An organization is deploying IoT locks, sensors, and cameras, which operate over 802.11, to replace legacy building access control systems. These devices are capable of triggering physical access changes, including locking and unlocking doors and gates. Unfortunately, the devices have known vulnerabilities for which the vendor has yet to provide firmware updates.
Which of the following would BEST mitigate this risk?
A . Direct wire the IoT devices into physical switches and place them on an exclusive VLA
C . Require sensors to sign all transmitted unlock control messages digitally.
D . Associate the devices with an isolated wireless network configured for WPA2 and EAP-TL
F . Implement an out-of-band monitoring solution to detect message injections and attempts.
Answer: C
Leave a Reply