Strategies for comprehensive cyber resilience and recovery are quickly becoming a requirement. Modern, embedded connected devices are an attractive target for cyber attacks, which can open opportunities for ransom demands and result in the shutdown of entire factories. Recovery of compromised devices is challenging because malware can override the original software and often requires manual intervention. Furthermore, many embedded devices do not implement remote recovery procedures.