
enable adaptive security mechanisms that respond to
new threats and continuously optimize compliance
monitoring, making security processes more scalable
and adaptable. These advances could further close the
gap between security modeling and real-time enforce-
ment, ensuring that IIoT processes remain secure and
compliant throughout their lifecycle, even as indus-
trial environments become more complex.
REFERENCES
Bernardo, R., Galina, S. V. R., and de P
´
adua, S. I. D. (2017).
The BPM lifecycle: How to incorporate a view ex-
ternal to the organization through dynamic capability.
Bus. Process. Manag. J., 23(1):155–175.
Dumas, M., Rosa, M. L., Mendling, J., and Reijers, H. A.
(2018). Fundamentals of Business Process Manage-
ment, Second Edition. Springer.
Engelberg, G., Hadad, M., and Soffer, P. (2021). From net-
work traffic data to business activities: A process min-
ing driven conceptualization. In Enterprise, Business-
Process and Information Systems Modeling BPMDS,
volume 421, pages 3–18. Springer.
ENISA (2018). Good Practices for Security of Internet of
Things in the context of Smart Manufacturing. Euro-
pean Union Agency for Cybersecurity.
Goncharov, E. (2018). Challenges of industrial cybersecu-
rity. Kaspersky Lab ICS CERT, 5.
Hadad, M., Engelberg, G., and Soffer, P. (2023). From net-
work traffic data to a business-level event log. In En-
terprise, Business-Process and Information Systems
Modeling - 24th International Conference, BPMDS,
volume 479, pages 60–75. Springer.
Hansen, H. R., Mendling, J., and Neumann, G. (2019).
Wirtschaftsinformatik (12. Aufl.). De Gruyter
Studium.
Hornsteiner, M., Empl, P., Bunghardt, T., and Sch
¨
onig, S.
(2024). Reading between the lines: Process mining
on OPC UA network data. Sensors, 24(14):4497.
Hornsteiner, M. and Sch
¨
onig, S. (2023). SIREN: design-
ing business processes for comprehensive industrial
iot security management. In 18th International Con-
ference on Design Science Research in Information
Systems and Technology, DESRIST, volume 13873 of
Lecture Notes in Computer Science, pages 379–393.
Springer.
Hornsteiner, M., Stoiber, C., and Sch
¨
onig, S. (2022).
Towards security- and iiot-aware BPMN: A sys-
tematic literature review. In ICSBT, pages 45–56.
SCITEPRESS.
IEC (2009). Cybersecurity for Operational Technology in
Automation and Control Systems. Standard, Interna-
tional Electrotechnical Commission.
K
¨
olbel, L., Hornsteiner, M., and Sch
¨
onig, S. (2024). Guide-
line for manual process discovery in industrial iot.
CoRR, abs/2410.11915.
Mendling, J., Reijers, H. A., and van der Aalst, W. M. P.
(2010). Seven process modeling guidelines (7PMG).
Inf. Softw. Technol., 52(2):127–136.
Myers, D., Radke, K., Suriadi, S., and Foo, E. (2017).
Process discovery for industrial control system cyber
attack detection. In ICT Systems Security and Pri-
vacy Protection, volume 502 of Advances in Infor-
mation and Communication Technology, pages 61–75.
Springer.
Oberhofer, D., Hornsteiner, M., and Sch
¨
onig, S. (2024).
Process-aware security standard compliance monitor-
ing and verification for the iiot. In 32nd European
Conference on Information Systems ECIS.
Palattella, M. R., Dohler, M., Grieco, L. A., Rizzo, G.,
Torsner, J., Engel, T., and Ladid, L. (2016). Internet of
things in the 5g era: Enablers, architecture, and busi-
ness models. IEEE J. Sel. Areas Commun., 34(3):510–
527.
Parker, S., Wu, Z., and Christofides, P. D. (2023). Cyberse-
curity in process control, operations, and supply chain.
Comput. Chem. Eng., 171:108169.
Pulsipher, D. W., Scott, A., and Reeb, F. (2022). An argu-
ment for a holistic approach to critical infrastructure
security. Intel Corporation.
Sch
¨
onig, S., Hornsteiner, M., and Stoiber, C. (2022).
Towards process-oriented iiot security management:
Perspectives and challenges. In Enterprise, Business-
Process and Information Systems Modeling - 23rd
International Conference, BPMDS, pages 18–26.
Springer.
Serror, M., Hack, S., Henze, M., Schuba, M., and Wehrle,
K. (2021). Challenges and opportunities in securing
the industrial internet of things. IEEE Trans. Ind. In-
formatics, 17(5):2985–2996.
Sisinni, E., Saifullah, A., Han, S., Jennehag, U., and Gid-
lund, M. (2018). Industrial internet of things: Chal-
lenges, opportunities, and directions. IEEE Trans. Ind.
Informatics, 14(11):4724–4734.
Tange, K., Donno, M. D., Fafoutis, X., and Dragoni, N.
(2020). A systematic survey of industrial internet
of things security: Requirements and fog comput-
ing opportunities. IEEE Commun. Surv. Tutorials,
22(4):2489–2520.
van der Aalst, W. M. P. (2010). Process discovery: Captur-
ing the invisible. IEEE Comput. Intell. Mag., 5(1):28–
41.
Wakup, C. and Desel, J. (2014). Analyzing a tcp/ip-protocol
with process mining techniques. In Business Process
Management Workshop, volume 202, pages 353–364.
Weske, M. (2012). Business Process Management -
Concepts, Languages, Architectures, 2nd Edition.
Springer.
zur Muehlen, M. and Ho, D. T. (2005). Risk management in
the BPM lifecycle. In Bussler, C. and Haller, A., ed-
itors, Business Process Management Workshops, Re-
vised Selected Papers, volume 3812, pages 454–466.
A Reflection on Process-Oriented Industrial IoT Security Management
253