- Architecting the Industrial Internet
- Shyam Nath Robert Stackowiak Carla Romano
- 68字
- 2025-04-04 18:19:20
Security considerations for the usage viewpoint
Following are the security considerations for implementing the usage viewpoint:
- Security monitoring continuously collects security-related data from events or activities, and analyzes it for security risks
- Security auditing collects, stores, and analyzes security-related information
- Security policy defines the usage and constraints for each user, role, and component
- Cryptographic support management stores, manages, grants, and revokes secure credentials, and provides global key management