Closed jlepp-BLACKBERRY closed 3 years ago
"Thank you for your comments. They've been reviewed and have been useful to our technical team. You will soon see the updated versions of these catalogs on the new GitHub page: IoT Device Cybersecurity Requirements Catalog."
Statement about how to best implement and secure the IoT device monitoring system is unclear.
Term “strategically” is unclear, clarify that the two bullet points constitute the two main methods of monitoring – on-device agent, and network-based monitoring.