13. ✓ Read diagnostic data
✓ Run diagnostic routines
✗ Read movement
✗ Write movement
? Update firmware
14. ✓ Read diagnosticdata
✓ Run diagnostic routines
✗ Read movement
✗ Write movement
✗ Read program
? Update firmware
✓ Read diagnosticdata
✓ Run diagnostic routines
✗ Read movement
✗ Write movement
✗ Read program
? Update firmware
✓ Read diagnosticdata
✓ Run diagnostic routines
✗ Read movement
✗ Write movement
✗ Read program
? Update firmware
✓ Read diagnosticdata
✓ Run diagnostic routines
✗ Read movement
✗ Write movement
✗ Read program
? Update firmware
✓ Read diagnosticdata
✓ Run diagnostic routines
✗ Read movement
✗ Write movement
✗ Read program
? Update firmware
✓ Read diagnosticdata
✓ Run diagnostic routines
✗ Read movement
✗ Write movement
✗ Read program
? Update firmware
✓ Read diagnosticdata
✓ Run diagnostic routines
✗ Read movement
✗ Write movement
✗ Read program
? Update firmware
16. • Bridging legacy & modern
• Not all devices are created equal
• Life expectancy of industrial devices
• IT vs. OT
• Access:
Remote locations
Unreliable connectivity
Low bandwidth
Very complex failure scenarios
• Privacy!
17. • Too static, too fragile, too vulnerable
• Device identity context
• Risk based policies
• Dynamic & continuous identity
• Standardization
• Identity life cycle
• Identity security