Focused IoT audit for the path under pressure

Audit the path under pressure before launch, review, or reliability risk makes the decision for you.

Combotto audits one gateway, MQTT, ingest, identity, or observability path at a time. You get a leadership-ready summary, evidence-backed findings, and a prioritized backlog your team can use to fix internally, move into a focused sprint, or pause with clarity.

  • Start with one selected path instead of reopening a broad discovery cycle.
  • Get findings and backlog rows tied to real evidence on that path.
  • Leave with a clear next move: fix internally, run a sprint, or hold.

Proof-led engagement path

AuditHardening SprintRetainer Review

Audit baseline exposes the findings. The hardening rerun verifies the fixes. Retainer review keeps later drift visible.

Most intro calls only need 20 minutes to confirm the path, the decision deadline, and whether the audit should start there.

Field setup behind the proof

This Raspberry Pi 5 gateway, power bank, and three STM32 devices are the same field setup behind the audit baseline, hardening rerun, and delta review shown below.

Live proof

One gateway path, shown before hardening, after hardening, and at the next delta review.

This is the decision story the engagement is meant to produce: expose the weak path, prove the fix held on the same surface, then keep later releases anchored to that stronger baseline.

1. Audit

Audit exposed the weak path.

One run turned a vague gateway concern into a concrete finding set on the live telemetry path.

  • Plaintext ingest and weak transport posture were still reachable
  • Auth enforcement was missing at the ingest edge
  • The exposed path became a prioritized backlog for the next decision

Baseline summary before hardening

Exposed posture · 4 findings

2. Sprint

Sprint rerun verified the fix.

The same path was rerun after hardening, so the close-out is evidence instead of intent.

  • TLS was enforced on the relevant path
  • Unauthenticated ingest returned 401 while authenticated ingest returned 202
  • Gateway guardrails tightened without breaking runtime health

Follow-up summary after hardening

Hardened path · 0 findings

3. Retainer

Delta review kept the gain visible.

The hardened state became the reference point for later release or monthly checks.

  • 4 controls moved from weak to improved
  • No regressions appeared in the rerun
  • The improved state became the next baseline

Delta report: before vs after

4 controls improved · 0 regressions

Decision unlocked

Start with one live path, make the exposure legible, verify the fix on that same surface, and carry the stronger state forward as the next baseline.

Audit → Sprint → Retainer

The audit is the only assumed commitment. Sprint and retainer have to earn their way in through evidence.

Most teams should stop after the audit unless the findings justify a narrower follow-on. Each stage uses the same path, the same evidence logic, and a tighter next question so it stays clear where the work starts, what the team gets, and when continuing is actually worth it.

1. AuditDays to about 1 week

Baseline the real path first

2. SprintFocused implementation

Harden only what the audit proved matters

3. RetainerRelease-based or monthly

Keep only the drift checks worth repeating

Starts with

One selected gateway, MQTT, ingest, identity, or observability path already under pressure.

You leave with

Leadership summary, evidence-backed findings, prioritized backlog, and verification logic for the exposed path.

What it settles

Whether the team should fix internally, continue into a focused sprint, or pause with a clear view of the exposure.

Starts with

Only the backlog rows with enough risk, customer pressure, or operational cost to justify follow-on work.

You leave with

Focused hardening changes on those rows, rerun evidence on the same path, and before/after proof that shows what actually improved.

What it settles

Whether the path is now strong enough to ship, pass review, or keep operating without carrying the same exposed rows forward.

Starts with

Only the latest validated path and the handful of checks most likely to drift between releases.

You leave with

Delta review, regression signal, and refreshed priorities tied to the last validated run instead of a new broad discovery cycle.

What it settles

Whether posture is holding between releases, what changed since the last baseline, and when another focused sprint is actually warranted.

Is this the right starting point?

Use the audit when one live path is already forcing a launch, review, or reliability decision.

This is for teams that need fast evidence on the gateway, MQTT, or edge-to-cloud path carrying the pressure. It is not another broad discovery cycle. It is a focused audit that shows what is solid, where confidence breaks, and what the smartest next move is.

If one of these situations is already true, the audit is usually the right first engagement.

01

Review pressure

External scrutiny is already here.

Customer, procurement, or internal review pressure is arriving faster than the team can defend the current gateway, MQTT, or ingest posture with evidence.

