implementation viewpoint
The implementation viewpoint is the culmination of the other three viewpoints. This viewpoint needs to factor in the business objectives, such as cost and time-to-market constraints, activities related to product usage, protocols, network topologies, and so on, necessary to meet the functional characteristics.
This is also the viewpoint where security strategies such as security by design, defense in depth, and threat-based risk analysis need to be implemented.
In the next section, we shall review a few common IIoT architectures to establish a baseline understanding before we dissect the security analysis into subcomponents.