Begin by testing your environment to identify gaps in security coverage and verifying your networks’ ability to mitigate risk for device weaknesses. Don't assume certified devices or previously trusted equipment is safe - these are actually potential weak links.
Continuously audit all elements
The entire supply chain must meet all compliance standards
In addition to continuously auditing supply chain members, businesses should go deeper and include code audits for back doors and other software risks, and require device suppliers, particularly IoT suppliers, to be security certified by CTIA or other bodies.
Make security part of your process
Embed security into your network deployments now
Assess your strategy for securing services based on their specific goals, capabilities, and timelines. Embed security into key processes from the outset, thereby improving their ability to meet compliance requirements, accelerate time-to-market for new innovations, cut costs, and reduce risks.
Continuous Audits
Implement continuous and thorough assessment of environments
Continuously validate infrastructure, vendor software, and supply chain security to ensure success. Assess networks, devices, APIs and all security mechanisms to proactively identify risks and known vulnerabilities. Perform war gaming to discover future risks.