Mechanisms exist to determine if embedded technologies are certified for secure use in the proposed operating environment.
Does the organization determine if embedded technologies are certified for secure use in the proposed operating environment?