Best Practice 25.4 – Use data-driven auditing metrics to detect if any of your IoT devices might have been broadly accessed - IoT Lens Checklist

Best Practice 25.4 – Use data-driven auditing metrics to detect if any of your IoT devices might have been broadly accessed

Monitor and detect the abnormal usage patterns and possible misuse of devices and automate the quarantine steps. Programmatic methods to detect and quarantine devices from interacting with cloud resources enable teams to operate a fleet in a scalable way while minimizing a dependency on active human monitoring.

Recommendation 25.4.1 – Validate and secure the manufacturer-provided list of allowed devices

  • Validate the list of devices that the manufacturer shared to ensure it has not been tampered with. Ensure that the list is encrypted, securely stored, and can only be accessed by necessary services and users. Even if the list changes, keep the original list securely stored.

Recommendation 25.4.2 – Use monitoring and logging services to detect anomalous behavior