Skip to content

Commit 420a666

Browse files
authored
Merge pull request #295333 from asergaz/naming-iot
iot-overview-security PG suggested changes
2 parents d4375a4 + e1f7505 commit 420a666

File tree

3 files changed

+18
-3
lines changed

3 files changed

+18
-3
lines changed
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
- name: Azure
2+
tocHref: /azure
3+
topicHref: /azure/index
4+
items:
5+
- name: Internet of Things
6+
tocHref: /azure/iot/
7+
topicHref: /azure/iot/index
8+
items:
9+
- name: IoT Operations
10+
tocHref: /azure/iot-operations/
11+
topicHref: /azure/iot-operations/index
12+
#For Contextual TOC
13+
- name: IoT Operations
14+
tocHref: /azure/iot/
15+
topicHref: /azure/iot-operations/index

articles/iot-operations/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ items:
3939
href: secure-iot-ops/howto-manage-secrets.md
4040
- name: Validate images
4141
href: secure-iot-ops/howto-validate-images.md
42+
- name: Secure your solution
43+
href: ../iot/iot-overview-security.md?toc=/azure/iot-operations/toc.json&bc=/azure/iot-operations/breadcrumb/toc.json&tabs=edge
4244
- name: Discover and manage assets
4345
items:
4446
- name: Asset management overview

articles/iot/iot-overview-security.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The following diagram shows a high-level view of the components in a typical edg
2121
<!-- Art Library Source# ConceptArt-0-000-032 -->
2222
:::image type="content" source="media/iot-overview-security/iot-edge-security-architecture.svg" alt-text="Diagram that shows the high-level IoT edge-based solution architecture highlighting security." border="false":::
2323

24-
You can divide security in an edge-based IoT solution into the following three areas:
24+
You can divide security in an edge-based IoT solution into the following four areas:
2525

2626
- **Asset security**: Secure the physical or virtual item of value that you want to manage, monitor, and collect data from.
2727

@@ -83,8 +83,6 @@ Both Defender for IoT and Defender for Containers can automatically monitor some
8383

8484
- **Provide the least privilege needed for the topic asset in your MQTT broker**: Authorization policies determine what actions the clients can perform on the broker, such as connecting, publishing, or subscribing to topics. Configure the MQTT broker to use one or multiple authorization policies with the BrokerAuthorization resource. To learn more, see [Configure MQTT broker authorization](../iot-operations/manage-mqtt-broker/howto-configure-authorization.md).
8585

86-
- **Configure isolated network environments by using Azure IoT Layered Network Management (preview)**: Azure IoT Layered Network Management (preview) is a component that facilitates the connection between Azure and clusters in isolated network environments. In industrial scenarios, the isolated networks follow the *[ISA-95](https://www.isa.org/standards-and-publications/isa-standards/isa-standards-committees/isa95)/[Purdue Network architecture](https://en.wikipedia.org/wiki/Purdue_Enterprise_Reference_Architecture)*. To learn more, see [What is Azure IoT Layered Network Management (preview)?](../iot-operations/manage-layered-network/overview-layered-network.md).
87-
8886
## Cloud security
8987

9088
- **Use user-assigned managed identities for cloud connections**: Always use managed identity authentication. When possible, [use user-assigned managed identity](../iot-operations/connect-to-cloud/howto-configure-mqtt-endpoint.md#user-assigned-managed-identity) in data flow endpoints for flexibility and auditability.

0 commit comments

Comments
 (0)