Skip to content

Commit 1885bf5

Browse files
improved text
1 parent cfd00c9 commit 1885bf5

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

articles/digital-twins/security-best-practices.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: bertvanhoof
77
ms.service: digital-twins
88
services: digital-twins
99
ms.topic: conceptual
10-
ms.date: 01/14/2020
10+
ms.date: 01/15/2020
1111
---
1212

1313
# Azure Digital Twins security best practices
@@ -35,7 +35,7 @@ Some key practices to safely secure your IoT devices include:
3535
> * Limit I/O and device bandwidth to improve performance. Rate-limiting can improve security by preventing denial-of-service attacks.
3636
> * Keep device firmware, operating system, and software up to date.
3737
> * Periodically audit and review device, software, network, and gateway security best practices as they continue to improve and evolve.
38-
> * Use [trusted, certified, and compliant](https://azure.microsoft.com/overview/trusted-cloud/compliance/) security systems, software, and devices.
38+
> * Use trusted, certified, and compliant security systems, software, and devices. For example, review [the compliance offerings](https://azure.microsoft.com/overview/trusted-cloud/compliance/) for Azure Cloud.
3939
4040
Some key practices to safely secure an IoT space include:
4141

@@ -63,9 +63,8 @@ Azure Digital Twins uses [Azure Active Directory](https://docs.microsoft.com/azu
6363
> * Use a certificate issued by a trusted [certificate authority](../active-directory/authentication/active-directory-certificate-based-authentication-get-started.md) rather than app secrets to authenticate.
6464
> * Limit OAuth 2.0 scope of access for a token.
6565
> * Verify the length of time a token is valid and whether a token remains valid.
66-
> * Set appropriate lengths of time that tokens are valid for.
67-
> * Refresh expired tokens.
68-
> * Remove unused **Redirect URIs** and permissions.
66+
> * Set appropriate lengths of time that tokens are valid for. Refresh expired tokens.
67+
> * Remove unused **Redirect URIs** and permissions per [Role-based access control best practices](#role-based-access-control-best-practices).
6968
7069
## Role-based access control best practices
7170

0 commit comments

Comments
 (0)