Architecting the Industrial Internet
上QQ阅读APP看书,第一时间看更新

Security considerations for the usage viewpoint

Following are the security considerations for implementing the usage viewpoint:

  • Security monitoring continuously collects security-related data from events or activities, and analyzes it for security risks
  • Security auditing collects, stores, and analyzes security-related information
  • Security policy defines the usage and constraints for each user, role, and component
  • Cryptographic support management stores, manages, grants, and revokes secure credentials, and provides global key management