Industrial Internet Consortium White Paper Describes MILS Architectural Approach to Trustworthy IIoT Systems
Thursday, March 18, 2021
Ensuring a high level of assurance of security and safety for key industries
BOSTON, March 10, 2021 /PRNewswire-PRWeb/ -- The Industrial Internet Consortium® (IIC(TM)) today announced the MILS Architectural Approach Supporting Trustworthiness of IIoT Solutions white paper. The new paper describes the MILS architectural approach, which is a strategy for cost-effective construction of systems that require dependability and high assurance. The paper explains how the architectural approach helps in building trustworthy IIoT systems and includes MILS case studies.
"MILS builds on and extends a long tradition of work on architectural approaches to security and provides methods and tools to create high-assurance architectures for secure information sharing and dependable systems," said Rance J. DeLong, security and assurance consultant, Staff Scientist, The Open Group, and one of the authors of the white paper. "These approaches leverage system architecture to prohibit unauthorized subjects from accessing or modifying sensitive information. A thoughtful architecture also limits damage from a compromised or failed subject."
Initially, the acronym "MILS" stood for Multiple Independent Levels of Security/Safety. Today, it is used as a proper name for an approach that starts with partitioning a system into isolated compartments, or security domains. While it comprises much more, the MILS architecture is often characterized as the use of a separation kernel on a system to run applications belonging to diverse security domains or that have different levels of safety requirements. MILS supports scalable, distributed, and heterogeneous environments and dynamically changing configurations. It enhances the trustworthiness of IIoT systems, including the five critical characteristics featured in the IIC Industrial Internet Security Framework (IISF) - safety, reliability, resilience, security, and privacy.
"A key MILS objective is to encourage a competitive commercial marketplace of off-the-shelf high-assurance components," said Ekaterina Rudina, Security Analysis Group Manager, Kaspersky, and one of the authors of the white paper. "The technologies underlying MILS and the tool chain supporting MILS system development enable reasoning about the interaction of the components, criticalities and resulting functionality, and trustworthiness characteristics. MILS is ideal for systems requiring a high level of assurance for security, safety, or other key characteristics in sectors such as automotive, avionics, industrial automation, defense, and critical infrastructures."
The MILS Architectural Approach Supporting Trustworthiness of the IIoT Solutions white paper white paper can be found here on the IIC website.
About Industrial Internet Consortium The Industrial Internet Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT). Our mission is to deliver transformative business value to organizations, industry, and society by accelerating adoption of a trustworthy internet of things. The Industrial Internet Consortium is a program of the Object Management Group (OMG). For more information visit http://www.iiconsortium.org.
Note to editors: Industrial Internet Consortium is a registered trademark of OMG. For a listing of all OMG trademarks, visit https://www.omg.org/legal/tm_list.htm. All other trademarks are the property of their respective owners.
Media Contact
Karen Quatromoni, Industrial Internet Consortium, 978-855-0412, Karen@omg.org
SOURCE Industrial Internet Consortium
|
|
|
 |
Indusface redefines WAAP user experience with industry-first innovations in AppTrana | Mar 28, 2025
|
 |
EXECUTIVE PRODUCER BRADLEY COOPER'S FILM CAREGIVING TO PREMIERE ON PBS FOR NATIONWIDE BROADCAST JUNE 24 STREAMING BEGINS MAY 27 | Mar 28, 2025
|
 |
Trend Micro Launches Voice-Enabled ScamCheck Capability to Help Protect Consumers from the Rising Threat of Global Scams | Mar 28, 2025
|
 |
Splitit Unveils First Fully Embedded White-Label Installment Solution for Shopify Merchants | Mar 28, 2025
|
 |
/C O R R E C T I O N -- Bell Canada (MTL)/ | Mar 28, 2025
|
 |
Keeper Security Unveils Latest WearOS App for Seamless Password Management | Mar 28, 2025
|
 |
Leading Endpoint Protection Solutions for Combatting Cyberthreats Identified in Info-Tech Research Group's New Emotional Footprint Report | Mar 28, 2025
|
 |
Hornetsecurity named Top Player in Radicati's Secure Email - Market Quadrant 2025 | Mar 28, 2025
|
 |
Ontinue Research Reveals Ransomware Attacks Surged 132% Despite 35% Drop in Payments | Mar 28, 2025
|
 |
Identity Theft After a Data Breach? Legal Action May Recover Your Losses | Console & Associates | Mar 28, 2025
|
|
|