Background and Security Questions

Background
The Factory Integration focus team within IRDS (Successor to the International Technology Roadmap for Semiconductors 2.0) is planning to upgrade its Security description to a sub-chapter. The goal is to better understand the needs, challenges and potential for Security in the microelectronics industry and its supply chain.
Your participation is greatly appreciated. If you provide your e-mail address at the end of this Survey, we can provide you with the consolidated results of the survey (with no participant names mentioned).

Question Title

* 1. Which of the following topics do you feel are the most important with respect to data and data system security in today’s microelectronics manufacturing ecosystem (choose top three priority topics and identify the order of your priorities)

  1st highest priority 2nd highest priority 3rd highest priority
Security measures to support data partitioning with IP protection to support cooperation between user, supplier, and/or OEM
Security measures to support partitioning of IP between design and operation
Security measures to protect manufacturing IP from malicious and non-malicious exposure
Security risk on firm/software update
Impact of deploying security counter measures on system performance (such as reduced performance, functionality or safety)
Security risk by authorized person with malicious intent, including active surveillance and attack (threft, corruption etc.)
Adoption of IT standards for identity and access management, (such as OAuth, SAML, LDAP), for human and non-human access, to facilitate single sign-on and central management on user accounts throughout Fab (including production equipment)
Implementing security measures to legacy production equipment and components
Security measure to facilitate supply chain traceability with data integrity and security

Question Title

* 2. What do you do today for the topic you identified in Q1? Do you reference or follow any standards? Do you use any commercial software?

  Following Standards Using commercial software
For the 1st priority topic
For the 2nd priority topic
For the 3rd priority topic

Question Title

* 3. What is your level of success in addressing security issue today in relation  to topics chosen in Q1?

  No success  Very limited success Limited success Modest success Successful Very successful
For the 1st priority topic
For the 2nd priority topic
For the 3rd priority topic

Question Title

* 4. Please quantify the risk in the topical area with no security?

  Very Low Low Medium High Very High
For the 1st priority topic
For the 2nd priority topic
For the 3rd priority topic

Question Title

* 5. Please quantify the risk in the topical area with currently implemented security?

  Very Low Low Medium High Very High
For the 1st priority topic
For the 2nd priority topic
For the 3rd priority topic

Question Title

* 6. What do you feel are the biggest gaps for each high priority topics chosen in Q1? What do you need or require?

Question Title

* 7. Are there gaps or opportunities with the high priority security topics chosen in Q1 specifically related to big data systems?

  Gaps Opportunities Both Neither
For the 1st priority topic
For the 2nd priority topic
For the 3rd priority topic

Question Title

* 8. Are there any SW applications or capabilities that would be impacted by implementing  security measures? (If so give brief example…)

Question Title

* 9. Which description would most accurately describe your company?

T