Have you implemented ‘security by design’ during the development of your connected product?
This might mean defining security requirements, implementing strong cryptographic policies, provide security support via over the air updates, integrate the security of dependencies, and secure firmware updates.