You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Azure IoT Edge security manager is a well-bounded security core for protecting the IoT Edge device and all its components by abstracting the secure silicon hardware. The security manager is the focal point for security hardening and provides technology integration point to original equipment manufacturers (OEM).
16
+
The Azure IoT Edge security manager is a well-bounded security core that protects the IoT Edge device and its components by abstracting secure silicon hardware. The security manager focuses on security hardening and gives a technology integration point to original equipment manufacturers (OEM).
18
17
19
-
The security manager abstracts the secure silicon hardware on an IoT Edge device and provides an extensibility framework for additional security services.
18
+
The security manager abstracts secure silicon hardware on an IoT Edge device and gives an extensibility framework for extra security services.
20
19
21
-
The IoT Edge security manager aims to defend the integrity of the IoT Edge device and all inherent software operations. The security manager transitions trust from underlying hardware root of trust hardware (if available) to bootstrap the IoT Edge runtime and monitor ongoing operations. The IoT Edge security manager is software working along with secure silicon hardware (where available) to help deliver the highest security assurances possible.
20
+
The IoT Edge security manager defends the integrity of the IoT Edge device and its software operations. The security manager transitions trust from underlying hardware root of trust hardware (if available) to bootstrap the IoT Edge runtime and monitor ongoing operations. The IoT Edge security manager works with secure silicon hardware (where available) to deliver the highest security assurances possible.
22
21
23
-
Additionally, the IoT Edge security manager provides a safe framework for security service extensions through host-level modules. These services include security monitoring and updates that require agents inside the device with privileged access to some components of the device. The extensibility framework ensures that such integrations consistently uphold overall system security.
22
+
The IoT Edge security manager also gives a safe framework for security service extensions through host-level modules. These services include security monitoring and updates that require agents inside the device with privileged access to some device components. The extensibility framework makes sure these integrations always uphold overall system security.
24
23
25
-
The responsibilities of the IoT Edge security manager include, but aren't limited to:
24
+
The IoT Edge security manager is responsible for tasks like:
26
25
27
-
* Bootstrap the Azure IoT Edge device.
28
-
* Control access to the device hardware root of trust through notary services.
29
-
* Monitor the integrity of IoT Edge operations at runtime.
30
-
* Provision the device identity and manage transition of trust where applicable.
31
-
*Ensure safe operation of client agents for services including Device Update for IoT Hub and Microsoft Defender for IoT.
26
+
* Bootstrap the Azure IoT Edge device
27
+
* Control access to the device hardware root of trust through notary services
28
+
* Monitor the integrity of IoT Edge operations at runtime
29
+
* Provision the device identity and manage transition of trust where needed
30
+
*Make sure client agents for services like Device Update for IoT Hub and Microsoft Defender for IoT run safely
32
31
33
-
The IoT Edge security manager consists of three components:
32
+
The IoT Edge security manager has three components:
34
33
35
-
*The IoT Edge module runtime
36
-
* Hardware security module (HSM) abstractions through standard implementations such asPKCS#11 and Trusted Platform Module (TPM)
37
-
*A hardware silicon root of trust or HSM (optional, but highly recommended)
34
+
* IoT Edge module runtime
35
+
* Hardware security module (HSM) abstractions through standard implementations likePKCS#11 and Trusted Platform Module (TPM)
36
+
*Hardware silicon root of trust or HSM (optional, but highly recommended)
38
37
39
38
## Changes in version 1.2 and later
40
39
41
-
In versions 1.0 and 1.1 of IoT Edge, a component called the **security daemon**was responsible for the logical security operations of the security manager. In the update to version 1.2, several key responsibilities were delegated to the [Azure IoT Identity Service](https://azure.github.io/iot-identity-service/) security subsystem. Once these security-based tasks were removed from the security daemon, its name no longer made sense. To better reflect the work that this component does in version 1.2 and beyond, we renamed it to the **module runtime**.
40
+
In versions 1.0 and 1.1 of IoT Edge, a component called the **security daemon**manages the logical security operations of the security manager. In version 1.2, several key responsibilities move to the [Azure IoT Identity Service](https://azure.github.io/iot-identity-service/) security subsystem. After these security tasks move from the security daemon, its name doesn't fit its role. To better reflect what this component does in version 1.2 and later, it's renamed to the **module runtime**.
42
41
43
42
## The IoT Edge module runtime
44
43
@@ -114,22 +113,22 @@ The IoT Edge runtime tracks and reports the version of the IoT Edge module runti
114
113
115
114
## Hardware security module
116
115
117
-
The IoT Edge security manager implements the Trusted Platform Module and PKCS#11 interface standards for integrating hardware security modules (HSMs). With these standards, virtually any HSM, including those with proprietary interfaces, can be integrated. We strongly recommend using HSMs for security hardening.
116
+
The IoT Edge security manager uses the Trusted Platform Module and PKCS#11 interface standards to integrate hardware security modules (HSMs). These standards let you integrate almost any HSM, including those with proprietary interfaces. Use HSMs to strengthen security.
118
117
119
118
## Secure silicon root of trust hardware
120
119
121
-
Secure silicon is necessary to anchor trust inside the IoT Edge device hardware. Secure silicon come in variety to include Trusted Platform Module (TPM), embedded Secure Element (eSE), Arm TrustZone, Intel SGX, and custom secure silicon technologies. The use of secure silicon root of trust in devices is recommended given the threats associated with physical accessibility of IoT devices.
120
+
Secure silicon anchors trust in IoT Edge device hardware. Secure silicon includes Trusted Platform Module (TPM), embedded Secure Element (eSE), Arm TrustZone, Intel SGX, and custom secure silicon technologies. Using secure silicon root of trust in devices is important because of the threats that come with physical access to IoT devices.
122
121
123
-
The IoT Edge security manager aims to identify and isolate the components that defend the security and integrity of the Azure IoT Edge platform for custom hardening. Third parties, like device makers, should make use of custom security features available with their device hardware.
122
+
The IoT Edge security manager identifies and isolates the components that protect the security and integrity of the Azure IoT Edge platform for custom hardening. Device makers and other third parties can use custom security features available with their device hardware.
124
123
125
-
Learn how to harden the Azure IoT security manager with the Trusted Platform Module (TPM) using software or virtual TPMs:
124
+
Learn how to harden the Azure IoT security manager with Trusted Platform Module (TPM) by using software or virtual TPMs:
126
125
127
126
Create and provision an IoT Edge device with a virtual TPM on [Linux](how-to-provision-devices-at-scale-linux-tpm.md) or [Linux on Windows](how-to-provision-devices-at-scale-linux-on-windows-tpm.md).
128
127
129
128
## Next steps
130
129
131
-
To learn more about securing your IoT Edge devices, read the following blog posts:
130
+
Learn more about securing your IoT Edge devices in these blog posts:
132
131
133
-
*[Securing the intelligent edge](https://azure.microsoft.com/blog/securing-the-intelligent-edge/).
132
+
*[Securing the intelligent edge](https://azure.microsoft.com/blog/securing-the-intelligent-edge/)
134
133
*[The blueprint to securely solve the elusive zero-touch provisioning of IoT devices at scale](https://azure.microsoft.com/blog/the-blueprint-to-securely-solve-the-elusive-zerotouch-provisioning-of-iot-devices-at-scale/)
135
134
*[Solving IoT device security at scale through standards](https://azure.microsoft.com/blog/solving-iot-device-security-at-scale-through-standards/)
0 commit comments