Different embedded devices, systems, and industries have varying security requirements and often require a custom lens. This paper examines the implementations of the well-known information security ...