Getting Started: Introduction for Security Roles

What Does This Article Cover?

This article provides guidance for Information Security roles that may indirectly support an Industrial DataOps project. The article provides a brief overview ofHighByte Intelligence Hub and some basic Information Security related considerations.

  • What is HighByte Intelligence Hub?
  • Application security considerations
  • Data security considerations
  • Other related material

What is HighByte Intelligence Hub?

HighByte Intelligence Hub is an Industrial DataOps software solution designed specifically for industrial data modeling, delivery, and governance. The software securely connects devices, files, databases, and systems via open standards and native connections. The Intelligence Hub typically runs on-premises at the Edge and scales from embedded to server-grade computing platforms.

The Intelligence Hub can be configured to buffer data for the purpose of store and forward but is not used to persist data at scale. Rather, the Intelligence Hub passes through modeled and contextualized data payloads.

The Intelligence Hub is not cloud-hosted software as a service.

Application Security Considerations

Intelligence Hub is a Java application that is accessed via a web browser. Intelligence Hub provides built-in user management functionality allowing the end user to control access to and permissions within the application. Users can be created and assigned roles with claims to allow them to perform certain types of operations.

Customers are also able to use an external identity provider (SAML or Active Directory) to govern access to the Intelligence Hub Application. It is the responsibility of the end user to ensure the security of the external identity provider and to ensure secure communication between the Intelligence Hub and the identity provider.

Data Security Considerations

HighByte Intelligence Hub encrypts data in transit with 128-bit encryption.  The Intelligence Hub has several connectors to send and receive with external systems.  The end-to-end encryption is a function of a connectors’ underlying protocol and the external system.  Most protocols support TLS v1.2 with AES128.  Some operational technology (OT) protocols, such as Modbus TCP, lack transport security support in the market.   The Intelligence Hub’s connections are built with only actively supported SDKs and APIs.

HighByte Intelligence Hub does not persist data at scale.  It primarily moves data.  It connects to data sources, transforms, models, and delivers data to target systems.

Other related material: