  {"id":675,"date":"2024-10-17T11:52:36","date_gmt":"2024-10-17T16:52:36","guid":{"rendered":"https:\/\/uwm.edu\/csi\/?post_type=pub_post_type&#038;p=675"},"modified":"2024-10-17T11:53:57","modified_gmt":"2024-10-17T16:53:57","slug":"the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework","status":"publish","type":"pub_post_type","link":"https:\/\/uwm.edu\/csi\/publications\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\/","title":{"rendered":"The Industrial Internet Consortium Report on the Industrial IOT Security Framework"},"content":{"rendered":"\n<p>The purpose of this document, \u2018Industrial Internet of Things, Volume G4: Security Framework\u2019 (IISF) is to identify, explain and position security-related architectures, designs and technologies, as well as identify procedures relevant to trustworthy Industrial Internet of Things (IIoT) systems. It describes their security characteristics, technologies and techniques that should be applied, methods for addressing security, and how to gain assurance that the appropriate mix of issues have been addressed to meet stakeholders&#8217; expectations.<\/p>\n\n\n\n<p><strong>Note:<\/strong> The above summary was taken from page 14 of the full PDF, downloadable below.<\/p>\n\n\n\n<div class=\"uwm-u-flex uwm-u-flex--wrap uwm-u-flex--left\">\n<a class=\"uwm-c-button uwm-u-mr-20 uwm-u-mb-20\" href=\"https:\/\/uwm.edu\/csi\/wp-content\/uploads\/sites\/708\/2024\/10\/IIC_PUB_G4_V1.00_PB-compressed.pdf\" rel=\"\">Download the full PDF<\/a>\n<\/div>\n","protected":false},"author":1287,"parent":0,"template":"","class_list":["post-675","pub_post_type","type-pub_post_type","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Connected Systems Institute<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/csi\/publications\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Industrial Internet Consortium Report on the Industrial IOT Security Framework\" \/>\n<meta property=\"og:description\" content=\"The purpose of this document, \u2018Industrial Internet of Things, Volume G4: Security Framework\u2019 (IISF) is to identify, explain and position security-related architectures, designs and technologies, as well as identify procedures relevant to trustworthy Industrial Internet of Things (IIoT) systems. It &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/csi\/publications\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Connected Systems Institute\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-17T16:53:57+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/publications\\\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/publications\\\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\\\/\",\"name\":\"The Industrial Internet Consortium Report on the Industrial IOT Security Framework - Connected Systems Institute\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/#website\"},\"datePublished\":\"2024-10-17T16:52:36+00:00\",\"dateModified\":\"2024-10-17T16:53:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/publications\\\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/csi\\\/publications\\\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/publications\\\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\",\"item\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/about\\\/publications\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Industrial Internet Consortium Report on the Industrial IOT Security Framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/\",\"name\":\"Connected Systems Institute\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/#organization\",\"name\":\"University of Wisconsin - Milwaukee\",\"url\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/wp-content\\\/uploads\\\/sites\\\/708\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/wp-content\\\/uploads\\\/sites\\\/708\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"width\":225,\"height\":224,\"caption\":\"University of Wisconsin - Milwaukee\"},\"image\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/csi\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Connected Systems Institute","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/csi\/publications\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\/","og_locale":"en_US","og_type":"article","og_title":"The Industrial Internet Consortium Report on the Industrial IOT Security Framework","og_description":"The purpose of this document, \u2018Industrial Internet of Things, Volume G4: Security Framework\u2019 (IISF) is to identify, explain and position security-related architectures, designs and technologies, as well as identify procedures relevant to trustworthy Industrial Internet of Things (IIoT) systems. It &hellip;","og_url":"https:\/\/uwm.edu\/csi\/publications\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\/","og_site_name":"Connected Systems Institute","article_modified_time":"2024-10-17T16:53:57+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/csi\/publications\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\/","url":"https:\/\/uwm.edu\/csi\/publications\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\/","name":"The Industrial Internet Consortium Report on the Industrial IOT Security Framework - Connected Systems Institute","isPartOf":{"@id":"https:\/\/uwm.edu\/csi\/#website"},"datePublished":"2024-10-17T16:52:36+00:00","dateModified":"2024-10-17T16:53:57+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/csi\/publications\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/csi\/publications\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/csi\/publications\/the-industrial-internet-consortium-report-on-the-industrial-iot-security-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/csi\/"},{"@type":"ListItem","position":2,"name":"Publications","item":"https:\/\/uwm.edu\/csi\/about\/publications\/"},{"@type":"ListItem","position":3,"name":"The Industrial Internet Consortium Report on the Industrial IOT Security Framework"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/csi\/#website","url":"https:\/\/uwm.edu\/csi\/","name":"Connected Systems Institute","description":"","publisher":{"@id":"https:\/\/uwm.edu\/csi\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/csi\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uwm.edu\/csi\/#organization","name":"University of Wisconsin - Milwaukee","url":"https:\/\/uwm.edu\/csi\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uwm.edu\/csi\/#\/schema\/logo\/image\/","url":"https:\/\/uwm.edu\/csi\/wp-content\/uploads\/sites\/708\/2020\/11\/uwm-seo-logo.jpg","contentUrl":"https:\/\/uwm.edu\/csi\/wp-content\/uploads\/sites\/708\/2020\/11\/uwm-seo-logo.jpg","width":225,"height":224,"caption":"University of Wisconsin - Milwaukee"},"image":{"@id":"https:\/\/uwm.edu\/csi\/#\/schema\/logo\/image\/"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/pub_post_type\/675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/pub_post_type"}],"about":[{"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/types\/pub_post_type"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/users\/1287"}],"version-history":[{"count":2,"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/pub_post_type\/675\/revisions"}],"predecessor-version":[{"id":678,"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/pub_post_type\/675\/revisions\/678"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/csi\/wp-json\/wp\/v2\/media?parent=675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}