See also the non-technical counterpart to this section
The capability to configure the IoT device through logical and/or physical interfaces to meet organizational requirements.
Ability for only authorized entities to apply logical access privilege settings within the IoT device and configure logical access privilege as described in Logical Access to Interfaces.
Ability for only authorized entities to configure IoT device authentication policies and limitations as described in Logical Access to Interfaces.
Ability for only authorized entities to configure aspects related to the device’s interfaces as described in Logical Access to Interfaces.
Ability to configure content to be shown within a device display as described in Logical Access to Interfaces.
Ability to change configurations on the IoT device based on operational events as described in Device Security and Cybersecurity Event Awareness.