Mapping Devices and Data Paths
Create an inventory that includes device model, MAC address, protocol, update channel, and whether it talks locally, to specific cloud domains, or to unfamiliar hosts. Draw arrows showing who initiates connections and when. Note data sensitivity, from innocuous temperature readings to video streams and door states. This clarity exposes risky dependencies, helps assign trust levels, and reveals which assets deserve segmentation, strong credentials, encrypted transport, or complete avoidance until the vendor fixes documented vulnerabilities.