Manufacturing Data Security Survey for IRDS FI Roadmap

Background and Security Questions

Background
The Factory Integration focus team within IRDS (Successor to the International Technology Roadmap for Semiconductors 2.0) is planning to upgrade its Security description to a sub-chapter. The goal is to better understand the needs, challenges and potential for Security in the microelectronics industry and its supply chain.
Your participation is greatly appreciated. If you provide your e-mail address at the end of this Survey, we can provide you with the consolidated results of the survey (with no participant names mentioned).
1.Which of the following topics do you feel are the most important with respect to data and data system security in today’s microelectronics manufacturing ecosystem (choose top three priority topics and identify the order of your priorities)
1st highest priority
2nd highest priority
3rd highest priority
Security measures to support data partitioning with IP protection to support cooperation between user, supplier, and/or OEM
Security measures to support partitioning of IP between design and operation
Security measures to protect manufacturing IP from malicious and non-malicious exposure
Security risk on firm/software update
Impact of deploying security counter measures on system performance (such as reduced performance, functionality or safety)
Security risk by authorized person with malicious intent, including active surveillance and attack (threft, corruption etc.)
Adoption of IT standards for identity and access management, (such as OAuth, SAML, LDAP), for human and non-human access, to facilitate single sign-on and central management on user accounts throughout Fab (including production equipment)
Implementing security measures to legacy production equipment and components
Security measure to facilitate supply chain traceability with data integrity and security
2.What do you do today for the topic you identified in Q1? Do you reference or follow any standards? Do you use any commercial software?
Following Standards
Using commercial software
For the 1st priority topic
For the 2nd priority topic
For the 3rd priority topic
3.What is your level of success in addressing security issue today in relation  to topics chosen in Q1?
No success
 Very limited success
Limited success
Modest success
Successful
Very successful
For the 1st priority topic
For the 2nd priority topic
For the 3rd priority topic
4.Please quantify the risk in the topical area with no security?
Very Low
Low
Medium
High
Very High
For the 1st priority topic
For the 2nd priority topic
For the 3rd priority topic
5.Please quantify the risk in the topical area with currently implemented security?
Very Low
Low
Medium
High
Very High
For the 1st priority topic
For the 2nd priority topic
For the 3rd priority topic
6.What do you feel are the biggest gaps for each high priority topics chosen in Q1? What do you need or require?
7.Are there gaps or opportunities with the high priority security topics chosen in Q1 specifically related to big data systems?
Gaps
Opportunities
Both
Neither
For the 1st priority topic
For the 2nd priority topic
For the 3rd priority topic
8.Are there any SW applications or capabilities that would be impacted by implementing  security measures? (If so give brief example…)
9.Which description would most accurately describe your company?(Required.)
10.Thank you for your cooperation!! Do you want a copy of the consolidated survey results?