Defend Matrix For Mobile Robots In Public Places

MODEL HARDEN DETECT ISOLATE DECEIVE EVICT RESTORE
1.1 Data Integrity 2.1 Non Hardened Systems 3.1 Endpoint Protection 4.1 Network Segmentation 5.1 Data Masking 6.1 Credential Revoking 7.1 Incident Reporting
1.2 Data Privacy 2.2 App Configuration Hardening 3.2 Network Intrusion Detection System 4.2 Execution Isolation 5.2 Honeypots 6.2 File Removal 7.2 Incident Analysis
1.3 Code & Firmware Integrity 2.3 Certificate-Based Authentication 3.3 Incident Detection 4.3 Firewalls
2.4 Authorization 3.4 Anti Malware Software
2.5 Message Encryption
2.6 ROS2 Security Guidelines
2.7 Secure Boot
2.8 Input Validation
Legend
Validated
Not yet validated