Skip to content

Commit 1b76eda

Browse files
committed
Freshness review
1 parent 7e50f95 commit 1b76eda

File tree

3 files changed

+19
-19
lines changed

3 files changed

+19
-19
lines changed

articles/iot-edge/how-to-explore-curated-visualizations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ Select a severity row to view alert details. The **Alert rule** link opens the a
117117

118118
## Customize workbooks
119119

120-
[Azure Monitor workbooks](/azure/azure-monitor/visualize/workbooks-overview) are very customizable. You can edit the public templates to suit your requirements. All the visualizations are driven by resource-centric [Kusto Query Language](/azure/data-explorer/kusto/query/) queries on the [InsightsMetrics](/azure/azure-monitor/reference/tables/insightsmetrics) table.
120+
[Azure Monitor workbooks](/azure/azure-monitor/visualize/workbooks-overview) are customizable. You can edit the public templates to suit your requirements. All the visualizations are driven by resource-centric [Kusto Query Language](/azure/data-explorer/kusto/query/) queries on the [InsightsMetrics](/azure/azure-monitor/reference/tables/insightsmetrics) table.
121121

122122
To customize a workbook, enter editing mode. Select the **Edit** button in the workbook's menu bar. Curated workbooks use workbook groups extensively. You might need to select **Edit** on several nested groups to view a visualization query.
123123

articles/iot-edge/module-edgeagent-edgehub.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The module twin for the IoT Edge agent is called `$edgeAgent`. It coordinates co
3131
| Property | Description | Required |
3232
| -------- | ----------- | -------- |
3333
| imagePullPolicy | Specifies when to pull the image: *OnCreate* or *Never*. Use *Never* if the image is already on the device. | Yes |
34-
| restartPolicy | When the module should be restarted. Possible values are: *Never*: don't restart module if not running, *Always*: always restart module if not running, *On-Unhealthy*: restart module if unhealthy. Unhealthy is what Docker reports based on a health check, for example "Unhealthy - the container is not working correctly", *On-Failed*: restart if Failed. | Yes |
34+
| restartPolicy | When the module should be restarted. Possible values are: *Never*: don't restart module if not running, *Always*: always restart module if not running, *On-Unhealthy*: restart module if unhealthy. Unhealthy is what Docker reports based on a health check, for example "Unhealthy - the container isn't working correctly", *On-Failed*: restart if Failed. | Yes |
3535
| runtime.type | Must be *docker*. | Yes |
3636
| runtime.settings.minDockerVersion | Specifies the minimum Docker version required by this deployment manifest. | Yes |
3737
| runtime.settings.loggingOptions | Specifies a stringified JSON with the logging options for the IoT Edge agent container. Learn more about [Docker logging options](https://docs.docker.com/engine/admin/logging/overview/). | No |
@@ -77,7 +77,7 @@ The copy of the current desired properties helps determine if the device has app
7777
> [!NOTE]
7878
> You can query IoT Edge agent reported properties with the [IoT Hub query language](../iot-hub/iot-hub-devguide-query-language.md) to investigate deployment status at scale. Learn how to use IoT Edge agent properties for status in [Understand IoT Edge deployments for single devices or at scale](module-deployment-monitoring.md).
7979
80-
The following table does not include the information that is copied from the desired properties.
80+
The following table doesn't include the information that is copied from the desired properties.
8181

8282
| Property | Description |
8383
| -------- | ----------- |

articles/iot-edge/security.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Learn about the security, authentication, and authorization standar
44
author: PatAltimore
55

66
ms.author: patricka
7-
ms.date: 07/27/2023
8-
ms.topic: conceptual
7+
ms.date: 05/08/2025
8+
ms.topic: concept-article
99
ms.service: azure-iot-edge
1010
services: iot-edge
1111
---
@@ -14,9 +14,9 @@ services: iot-edge
1414

1515
[!INCLUDE [iot-edge-version-all-supported](includes/iot-edge-version-all-supported.md)]
1616

17-
Azure IoT Edge addresses the risks that are inherent when moving your data and analytics to the intelligent edge. The IoT Edge security standards balance flexibility for different deployment scenarios with the protection that you expect from all Azure services.
17+
Azure IoT Edge addresses risks inherent in moving your data and analytics to the intelligent edge. IoT Edge security standards balance flexibility for different deployment scenarios with the protection customers expect from Azure services.
1818

19-
IoT Edge runs on various makes and models of hardware, supports several operating systems, and applies to diverse deployment scenarios. Rather than offering concrete solutions for specific scenarios, IoT Edge is an extensible security framework based on well-grounded principles that are designed for scale. The risk of a deployment scenario depends on many factors, including:
19+
IoT Edge runs on various makes and models of hardware, supports several operating systems, and applies to diverse deployment scenarios. Rather than offering concrete solutions for specific scenarios, IoT Edge is an extensible security framework based on well-grounded principles designed for scale. The risk of a deployment scenario depends on many factors, including:
2020

