Podcast
Questions and Answers
Which of the following is NOT a recommended practice for managing IoT security risks?
Which of the following is NOT a recommended practice for managing IoT security risks?
- Establish baseline security requirements for IoT components. (correct)
- Reassess security baseline requirements based on business needs.
- Adopt a standardized industry recognized risk management approach.
- Authorize deviations from standard baseline configurations.
What should be done prior to deploying, provisioning, or using IoT components with deviations from standard baseline configurations?
What should be done prior to deploying, provisioning, or using IoT components with deviations from standard baseline configurations?
- Establish baseline security requirements.
- Comply with applicable legal, statutory, and regulatory compliance obligations.
- Authorize the deviations following change management policies and procedures. (correct)
- Reassess security baseline requirements based on business needs.
Why should compliance with security baseline requirements be reassessed?
Why should compliance with security baseline requirements be reassessed?
- To authorize deviations from standard baseline configurations.
- To ensure business needs are being met. (correct)
- To establish baseline security requirements.
- To comply with applicable legal, statutory, and regulatory compliance obligations.