IoT Security
Device Details
Table of Contents
Expand All
|
Collapse All
IoT Security Docs
-
-
- Firewall Deployment Options for IoT Security
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use SNMP Network Discovery to Learn about Devices from Switches
- Use Network Discovery Polling to Discover Devices
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
-
Device Details
Create and manage compensating controls from the Device Details page.
On the Device Details page, you can add compensating controls when viewing the
device's risk score. For existing compensating controls, you can adjust the
compensating control factor from the Device Details page. To make other changes
to an existing compensating control, edit the compensating control under
SettingsRisk Score Configuration.
- Navigate to AssetsDevices and select the device that you want to add a compensating control for.
- On the Device Details page, find the device's risk score under the device's thumbnail, and click See Details.This brings up the Risk Score Details side panel for the device.
- In the Exposure Score table, review the list of identified risks, and see which risks you can apply a compensating control for.Compensating controls apply only to vulnerabilities and other risk factors. When you can add a compensating control, you will see an Edit (pencil) icon in the Compensating Control Name field for that risk.
- Select the Edit (pencil) icon in the Compensating Control Name field for the risk that you want to apply a compensating control to.
- On the Risk Score DetailsEdit Compensating Controls pop-up page, select + Add New to bring up the Add Compensating Control pop-up.
- Configure the compensating control.When you add or edit a compensating control, the Matching Rule field automatically fills in based on the compensating control type that matches the risk that you chose to add the compensating control to.
- Type: Select the compensating control type. The selected type will also populate the Matching Rule field.
- Name: Enter a name for the compensating control.
- Optional Description: Enter a short description.
- Define the assets and risks the compensating control applies to.
- Configure the following fields:
- Asset Scope: Enter the criteria for all assets that you want to apply the compensating control to. By default, the MAC address of the device you're modifying is part of the Asset Scope.The current device must always be within the asset scope, since you're applying the compensating control to the device. If you change the asset scope and it no longer includes the current device, then you won't be able to apply the compensating control.
- Risk: Select the risk that the compensating control applies to. You can select either Vulnerability or Other Risk Criteria.
- Vulnerability Vulnerability Risk Criteria: Define the risk criteria that the compensating control applies to.
- Other Risk Factors Other Risk Criteria: Select the appropriate risk criteria from the drop-down list.
- View Matching Devices to verify that the current device falls in the asset scope.The Match Results section displays the count of all devices that match to the defined asset scope. You can click on the count to open the assets inventory in a new tab or window, with a filter to see all devices that match your asset scope.
- Enter a Compensating Control Factor, which is how much the compensating control offsets the risk.
- Apply the compensating control.Compensating controls can take up to 24 hours to take effect, so you might not see an immediate change in the device’s risk score.
- Verify that your new compensating control appears in the Compensating Control Name field for the risk that you added it to.