2-15-2—2-15-2
>Control Description
Define and implement steps for installing and setting up an IoT device and service. It is recommended that these steps are in alignment with cybersecurity best practices regarding the usability of the device and service such as but not limited to:
▪ Apply secure configuration and hardening options that are applicable to the organization, such as disabling certain features or functionalities that would not be used by the organization.
▪ Implement secure set up and configuration to the IoT device, in order to reduce the exposure to threats; such as ensuring all IoT devices and related applications/services don't contain default or hardcoded passwords, and to be unique and complex.
▪ Implement cybersecurity tests prior to deploying the application in the production environment.
▪ Periodically conduct cybersecurity tests before and after every new software release.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.