Embedded Technology

Mechanisms exist to configure embedded technology to be resilient to data network and power outages.


Login

Embedded Technology

Automated mechanisms exist to monitor the power levels of embedded technologies for decreased or excessive power usage, including battery drainage, to investigate for device tampering.


Login

Embedded Technology

Mechanisms exist to perform evaluations of deployed embedded technologies as needed, or at least on an annual basis, to ensure that necessary updates to mitigate the risks associated with legacy embedded technologies are identified and implemented.


Login

Embedded Technology

Mechanisms exist to enforce the security of Message Queuing Telemetry Transport (MQTT) traffic.


Login

Embedded Technology

Mechanisms exist to require embedded technologies to initiate all communications and drop new, incoming communications.


Login

Embedded Technology

Mechanisms exist to restrict embedded technologies to communicate only with authorized peers and service endpoints.


Login

Embedded Technology

Mechanisms exist to determine if embedded technologies are certified for secure use in the proposed operating environment.


Login

Embedded Technology

Level N/A

Mechanisms exist to evaluate the safety aspects of embedded technologies via a fault tree analysis, or similar method, to determine possible consequences of misuse, misconfiguration and/or failure.


Login

Embedded Technology

Mechanisms exist to enforce certificate-based authentication for embedded technologies (e.g., IoT, OT, etc.) and their supporting services.


Login

Embedded Technology

Mechanisms exist to implement embedded technologies that utilize pre-provisioned cloud trust anchors to support secure bootstrap and Zero Touch Provisioning (ZTP).


Login