November 2018
Intermediate to advanced
382 pages
11h 20m
English
IoT devices today are getting more complex. Some devices may simply consist of an image containing the RTOS, third-party libraries, and custom code. More modern IoT devices will often consist of an operating system, a runtime environment, as well as containers that are used to segregate cloud services, analytics services, third-party code, and custom applications. These devices must be configured to operate on the network securely. First and foremost, follow the manufacturer's documentation for configuring their devices securely. In the absence of manufacturer guidance, seek out best practices for the specific types of devices deployed in your network.
At a minimum, disable unused and frequently compromised services. ...