ThreatGet: Ensuring the Implementation of Defense-in-Depth Strategy for IIoT Based on IEC 62443

Christoph Schmittner, Abdelkader Magdy Shaaban, Georg MacHer

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Security engineering is a major challenge in the distributed and heterogeneous nature of the Industrial Internet of Things (IIoT). While IEC 62443 is available as a security engineering standard for the industrial domain, the increased complexity and dynamic of combining IoT with industrial sys-tems challenges approaches without automation. Security analy-sis in the IIoT with a model-based engineering tool is essential to ensure the proper method is applied to protect the system model. This work follows the Defense-in-depth strategy presented by IEC 62443, then adapted for IIoT applications. We use ThreatGet threat modeling tool to show how this strategy could be implemented in the IIoT domain using threat modeling. The research findings demonstrate how the threat modeling approach ensures the implementation of a defense-in-depth strategy in the IIoT domain.

Original languageEnglish
Title of host publicationProceedings - 2022 IEEE 5th International Conference on Industrial Cyber-Physical Systems, ICPS 2022
PublisherInstitute of Electrical and Electronics Engineers
Number of pages6
ISBN (Electronic)9781665497701
DOIs
Publication statusPublished - 2022
Event5th IEEE International Conference on Industrial Cyber-Physical Systems: ICPS 2022 - Virtual, Online, United Kingdom
Duration: 24 May 202226 May 2022

Conference

Conference5th IEEE International Conference on Industrial Cyber-Physical Systems
Abbreviated titleICPS 2022
Country/TerritoryUnited Kingdom
CityVirtual, Online
Period24/05/2226/05/22

Keywords

  • IEC 62443
  • IIoT
  • Model-based
  • Security Analysis

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Science Applications
  • Software
  • Information Systems and Management
  • Industrial and Manufacturing Engineering
  • Control and Optimization

Fingerprint

Dive into the research topics of 'ThreatGet: Ensuring the Implementation of Defense-in-Depth Strategy for IIoT Based on IEC 62443'. Together they form a unique fingerprint.

Cite this