Security-sensitive data, including any remote management and control, should be encrypted in transit, appropriate to the properties of the technology and usage. All keys should be managed securely.
The use of open, peer-reviewed internet standards is strongly encouraged.
Primarily applies to: Device Manufacturers, IoT Service Providers, Mobile Application Developers
View a full-screen version of this mapping
Download this data