Wriju's BLOG

.NET, Cloud and everything

Azure IoT Security

Internet of Things security architecture

When designing a system, it is important to understand the potential threats to that system, and add appropriate defenses accordingly, as the system is designed and architected. It is particularly important to design the product from the start with security in mind because understanding how an attacker might be able to compromise a system helps make sure appropriate mitigations are in place from the beginning.

https://docs.microsoft.com/en-us/azure/iot-suite/iot-security-architecture

 

Internet of Things security best practices

To secure an Internet of Things (IoT) infrastructure requires a rigorous security-in-depth strategy. This strategy requires you to secure data in the cloud, protect data integrity while in transit over the public internet, and securely provision devices. Each layer builds greater security assurance in the overall infrastructure.

https://docs.microsoft.com/en-us/azure/iot-suite/iot-security-best-practices

 

Secure your IoT deployment

This article provides the next level of detail for securing the Azure IoT-based Internet of Things (IoT) infrastructure. It links to implementation level details for configuring and deploying each component. It also provides comparisons and choices between various competing methods.

https://docs.microsoft.com/en-us/azure/iot-suite/iot-suite-security-deployment

 

Internet of Things security from the ground up

The Internet of Things (IoT) poses unique security, privacy, and compliance challenges to businesses worldwide. Unlike traditional cyber technology where these issues revolve around software and how it is implemented, IoT concerns what happens when the cyber and the physical worlds converge. Protecting IoT solutions requires ensuring secure provisioning of devices, secure connectivity between these devices and the cloud, and secure data protection in the cloud during processing and storage. Working against such functionality, however, are resource-constrained devices, geographic distribution of deployments, and a large number of devices within a solution.

https://docs.microsoft.com/en-us/azure/iot-suite/securing-iot-ground-up