Your organization is in the process of integrating embedded systems into its existing architecture to support various IoT initiatives. During the planning phase, the organization needs to ensure these systems can operate securely within its infrastructure. Which of the following is the most effective strategy to mitigate security risks associated with embedded systems within this context?
Options:
A. Implement full monitoring and security control implementation similar to traditional IT systems.
B. Allow peer-to-peer communication between embedded systems for greater flexibility.
C. Limit access and communications to devices and isolate them on dedicated networks.
D. Regularly update embedded devices' firmware using over-the-air updates to ensure current security patches are applied.
( answer tomorrow, study more now with CISSP.app! )