2-10-1—2-10-1
>Control Description
Perform penteration testing activties to achieve early detection of vulnerable IoT software and hardware components. The approach can comprise the following:
▪ Identification and analysis of IoT assets within the penteration testing scope.
▪ Verification and exploitation of known vulnerabilities, as well as identification of unknown vulnerabilities (Zero-Day Vulnerabilities) in the IoT devices and services.
▪ Identification and assessment of insecure configurations at the application, network, data, and/ or at the sensor or device gateway level.
▪ Development and Implementation of appropriate reporting and alarming procedures to help prioritize decisions on where and how to incorporate additional cybersecurity measures.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.