Determining that your IoT systems are compliant with security regulations is an important first step, but the value of performing the assessment activity diminishes over time. In order to stay vigilant, organizations should mandate a continuous assessment methodology to evaluate the real-time security posture of systems.
If you haven't already begun a move toward continuous monitoring of your systems, the adoption of IoT-integrated deployments is certainly a good time to begin. Keep in mind that continuous monitoring should not be confused with network monitoring. Network monitoring is just one element of an automated policy-based audit framework that should comprise a continuous monitoring solution.
The US ...