In addition to business risk, the operational aspects of
using an embedded system must be considered. For
example, machine-to-machine communication must be
appropriately secured to ensure that only appropriate
personnel (or appropriately authorized devices) have
access to make configuration changes and gather
telemetry data. In most cases, this security requires
operational planning and needs to tie into existing security
and monitoring controls to ensure that the level of access is
appropriate.