Industrial Edge Hub Security¶
The Industrial Edge Hub is a component of the Industrial Edge ecosystem which is centrally provided by Siemens and running in the cloud. The Industrial Edge Hub is used for
- License management,
- Registering customer-specific Industrial Edge Managements,
- Importing Industrial Edge Apps to the Industrial Edge Management instances, and
- Getting Software to create Industrial Edge related components.
Industrial Edge Hub provides for example the following software:
- Industrial Edge App Publisher
- Helm chart and ISOs for setting up an Industrial Edge Management
- Device builder kits for creating Industrial Edge Devices.
The following security measures are applied to the Industrial Edge Hub installation:
Component | Purpose | Description |
---|---|---|
Certified data center provider | Ensure professional, secure and highly available operations of data centers. | The IE Hub is hosted on platforms of certified cloud data center providers only. Shared responsibilities principles are applied between data center provider and the IE Hub operator. Data center provider is certified according to SOC 2 and ISO 27001. The location of the datacenter which hosts IEHUB is Frankfurt. |
Backup and recovery | Backup strategy | Backups are created regularly. Daily backups available for one week, weekly backups are created for a month. |
Shared responsibility principle and certified data center provider | To separate data and operation from platform and service Shared responsibilities principles are applied between data center provider and IE Hub operator. | Data center provider is certified at least according to SOC 2 and ISO 27001. |
Firewall | Firewall configuration of data center services | Web Application Firewall (WAF) or Next-Generation Firewall (NGFW) are used within data centers to protect the endpoints. |
Detection of security issues | Penetration testing | Penetration tests for the IEHub application workload and infrastructure are performed on a regular basis |
Security monitoring and logging | Auditing user-related IEH activities | All user logins, permission changes and activites performed by a user are logged and analyzed. The auditlogs are stored for 90 days. |