Therefore disabling those selected features can not only be used to restrict the user to certain functionality but also to minimize the surface provided to a potential attacker.
This work seeks to clarify AMI fundamentals and discusses the technical and related governance considerations from a dispassionate perspective, yet acknowledges many stakeholders tend to dichotomise debate, and obfuscate both advantages and benefits, and the converse.
Follow audit advice in this document and regularly monitor audit records.
6 Comments