2-15-1—2-15-1
>Control Description
Utilize hardware that embeds cybersecurity functions at the component level, to maintain protection and integrity of the device, and it is advised to implement the following requirements to secure IoT hardware components, where applicable:
▪ Deploy a Hardware Root of Trust component, which helps in authenticating hardware, firmware, and software components before loading them. It also helps in establishing trust in the boot environment.
▪ Include only essential physical external ports that are necessary for the IoT device to function and enable only trusted connections to access and function on the physical ports.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.