Mechanisms exist to configure embedded technology to be resilient to data network and power outages.
Mechanisms exist to configure embedded technology to be resilient to data network and power outages.
Automated mechanisms exist to monitor the power levels of embedded technologies for decreased or excessive power usage, including battery drainage, to investigate for device tampering.
Mechanisms exist to perform evaluations of deployed embedded technologies as needed, or at least on an annual basis, to ensure that necessary updates to mitigate the risks associated with legacy embedded technologies are identified and implemented.
Mechanisms exist to enforce the security of Message Queuing Telemetry Transport (MQTT) traffic.
Mechanisms exist to require embedded technologies to initiate all communications and drop new, incoming communications.
Mechanisms exist to restrict embedded technologies to communicate only with authorized peers and service endpoints.
Mechanisms exist to determine if embedded technologies are certified for secure use in the proposed operating environment.
Mechanisms exist to evaluate the safety aspects of embedded technologies via a fault tree analysis, or similar method, to determine possible consequences of misuse, misconfiguration and/or failure.
Mechanisms exist to enforce certificate-based authentication for embedded technologies (e.g., IoT, OT, etc.) and their supporting services.
Mechanisms exist to implement embedded technologies that utilize pre-provisioned cloud trust anchors to support secure bootstrap and Zero Touch Provisioning (ZTP).