Distinct from logging/auditing, https://github.com/w3c/wot-security/issues/183, monitoring system activity is useful. This can include looking for unexpected network activity (see MUD issue) but also possibly CPU activity. See also the ITU-T review of WoT. We should probably at least mention these in the guidelines document.
Distinct from logging/auditing, https://github.com/w3c/wot-security/issues/183, monitoring system activity is useful. This can include looking for unexpected network activity (see MUD issue) but also possibly CPU activity. See also the ITU-T review of WoT. We should probably at least mention these in the guidelines document.