Device vulnerabilitiesrepresent the greatest technical risk in IoT implementations. IoT devices often have limited security features, can be difficult to patch, and may be deployed in large numbers—making them a common attack vector.
Integration and obsolescence matter, butvulnerabilities directly impact data protection, system integrity, and compliance, posing an immediate and high-priority risk.
[Reference:, CGEIT Review Manual: Domain 4 – Risk Optimization, COBIT 2019: DSS05 (Manage Security Services), APO12 (Manage Risk)., , , , ]
Submit