Add compliance positioning to security page

znetsixe
2026-03-23 11:39:18 +01:00
parent 66ada8095e
commit 88d862172d

@@ -24,6 +24,87 @@ flowchart TD
- Site and edge layers receive bounded requests, advice, or setpoints. - Site and edge layers receive bounded requests, advice, or setpoints.
- Edge remains protected behind intermediate layers. - Edge remains protected behind intermediate layers.
## Purdue-Aligned Segmentation
EVOLV is designed to fit a Purdue-style industrial segmentation model:
- field and PLC assets remain at the lower operational layers
- edge runtimes sit close to the process and are not exposed as public integration surfaces
- site systems mediate plant-local services and isolate OT from broader enterprise traffic
- central services host APIs, identity, analytics, and engineering functions above the plant boundary
This matters because it gives a clear answer to external reviewers:
- EVOLV does not require direct enterprise-to-field access
- EVOLV can preserve layered trust boundaries between PLCs, edge runtimes, site services, and central platforms
- EVOLV can support zone/conduit style security designs instead of flattening OT and IT into one network
## European Regulatory Positioning
EVOLV should be described as an architecture that can support compliance with strict European requirements, not as a system that is automatically compliant by default.
### NIS2
Directive (EU) 2022/2555 (NIS2) requires cybersecurity risk-management measures and incident handling for important and essential entities.
This architecture supports that direction by:
- separating edge, site, and central responsibilities
- reducing direct exposure of operational assets
- allowing central policy, identity, logging, and oversight
- preserving local operation during upstream disruption
### CER
Directive (EU) 2022/2557 (Critical Entities Resilience Directive) focuses on resilience of essential services.
This architecture supports CER-style resilience expectations by:
- keeping local and site operation viable during central outages
- enabling business-continuity and degraded-mode operation
- supporting multiple operational layers instead of one central dependency
### Cyber Resilience Act
Regulation (EU) 2024/2847 (Cyber Resilience Act) sets horizontal cybersecurity requirements for products with digital elements.
Where EVOLV components are packaged, distributed, and maintained as digital products, the platform direction supports CRA-aligned engineering by:
- avoiding hard-coded secrets in tracked manifests
- treating updates, identity, security boundaries, and lifecycle management as platform concerns
- supporting traceable releases through central source control and CI/CD
### GDPR
Regulation (EU) 2016/679 (GDPR) applies where EVOLV processes personal data.
The architecture helps support GDPR obligations by:
- centralizing external API ingress
- limiting unnecessary spread of sensitive data toward field layers
- enabling clearer control over access, logging, and retention boundaries
## What We Can Defensibly Claim
The safe and accurate claim is:
- EVOLV can be deployed in a way that aligns with strict European cybersecurity and resilience expectations
- EVOLV can support Purdue-style layered OT/IT segmentation
- EVOLV can be engineered to satisfy strong governance, audit, and access-control requirements
The claim that should be avoided is:
- "EVOLV is automatically compliant"
Actual compliance still depends on:
- configuration
- site implementation
- monitoring and incident response
- supplier and patch management
- data-classification and retention policy
- documented operational controls
## Why This Matters ## Why This Matters
- lower exposure of OT assets - lower exposure of OT assets