2121
* Solution ownership
2222
* Deployment geography
@@ -29,21 +29,21 @@ This article provides an overview of the IoT Edge security framework. For more i
2929

3030
## Standards
3131

32-
Standards promote ease of scrutiny and ease of implementation, both of which are hallmarks of security. A security solution should lend itself to scrutiny under evaluation to build trust and shouldn't be a hurdle to deployment. The design of the framework to secure Azure IoT Edge is based on time-tested and industry proven security protocols for familiarity and reuse.
32+
Standards make scrutiny and implementation easier, which are hallmarks of security. A security solution must be easy to evaluate for trust and not hinder deployment. The framework for securing Azure IoT Edge uses proven security protocols for familiarity and reuse.
3333

3434
## Authentication
3535

3636
When you deploy an IoT solution, you need to know that only trusted actors, devices, and modules have access to your solution. Certificate-based authentication is the primary mechanism for authentication for the Azure IoT Edge platform. This mechanism is derived from a set of standards governing Public Key Infrastructure (PKiX) by the Internet Engineering Task Force (IETF).
3737

38-
All devices, modules, and actors that interact with the Azure IoT Edge device should have unique certificate identities. This guidance applies whether the interactions are physical or through a network connection. Not every scenario or component may lend itself to certificate-based authentication, so the extensibility of the security framework offers secure alternatives.
38+
All devices, modules, and actors that interact with the Azure IoT Edge device should have unique certificate identities. This guidance applies whether the interactions are physical or through a network connection. Not every scenario or component might lend itself to certificate-based authentication, so the extensibility of the security framework provides secure alternatives.
3939

4040
For more information, see [Azure IoT Edge certificate usage](iot-edge-certs.md).
4141

4242
## Authorization
4343

44-
The principle of least privilege says that users and components of a system should have access only to the minimum set of resources and data needed to perform their roles. Devices, modules, and actors should access only the resources and data within their permission scope, and only when it's architecturally allowable. Some permissions are configurable with sufficient privileges and others are architecturally enforced. For example, some modules may be authorized to connect to Azure IoT Hub. However, there's no reason why a module in one IoT Edge device should access the twin of a module in another IoT Edge device.
44+
The principle of least privilege says that users and components of a system should have access only to the minimum set of resources and data needed to perform their roles. Devices, modules, and actors should access only the resources and data within their permission scope and only when it's architecturally allowed. Some permissions are configurable with sufficient privileges, while others are architecturally enforced. For example, some modules may be authorized to connect to Azure IoT Hub. However, there's no reason why a module in one IoT Edge device should access the twin of a module in another IoT Edge device.
4545

46-
Other authorization schemes include certificate signing rights and role-based access control (RBAC).
46+
Other authorization schemes include certificate signing rights and role-based access control, or RBAC.
4747

4848
## Attestation
4949

@@ -55,38 +55,38 @@ Attestation ensures the integrity of software bits, which is important for detec
5555

5656
### Static attestation
5757

58-
Static attestation verifies the integrity of all software on a device during power-up, including the operating system, all runtimes, and configuration information. Because static attestation occurs during power-up, it's often referred to as secure boot. The security framework for IoT Edge devices extends to manufacturers and incorporates secure hardware capabilities that assure static attestation processes. These processes include secure boot and secure firmware upgrade. Working in close collaboration with silicon vendors eliminates superfluous firmware layers, so minimizes the threat surface.
58+
Static attestation verifies the integrity of all software on a device during power-up, including the operating system, all runtimes, and configuration information. Because static attestation occurs during power-up, it's often referred to as secure boot. The security framework for IoT Edge devices extends to manufacturers and incorporates secure hardware capabilities that assure static attestation processes. These processes include secure boot and secure firmware upgrade. Collaborating with silicon vendors eliminates unnecessary firmware layers and minimizes the threat surface.
5959

6060
### Runtime attestation
6161

62-
Once a system has completed a secure boot process, well-designed systems should detect attempts to inject malware and take proper countermeasures. Malware attacks may target the system's ports and interfaces. If malicious actors have physical access to a device, they may tamper with the device itself or use side-channel attacks to gain access. Such malcontent, whether malware or unauthorized configuration changes, can't be detected by static attestation because it's injected after the boot process. Countermeasures offered or enforced by the device's hardware help to ward off such threats. The security framework for IoT Edge explicitly calls for extensions that combat runtime threats.
62+
Once a system has completed a secure boot process, well-designed systems should detect attempts to inject malware and take proper countermeasures. Malware attacks may target the system's ports and interfaces. If malicious actors have physical access to a device, they may tamper with the device itself or use side-channel attacks to gain access. Such malcontent, whether malware or unauthorized configuration changes, can't be detected by static attestation because it's injected after the boot process. Hardware-based countermeasures help prevent such threats. The security framework for IoT Edge explicitly calls for extensions that combat runtime threats.
6363

