This report will use an example product with wired and wireless connections.1 Specific technologies may be called out in order to discuss relevant security properties, but the intent of this report is to introduce security principles that are technology agnostic.
No technical report could fully address all connected device security concerns. It is the goal of this report to provide a solid foundation for building security into the development process. This will include a discussion of Security Maturity Models and an examination of some common connected device vulnerabilities and mitigations.