I. Introduction
IIOT is becoming increasingly valuable to operations because of its low cost and can be updated with features tailored to precise user needs. Risks from IIOT connections are generally known [1], however much of the discussion is focused on secure communication and cloud configurations [2]. As practitioners, we have experienced difficulties in finding specific guidance on device security topics, such as secure boot, provisioning sequences, key rotation, and others, even though the device is the most exposed component of the IIOT system.