“…To ensure cyber risk is reduced, cloud technologies should be supported with: internet-based system, service platforms (La and Kim, 2010;Dillon et al, 2011;Wahlster et al, 2013;Wan, Cai and Zhou, 2015;Weyer et al, 2015), processes, services (Stock and Seliger, 2016;Hussain, 2017) (Brettel et al, 2016;Hermann, Pentek and Otto, 2016;Wang et al, 2016), for machine decision making (Evans and Annunziata, 2012; Wang, 2013) (Wahlster et al, 2013;Shafiq et al, 2015). Creating cyber service architecture (La and Kim, 2010;Wang, Törngren and Onori, 2015;Weyer et al, 2015) and cloud distributed manufacturing planning (Wang, 2013;Wan, Cai and Zhou, 2015) (Faller and FeldmĂŒller, 2015;Posada et al, 2015). Cyber risk mitigation also require compiling of data, processes, devices and systems (Evans and Annunziata, 2012;Shafiq et al, 2015), connection to model-driven systems (Jensen, Chang and Lee, 2011;Shi et al, 2011;Wang et al, 2014), and model-based platforms (Stojmenovic, 2014;Ringert, Rumpe and Wortmann, 2015), for cyber manufacturing (Wahlster et al, 2013;Lee, Kao and Yang, 2014;Bauer et al, 2015;Wan, Cai and Zhou, 2015).…”