The third step is to choose your IoT security technologies and solutions, based on your IoT security requirements and policies. It is important to select the appropriate security technologies and solutions for each layer of your IoT architecture, such as device, network, cloud, and application. Common IoT security technologies and solutions include hardware-based security features like secure boot, trusted platform modules, or secure elements; firmware and software updates; device identity and certificates; device configuration and management; device hardening and isolation; encryption and tunneling protocols such as TLS, DTLS, or IPSec; firewall and VPN; network segmentation and access control; network monitoring and anomaly detection; cloud service provider's security features like encryption at rest and in transit, identity and access management, key management, logging and auditing, data protection and privacy; cloud security assessment and certification; cloud security best practices like the Cloud Security Alliance's IoT Security Controls Framework; secure coding practices such as input validation, output encoding, error handling, code review; application security testing and scanning; application security monitoring and protection; application security updates and patches.