Device identification: The IoT device can be uniquely identified logically and physically. Device configuration: The configuration of the IoT device’s software can be changed, and such changes can be performed by authorized entities only. Data protection: The IoT device can protect the data it stores and transmits from unauthorized access and modification. Logical access to interfaces: The IoT device can restrict logical access to its local and network interfaces, and the protocols and services used by those interfaces, to authorized entities only. Software update: The IoT device’s software can be updated by authorized entities only using a secure and configurable mechanism.