Techniques are provided for an organization-maintained server which takes three inputs: (1) a set of Uniform Resource Identifiers (URIs) from Internet of Things (IoT) devices, each of which point to a manifest; (2) a set of manifests resolved from the URIs; and (3) a set of threat feeds. The server periodically compares the vulnerabilities in the threat feeds to the manifests. When a vulnerability is found, steps are taken to protect the rest of the network from the vulnerable devices until they can be remediated.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Lear, Eliot; Weis, Brian; Steck, Chris; and Cam-Winget, Nancy, "ADVERTISING SOFTWARE/SECURITY USAGE DESCRIPTIONS WITH POLICY RESPONSE", Technical Disclosure Commons, (December 21, 2018)