6464
### Software attestation
6565

66-
All healthy systems, including intelligent edge systems, need patches and upgrades. Security is important for update processes, otherwise they can be potential threat vectors. The security framework for IoT Edge calls for updates through measured and signed packages to assure the integrity of and authenticate the source of the packages. This standard applies to all operating systems and application software bits.
66+
All healthy systems, including intelligent edge systems, need patches and upgrades. Security is important for update processes, otherwise they can be potential threat vectors. The IoT Edge security framework requires updates through measured and signed packages to ensure package integrity and authenticate their source. This standard applies to all operating systems and application software bits.
6767

6868
## Hardware root of trust
6969

7070
For many intelligent edge devices, especially devices that can be physically accessed by potential malicious actors, hardware security is the last defense for protection. Tamper resistant hardware is crucial for such deployments. Azure IoT Edge encourages secure silicon hardware vendors to offer different flavors of hardware root of trust to accommodate various risk profiles and deployment scenarios. Hardware trust may come from common security protocol standards like Trusted Platform Module (ISO/IEC 11889) and Trusted Computing Group's Device Identifier Composition Engine (DICE). Secure enclave technologies like TrustZones and Software Guard Extensions (SGX) also provide hardware trust.
7171

7272
## Certification
7373

74-
To help customers make informed decisions when procuring Azure IoT Edge devices for their deployment, the IoT Edge framework includes certification requirements. Foundational to these requirements are certifications pertaining to security claims and certifications pertaining to validation of the security implementation. For example, a security claim certification means that the IoT Edge device uses secure hardware known to resist boot attacks. A validation certification means that the secure hardware was properly implemented to offer this value in the device. In keeping with the principle of simplicity, the framework tries to keep the burden of certification minimal.
74+
To help customers make informed decisions when procuring Azure IoT Edge devices for their deployment, the IoT Edge framework includes certification requirements. Foundational to these requirements are certifications pertaining to security claims and certifications pertaining to validation of the security implementation. For example, a security claim certification means that the IoT Edge device uses secure hardware known to resist boot attacks. A validation certification means that the secure hardware was properly implemented to offer this value in the device. The framework keeps the burden of certification minimal to align with the principle of simplicity.
7575

7676
## Encryption at rest
7777

7878
Encryption at rest provides data protection for stored data. Attacks against data at-rest include attempts to get physical access to the hardware where the data is stored, and then compromise the contained data. You can use storage encryption to protect data stored on the device. Linux has several options for encryption at rest. Choose the option that best fits your needs. For Windows, [Windows BitLocker](/windows/security/operating-system-security/data-protection/bitlocker) is the recommended option for encryption at rest.
7979

8080
## Extensibility
8181

82-
With IoT technology driving different types of business transformations, security should evolve in parallel to address emerging scenarios. The Azure IoT Edge security framework starts with a solid foundation on which it builds in extensibility into different dimensions to include:
82+
With IoT technology driving different types of business transformations, security should evolve in parallel to address emerging scenarios. The Azure IoT Edge security framework starts with a solid foundation and builds extensibility into different dimensions, including:
8383

84-
* First party security services like the Device Provisioning Service for Azure IoT Hub.
84+
* First-party security services, like the Device Provisioning Service for Azure IoT Hub.
8585
* Third-party services like managed security services for different application verticals (like industrial or healthcare) or technology focus (like security monitoring in mesh networks, or silicon hardware attestation services) through a rich network of partners.
86-
* Legacy systems to include retrofitting with alternate security strategies, like using secure technology other than certificates for authentication and identity management.
86+
* Legacy systems, including retrofitting with alternate security strategies like using secure technology other than certificates for authentication and identity management.
8787
* Secure hardware for adoption of emerging secure hardware technologies and silicon partner contributions.
8888

89-
In the end, securing the intelligent edge requires collaborative contributions from an open community driven by the common interest in securing IoT. These contributions might be in the form of secure technologies or services. The Azure IoT Edge security framework offers a solid foundation for security that is extensible for the maximum coverage to offer the same level of trust and integrity in the intelligent edge as with Azure cloud.
89+
Securing the intelligent edge requires collaborative contributions from an open community driven by a shared interest in securing IoT. These contributions might be in the form of secure technologies or services. The Azure IoT Edge security framework offers a solid foundation for security that is extensible for the maximum coverage to offer the same level of trust and integrity in the intelligent edge as with Azure cloud.
9090

9191
## Next steps
9292

0 commit comments

Comments
 (0)