2-5-1—2-5-1
>Control Description
Implement the following measures for IoT-connected mobile devices :
▪ Implement measures to secure the communication between the IoT device and the mobile devices.
▪ Restrict the access to IoT-connected mobile devices only to authorized personnel.
▪ Use secure methods of authentication for accessing the mobile device and IoT device data.
▪ Implement secure code development practices for mobile applications interacting with the IoT devices.
▪ Secure erasure of IoT devices stored data when losing the mobile device, or when the device is no longer used.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.