
Ultimate access to all questions.
Your company is planning to deploy Internet of Things (IoT) devices in its manufacturing facility to monitor production lines and environmental conditions. The deployment must comply with industry-specific regulations requiring data protection and privacy. Given the constraints of cost efficiency, scalability for future expansion, and the need for real-time data processing, what security requirements should you specify for these IoT workloads to ensure their security? Choose the BEST option that addresses secure communication, device authentication, and the ability to update device firmware to mitigate vulnerabilities.
A
Ensure that the IoT devices have strong authentication mechanisms and data encryption, but do not consider the need for firmware updates or secure communication protocols.
B
Specify security requirements for the IoT devices, including secure communication protocols, device authentication, and firmware updates, while also considering the scalability and compliance needs of the deployment.
C
Focus solely on securing the network and endpoints used to communicate with the IoT devices, neglecting the security of the devices themselves.
D
Rely on the IoT device manufacturer's security measures and do not implement any additional security controls, assuming they will cover all necessary aspects.