Skip to content

Commit 19ea502

Browse files
committed
Updates per @wesmc7777 review
1 parent e5866dd commit 19ea502

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

articles/iot-dps/concepts-device-oem-security-practices.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,7 @@ For more information, see [Autoprovisioning concepts](concepts-auto-provisioning
6060
## Installing certificates on IoT devices
6161
When you start using certificates on IoT devices in a manufacturing process, you'll need to make several decisions. These include decisions about common certificate variables, when to generate certificates, and when to install them.
6262

63-
> [!CAUTION]
64-
> If you're used to using passwords, you might ask why you can't use the same certificate in all your devices, in the same way that you'd be able to use the same password in all your devices. First, using the same password everywhere is dangerous. The practice has exposed companies to major DDoS attacks, including the one that took down DNS on the US East Coast several years ago. Never use the same password everywhere, even with personal accounts. Second, a certificate isn't a password, it's a unique identity. A password is like a secret code that anyone can use to open a door at a secured building. It's something you know, and you could give the password to anyone to gain entrance. A certificate is like a driver's license with your photo and other details, which you can show to a guard to get into a secured building. It's tied to who you are. Provided that the guard accurately matches people with driver's licenses, only you can use your license (identity) to gain entrance.
63+
If you're used to using passwords, you might ask why you can't use the same certificate in all your devices, in the same way that you'd be able to use the same password in all your devices. First, using the same password everywhere is dangerous. The practice has exposed companies to major DDoS attacks, including the one that took down DNS on the US East Coast several years ago. Never use the same password everywhere, even with personal accounts. Second, a certificate isn't a password, it's a unique identity. A password is like a secret code that anyone can use to open a door at a secured building. It's something you know, and you could give the password to anyone to gain entrance. A certificate is like a driver's license with your photo and other details, which you can show to a guard to get into a secured building. It's tied to who you are. Provided that the guard accurately matches people with driver's licenses, only you can use your license (identity) to gain entrance.
6564

6665
### Variables involved in certificate decisions
6766
Consider the following variables, and how each one impacts the overall manufacturing process.
@@ -78,6 +77,9 @@ There are a few factors that impact the decision on where certificates are store
7877
- In a secure place on disk such as a trusted execution environment (TEE).
7978
- In the local file system or a certificate store. For example, the Windows certificate store.
8079

80+
> [!NOTE]
81+
> Another option for storing certificates
82+
8183
#### Connectivity at the factory
8284
Connectivity at the factory determines how and when you'll get the certificates to install on the devices. Connectivity options are as follows:
8385
- Connectivity. Having connectivity is optimal, because you can generate certificates locally.
@@ -172,7 +174,7 @@ Pro for shared symmetric key:
172174
Cons for shared symmetric key:
173175
- Highly vulnerable to attack. The benefit of easy implementation is far outweighed by the risk.
174176
- Anyone can impersonate your devices if they obtain the shared key.
175-
- You will likely lose control of devices if you rely on shared symmetric key.
177+
- If you rely on a shared symmetric key that becomes compromised, you will likely lose control of the devices.
176178

177179
### Making the right choice for your devices
178180
To choose an authentication method, make sure you consider the benefits and costs of each approach for your unique manufacturing process. For device authentication, usually there's an inverse relationship between how secure a given approach is, and how convenient it is.

0 commit comments

Comments
 (0)