WebsiteGear Logo Log In
New User? Sign Up
About | Contact | FAQ
  Home News Technology Internet Security Monday, February 2, 2026 
Add Press Release News | News Feeds Feeds | Email This News Email


Industrial Internet Consortium White Paper Describes MILS Architectural Approach to Trustworthy IIoT Systems
Thursday, March 18, 2021

Ensuring a high level of assurance of security and safety for key industries

BOSTON, March 10, 2021 /PRNewswire-PRWeb/ -- The Industrial Internet Consortium® (IIC(TM)) today announced the MILS Architectural Approach Supporting Trustworthiness of IIoT Solutions white paper. The new paper describes the MILS architectural approach, which is a strategy for cost-effective construction of systems that require dependability and high assurance. The paper explains how the architectural approach helps in building trustworthy IIoT systems and includes MILS case studies.

"MILS builds on and extends a long tradition of work on architectural approaches to security and provides methods and tools to create high-assurance architectures for secure information sharing and dependable systems," said Rance J. DeLong, security and assurance consultant, Staff Scientist, The Open Group, and one of the authors of the white paper. "These approaches leverage system architecture to prohibit unauthorized subjects from accessing or modifying sensitive information. A thoughtful architecture also limits damage from a compromised or failed subject."

Initially, the acronym "MILS" stood for Multiple Independent Levels of Security/Safety. Today, it is used as a proper name for an approach that starts with partitioning a system into isolated compartments, or security domains. While it comprises much more, the MILS architecture is often characterized as the use of a separation kernel on a system to run applications belonging to diverse security domains or that have different levels of safety requirements. MILS supports scalable, distributed, and heterogeneous environments and dynamically changing configurations. It enhances the trustworthiness of IIoT systems, including the five critical characteristics featured in the IIC Industrial Internet Security Framework (IISF) - safety, reliability, resilience, security, and privacy.

"A key MILS objective is to encourage a competitive commercial marketplace of off-the-shelf high-assurance components," said Ekaterina Rudina, Security Analysis Group Manager, Kaspersky, and one of the authors of the white paper. "The technologies underlying MILS and the tool chain supporting MILS system development enable reasoning about the interaction of the components, criticalities and resulting functionality, and trustworthiness characteristics. MILS is ideal for systems requiring a high level of assurance for security, safety, or other key characteristics in sectors such as automotive, avionics, industrial automation, defense, and critical infrastructures."

The MILS Architectural Approach Supporting Trustworthiness of the IIoT Solutions white paper white paper can be found here on the IIC website.

About Industrial Internet Consortium
The Industrial Internet Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT). Our mission is to deliver transformative business value to organizations, industry, and society by accelerating adoption of a trustworthy internet of things. The Industrial Internet Consortium is a program of the Object Management Group (OMG). For more information visit http://www.iiconsortium.org.

Note to editors: Industrial Internet Consortium is a registered trademark of OMG. For a listing of all OMG trademarks, visit https://www.omg.org/legal/tm_list.htm. All other trademarks are the property of their respective owners.

Media Contact

Karen Quatromoni, Industrial Internet Consortium, 978-855-0412, Karen@omg.org

SOURCE Industrial Internet Consortium



Email This News Email | Submit To Slashdot Slashdot | Submit To Digg.com Digg | Submit To del.icio.us Del.icio.us | News Feeds Feeds

RELATED NEWS ARTICLES
Nav Identiv Completes Thailand Manufacturing Transition, Unlocking Next-Generation Multicomponent Manufacturing for Advanced IoT Solutions | Jan 22, 2026
Nav New Report Names States Most Vulnerable to Holiday Scams | Jan 22, 2026
Nav Android Mobile Adware Surges in Second Half of 2025 | Jan 22, 2026
Nav Breakthrough Progress: METiS TechBio Publishes Consecutive Research Findings in Nature Communications and the Journal for ImmunoTherapy of Cancer | Jan 22, 2026
Nav Truvista Fiber Acquires SlyTel | Jan 22, 2026
Nav Healthcare Industry Executives are Likely to be Personal Targets of Cybercrime | Jan 22, 2026
Nav LG ELECTRONICS INTRODUCES 2026 LG GRAM LINEUP ELEVATED BY AEROMINUM | Jan 22, 2026
Nav pgEdge Announces pgEdge Agentic AI Toolkit for Postgres | Jan 22, 2026
Nav Global Cyber Alliance Identifies Five Cybersecurity Forces That Defined 2025 - And Will Shape 2026 | Jan 22, 2026
Nav Guardz 2025 SMB Cybersecurity Report: Nearly 50% of U.S. Small Businesses Have Been Hit by Cyber Attack | Jan 22, 2026
NEWS SEARCH

FEATURED NEWS | POPULAR NEWS
Submit News | View More News View More News