Skip to content

Commit 435b033

Browse files
committed
Freshness review
1 parent ce3bd1a commit 435b033

File tree

1 file changed

+22
-23
lines changed

1 file changed

+22
-23
lines changed

articles/iot-edge/iot-edge-security-manager.md

Lines changed: 22 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -5,40 +5,39 @@ services: iot-edge
55
keywords: security, secure element, enclave, TEE, IoT Edge
66
author: PatAltimore
77
ms.author: patricka
8-
ms.reviewer: eustacea
9-
ms.date: 06/06/2024
8+
ms.date: 06/03/2025
109
ms.topic: concept-article
1110
ms.service: azure-iot-edge
1211
---
1312
# Azure IoT Edge security manager
1413

1514
[!INCLUDE [iot-edge-version-all-supported](includes/iot-edge-version-all-supported.md)]
1615

17-
The Azure IoT Edge security manager is a well-bounded security core for protecting the IoT Edge device and all its components by abstracting the secure silicon hardware. The security manager is the focal point for security hardening and provides technology integration point to original equipment manufacturers (OEM).
16+
The Azure IoT Edge security manager is a well-bounded security core that protects the IoT Edge device and its components by abstracting secure silicon hardware. The security manager focuses on security hardening and gives a technology integration point to original equipment manufacturers (OEM).
1817

19-
The security manager abstracts the secure silicon hardware on an IoT Edge device and provides an extensibility framework for additional security services.
18+
The security manager abstracts secure silicon hardware on an IoT Edge device and gives an extensibility framework for extra security services.
2019

21-
The IoT Edge security manager aims to defend the integrity of the IoT Edge device and all inherent software operations. The security manager transitions trust from underlying hardware root of trust hardware (if available) to bootstrap the IoT Edge runtime and monitor ongoing operations. The IoT Edge security manager is software working along with secure silicon hardware (where available) to help deliver the highest security assurances possible.
20+
The IoT Edge security manager defends the integrity of the IoT Edge device and its software operations. The security manager transitions trust from underlying hardware root of trust hardware (if available) to bootstrap the IoT Edge runtime and monitor ongoing operations. The IoT Edge security manager works with secure silicon hardware (where available) to deliver the highest security assurances possible.
2221

23-
Additionally, the IoT Edge security manager provides a safe framework for security service extensions through host-level modules. These services include security monitoring and updates that require agents inside the device with privileged access to some components of the device. The extensibility framework ensures that such integrations consistently uphold overall system security.
22+
The IoT Edge security manager also gives a safe framework for security service extensions through host-level modules. These services include security monitoring and updates that require agents inside the device with privileged access to some device components. The extensibility framework makes sure these integrations always uphold overall system security.
2423

25-
The responsibilities of the IoT Edge security manager include, but aren't limited to:
24+
The IoT Edge security manager is responsible for tasks like:
2625

27-
* Bootstrap the Azure IoT Edge device.
28-
* Control access to the device hardware root of trust through notary services.
29-
* Monitor the integrity of IoT Edge operations at runtime.
30-
* Provision the device identity and manage transition of trust where applicable.
31-
* Ensure safe operation of client agents for services including Device Update for IoT Hub and Microsoft Defender for IoT.
26+
* Bootstrap the Azure IoT Edge device
27+
* Control access to the device hardware root of trust through notary services
28+
* