Mechanisms exist to restrict embedded technologies to communicate only with authorized peers and service endpoints.
Does the organization restrict embedded technologies to communicate only with authorized peers and service endpoints?