Chapter 2. Planning for IoT Security
Securing the Internet of Things poses new challenges to organizations, but as with any system that needs to be secured, certain practical steps can be leveraged. This chapter outlines key considerations to explore as part of a security strategy for IoT.
The Attack Continuum
Before we examine the security implications and requirements for an IoT system, some important points need to be considered.
The first consideration is that security is clearly not a one-off incident; it is a continuum, with before, during, and after phases (see Figure 2-1) and can occur in any area of the IoT system.
Get Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.