IoT Critical Infrastructure Project Checklist

Issue link:

Contents of this Issue


Page 0 of 2

IOT CRITICAL INFRASTRUCTURE PROJECT CHECKLIST What You Should Consider When Designing a Safe, Secure, and Reliable IoT Critical Infrastructure System Designing a critical infrastructure system today presents many complex challenges related to safety, security, and certification, in addition to the basics of making a connection to the Internet of Things (IoT). The need for a plan to connect to and monetize IoT is no longer a future initiative for many organizations—it is a reality today, with 56% of organizations seeing such a plan as strategic, according to the results of IDC's 2016 Global IoT Decision Maker Survey. 1 With the right approach, your next IoT critical infrastructure project can create com- petitive differentiation, optimize your operations, and transform your business digitally. Here are four questions to consider before designing your next project. WHEN IT MATTERS, IT RUNS ON WIND RIVER 1. Are you looking to update your legacy critical infrastructure system and simul- taneously enhance it with IoT technology? Critical infrastructure depends on long product lifecycles, and it is typically too expen- sive and too risky to regularly replace it with entirely new hardware or software. Using virtualization technology, you can look at new ways to retrofit your existing system with added software functionality to remain competitive and add (and isolate) IoT technol- ogy safely and securely, without having to restart your project entirely from scratch. 2. What is the greatest threat to the security of your device? Whether you are developing a device that will live in an isolated system or one that will be connected to the IoT throughout its deployment lifecycle, cybersecurity concerns are real and must be considered throughout a device's lifecycle, from design to decommis- sioning. You will likely want to isolate your critical code from the rest of your software, including your IoT communications interface. This minimizes exposure of your critical software from potential security threats. Here are several things you should plan for: • Have a cybersecurity development plan. Use the confidentiality, integrity, availability (CIA) model and quantify your return on investment versus the risk of a security threat. • Have a security development process. Start with assessment and run through deployment.

Articles in this issue

view archives of Checklists - IoT Critical Infrastructure Project Checklist