Audit makes clear: What is solid, what is exposed, and what needs to change before customer, procurement, or internal review becomes a blocker.

Decision unlocked: Leadership gets a defendable continue, pause, or fix-first position before the review becomes the thing steering the roadmap.

02

Telemetry distrust

The system is running, but the signal is getting harder to trust.

Duplicate events, weak observability, unclear retry behavior, or missing data are eroding confidence across device, gateway, broker, and ingest.

Audit makes clear: Exactly where trust breaks across the live path, so engineering gets a real failure picture instead of another theory-heavy workshop.

Decision unlocked: The team can decide whether to instrument, harden transport, change buffering behavior, or stop trusting the current signal until the path is fixed.

03

Launch or scale pressure

Prototype-era decisions are being asked to behave like production.

Earlier transport, identity, buffering, or operational choices that were acceptable during delivery are now being tested by launch, customers, or fleet growth.

Audit makes clear: Which decisions are still safe to carry forward and which ones now need hardening so the team can act on the highest-value fixes first.

Decision unlocked: Engineering and leadership can separate what is safe to ship from what needs a focused hardening sprint before launch or fleet growth raises the cost.

Scope guardrails

The audit stays narrow on purpose so the first decision stays credible.

These boundaries reduce ambiguity without pushing you into a bigger engagement than the evidence supports.

Selected scope

Start with one pressured path, not a broad platform rewrite.

The first audit usually centers on one gateway, MQTT, ingest, identity, or observability path that is already driving the decision.

Specialist lens

Start with system posture on the pressured path.

This first pass is a system-level audit built to expose architectural, operational, and telemetry risk fast. If the next question is dedicated penetration testing or managed monitoring, that can be scoped after the baseline instead of before it.

Audit-first motion

You are not committing to a sprint or retainer up front.

The audit is the first engagement. Follow-on work only happens if the findings justify a narrower hardening sprint or a recurring review rhythm.

Next step

If the audit should start here, send the path and the pressure around it.

Use the first note to share the path, the pressure around it, and the decision that needs support. The goal is to get quickly to the right starting scope, any missing context, and whether a short scoping call would be useful.

What to send

Send the selected path and the decision pressure around it.

Share the gateway, broker, ingest, identity, or observability path that is carrying the risk, plus the launch, review, incident, or reliability pressure forcing the decision.

What the reply covers

The reply focuses on starting scope, missing context, and the next practical step.

It should make it clearer whether this is the right path to audit first, what the initial slice should include, and whether a short call would help.

Typical next step

Most first exchanges end in a short scoping call or a clear async recommendation.

If the fit is clear, the next step is usually a short call to confirm path, access, and the evidence chain that needs to be reviewed first.

Share the path under pressure

Send the selected scope, what is creating pressure now, and any launch, review, or incident deadline. You’ll get a direct reply focused on the recommended starting scope and next step.

Or contact me directly: +45 22 39 34 91 or tb@combotto.io.

Reply to

So the recommended starting scope reaches the right person quickly.

Audit scope

Keep the intake tied to the path, the pressure, and the timing behind the decision.

Choose the closest pressure if one already stands out.

A rough timing window is enough if the date is still moving.

Helpful: the selected path, what is breaking trust or creating pressure, and the deadline attached to that decision.

Required fields are marked with *.

Response expectation

Expect a concise reply focused on likely starting scope and the next step.

IoT audit FAQ

Questions that still matter before you book

What should we send before the intro call?

Send the selected path, what is creating pressure now, and any launch, review, or incident deadline. If you already have diagrams, logs, or screenshots that show the path, include them.

Do you need direct production access?

Sometimes, but only the smallest access needed to inspect the live evidence chain credibly. If the right answer is a narrower environment, exported artifacts, or a guided walk-through, that is what the first scope should use.

Can we stop after the audit?

Yes. The audit is meant to stand on its own with findings, backlog, and a clear next move. Sprint or retainer work only happens if the evidence says the narrower follow-on is worth it.

Can the audit cover supplier-side vulnerability handling or CRA-readiness gaps?

Yes, when the pressure is tied to one live product path. The audit can inspect disclosure intake, supported release-line truth, evidence gaps, and whether the next step is a focused sprint or a lighter retainer review. The public /security/ route and/security/advisories/ show the reporting front door and publication home; public advisories, CSAF, and regulator filing still stay out of scope until real cases exist.

