Device onboarding

Before IoT devices can support your organization's use cases, they must be onboarded into your system. The process of onboarding transitions devices from an untrusted to a trusted state within your organization. After the onboarding process is complete, the devices are registered, provisioned with required identity and cryptographic materials, and configured.

Although onboarding seems like a simple concept, there are two primary challenges that must be overcome:

  • The scale of the IoT makes it difficult to onboard all of your devices manually
  • Transitioning from untrusted to trusted states provides bad actors an opportunity to infiltrate your systems

CSPs offer administrators the ability to register single devices or to bulk-register ...

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.