Summary
In this chapter, we explored the current state of risk and security within the IoT landscape. We delved into the security and privacy controls within the cloud management landscape and emphasized the importance of risk management within the IoT ecosystem. The chapter highlighted the need for privacy and compliance within IoT networks and discussed the various cryptography controls that can be implemented for the IoT landscape.
In the next chapter, we will be looking at how we can work with open source in IoT and develop a project within that space.