This document discusses implementing security strategies for IoT devices. It outlines some risks of attacks on IoT devices, such as ransomware attacks. It recommends fundamentals for security like minimizing surfaces of attack, controlling what code runs, and providing bulletproof update models. It provides an example of implementing security on Automotive Grade Linux and discusses concepts like trusted boot, isolation of services and applications, identity management, and secure updates.