Supplier eBooks

Cypress - 7 Experts on IoT Security and Privacy

Issue link: https://resources.mouser.com/i/1516458

Contents of this Issue

Navigation

Page 25 of 32

26 Ensure secure operation. This point is about maintaining the security of IoT devices over their lifetime. Mosel says, "It involves monitoring products to make sure that they are patched and updated. You need to see that users are operating devices in a secure way and have the ability to scan for open ports or other kinds of vulnerabilities." Some of these operational monitoring capabilities can come from outside monitoring services; some can be built into devices so that they can monitor their own security status. Create incident response and vulnerability-handling capabilities. An important part of IoT security is having the ability to detect and mitigate vulnerabilities. This ability can come from discovering vulnerabilities in devices that are in service or a device becoming infected with malicious software. "You must be able to inform customers, publish security advisories, and offer forensic support, if necessary," Mosel explains. Mosel believes that secure IoT solutions require a life-cycle approach in which product design is just the beginning. He sees a future in which more product developers will offer operational support services that span the service lifetime of the devices they manufacture. 26 " Make sure that the components in your products are registered for vulnerability monitoring. That way, if you become aware of vulnerabilities, you can inform your customers."

Articles in this issue

view archives of Supplier eBooks - Cypress - 7 Experts on IoT Security and Privacy