Skip to content

Commit 407b797

Browse files
committed
Fix typo remove sentence
1 parent 7660c42 commit 407b797

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/iot-dps/concepts-device-oem-security-practices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -176,9 +176,9 @@ Cons for shared symmetric key:
176176
- You will likely lose control of devices if you rely on shared symmetric key.
177177

178178
### Making the right choice for your devices
179-
To choose an authentication method, make sure you consider the benefits and costs of each approach for your unique manufacturing process. For device authentication, usually there's an inverse relationship between how secure a given approach is, and how convenient it is. This article surveyed the main issues and recommended best practices. xx
179+
To choose an authentication method, make sure you consider the benefits and costs of each approach for your unique manufacturing process. For device authentication, usually there's an inverse relationship between how secure a given approach is, and how convenient it is.
180180

181-
In addition, Azure IoT provides other resources to help with selecting secure hardware, and creating secure IoT deployments:
181+
In addition to the practices in this article, Azure IoT provides additional resources to help with selecting secure hardware, and creating secure IoT deployments:
182182
- Azure IoT [security recommendations](../iot-fundamentals/security-recommendations.md) to guide the deployment process.
183183
- The [Azure Security Center](https://azure.microsoft.com/services/security-center/) offers a service to help create secure IoT deployments.
184184
- For help evaluating your hardware environment, see the whitepaper [Evaluating your IoT Security](https://download.microsoft.com/download/D/3/9/D3948E3C-D5DC-474E-B22F-81BA8ED7A446/Evaluating_Your_IOT_Security_whitepaper_EN_US.pdf).

0 commit comments

Comments
 (0)