Technical appendix

Optional methodology depth for technical reviewers

The main route already shows the commercial path. This appendix is here for teams that want to see how Combotto keeps the audit baseline, hardening rerun, and recurring review rhythm disciplined without turning the main narrative into tooling detail.

See the exposure clearly

Start with a baseline that makes the weak path legible fast enough to support a real decision.

Verify the fix held

Rerun the same trust path after hardening so the sprint ends with evidence, not intent.

Keep drift visible

Carry the smallest useful evidence bundle into recurring review so posture does not quietly slide backward.

How the evidence changes by stage

Start broader when the question is where the exposure is, then tighten once the question is whether the fix held

The first review needs enough surface area to make the pressured path legible. Later rounds should get tighter, faster, and easier to repeat because the team is validating a smaller set of known risks.

Audit

Establish a credible baseline across the path under pressure.

Sprint

Rerun the exact surfaces that should now be stronger.

Retainer

Keep the smallest recurring bundle that still catches meaningful drift.

Evidence bundles

Use the stage-matched bundle without changing the proof logic

Start broader when the question is still where the exposure is. Tighten the rerun once the question becomes whether the fix held.

Evidence bundle

Best for: first audit
Audit baseline bundle

A broader first-pass baseline for teams that need the real gateway and ingest risk made clear quickly.

Checks included

Broker transport posture · Broker certificate identity check · Ingest authentication check · Gateway guardrail review

Best when

You need transport, identity, ingest, and gateway controls checked together in one clear starting run.

Business outcome

Gives leadership and engineering a shared baseline to decide whether to stop, fix first, or go deeper.

Follow-through

This baseline becomes the reference point for sprint reruns and later milestone reviews.

Evidence bundle

Best for: sprint rerun
Hardening verification bundle

A tighter rerun bundle for proving the hardening work actually improved the path that mattered.

Checks included

Broker transport posture · Gateway guardrail review · Ingest authentication check

Best when

The highest-value fixes are already in progress and the next decision depends on evidence, not confidence.

Business outcome

Shows whether the hardening held on the same trust path that triggered the audit.

Follow-through

Often becomes the default recurring validation bundle after the first hardening pass.

Evidence bundle

Best for: retainer watchlist
Certificate hygiene bundle

A compact certificate bundle for rollout checks, renewal readiness, and recurring endpoint hygiene.

Checks included

Device certificate hygiene check

Best when

The live question is endpoint identity or expiry risk rather than a broader gateway sweep.

Business outcome

Produces tight certificate proof without the noise of a wider rerun.

Follow-through

Useful for periodic certificate hygiene and renewal-readiness reviews.

Checks included

Representative checks behind the evidence chain

These checks are shown as optional technical depth for buyers who want to understand how the evidence stays repeatable from baseline through follow-on review.

Check included

Broker transport posture

Best used when

Audit baseline and fast reruns.

What it shows

Whether the live broker connection is strong enough to support launch, review, or scale confidence.

Why buyers care

A strong first-pass proof point when the question is whether the transport path is fit for launch, review, or scale.

Check included

Broker certificate identity check

Best used when

Audit baseline and renewal readiness.

What it shows

Whether the broker identity and renewal posture still support what field systems are expected to trust.

Why buyers care

Useful when certificate drift, enterprise review pressure, or renewal risk is becoming a business issue.

Check included

Gateway guardrail review

Best used when

Hardening sprint checkpoints.

What it shows

Whether the gateway changes actually raised the posture on the path that triggered the sprint.

Why buyers care

Keeps the sprint focused on the gateway fixes most likely to improve trust, uptime, and review readiness.

Check included

Ingest authentication check

Best used when

Audit baseline and regression bundle.

What it shows

Whether the ingest edge is really protected on the live path rather than only assumed to be.

Why buyers care

Creates a fast, legible proof point when the question is whether the ingest edge is actually protected.

Check included

Device certificate hygiene check

Best used when

Rollout validation and recurring hygiene.

What it shows

Whether deployed endpoints still present the certificate posture the fleet depends on.

Why buyers care

Useful as a smaller recurring check when certificate hygiene matters more than a full gateway rerun.

Combotto.io - IoT Infrastructure | Security | Reliability Engineering
Security disclosure: /security/