Common use of Internet of Things Clause in Contracts

Internet of Things. SECURITY (IT)‌ 15.1 The organization implements controls and processes to ensure risks are accounted for and managed in the use of Internet of Things (IoT) devices including, but not limited to, physical devices, No vehicles, appliances and other items embedded with electronics, software, sensors, actuators, and network connectivity which enables these devices to connect and exchange data. IoT security includes, at a minimum: • Developing policies and standards specific to IoT assets; • Ensuring the secure configuration of IoT assets; • Conducting risk assessments prior to implementation, and throughout the lifecycles of IoT assets; • Segmenting IoT networks from the rest of the organization’s networks; and • Ensuring least privilege and strong authentication controls are implemented. Supplemental Information 15.2 As applicable, list and describe any IoT devices used across your organization and detail how those devices are secured physically, administratively, and technically. Include information on network segmentation, access and authentication, and security updates. 15.3 Optional - Please provide any additional information relative to this control area.

Appears in 1 contract

Sources: Confidentiality Agreement

Internet of Things. SECURITY (IT)‌IT) 15.1 The organization implements controls and processes to ensure risks are accounted for and managed in the use of Internet of Things (IoT) devices including, but not limited to, physical devices, No vehicles, appliances and other items embedded with electronics, software, sensors, actuators, and network connectivity which enables these devices to connect and exchange data. IoT security includes, at a minimum: • Developing policies and standards specific to IoT assets; • Ensuring the secure configuration of IoT assets; • Conducting risk assessments prior to implementation, and throughout the lifecycles of IoT assets; • Segmenting IoT networks from the rest of the organization’s networks; and • Ensuring least privilege and strong authentication controls are implemented. Supplemental Information 15.2 As applicable, list and describe any IoT devices used across your organization and detail how those devices are secured physically, administratively, and technically. Include information on network segmentation, access and authentication, and security updates. 15.3 Optional - Please provide any additional information relative to this control area.

Appears in 1 contract

Sources: Confidentiality / Non Disclosure Agreement