Under active development Content is continuously updated and improved

2-10-12-10-1

>Control Description

Perform penteration testing activties to achieve early detection of vulnerable IoT software and hardware components. The approach can comprise the following: ▪ Identification and analysis of IoT assets within the penteration testing scope. ▪ Verification and exploitation of known vulnerabilities, as well as identification of unknown vulnerabilities (Zero-Day Vulnerabilities) in the IoT devices and services. ▪ Identification and assessment of insecure configurations at the application, network, data, and/ or at the sensor or device gateway level. ▪ Development and Implementation of appropriate reporting and alarming procedures to help prioritize decisions on where and how to incorporate additional cybersecurity measures.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.