An IoT developer has endpoints that are shipped to users in the field. Which of the following best practices must be implemented for using default passwords after delivery?
B all the way! Forced password change on first login is like putting a lock on the barn door after the horse has escaped. But hey, better late than never, am I right?
Hmm, I'd say D. Protecting against account enumeration is crucial. Can't have those hackers trying every combination until they get in, right? That's just asking for trouble.
I'd go with C. Granular role-based access is key to keeping those IoT endpoints secure. No need for Karen in accounting to have admin privileges, you know?
Leonida
1 months agoStephen
21 days agoVeronica
1 months agoKirby
1 months agoShelba
7 days agoFrancesco
10 days agoLuke
19 days agoNobuko
1 months agoLindsay
1 months agoKanisha
1 months agoCharlette
2 months agoDeandrea
5 days agoElmira
9 days agoLaurel
13 days agoSanjuana
1 months ago