Ultimate access to all questions.
Your organization is planning to deploy a wide range of IoT devices and embedded systems across various operational environments, including manufacturing floors and remote field locations. As a cybersecurity architect, you are tasked with specifying the security requirements for these devices to ensure they are protected against potential threats. Given the diversity of the devices and their environments, which of the following approaches BEST addresses the security considerations for these IoT devices and embedded systems? (Choose one)