Under active development Content is continuously updated and improved

2-15-12-15-1

>Control Description

Utilize hardware that embeds cybersecurity functions at the component level, to maintain protection and integrity of the device, and it is advised to implement the following requirements to secure IoT hardware components, where applicable: ▪ Deploy a Hardware Root of Trust component, which helps in authenticating hardware, firmware, and software components before loading them. It also helps in establishing trust in the boot environment. ▪ Include only essential physical external ports that are necessary for the IoT device to function and enable only trusted connections to access and function on the physical ports.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.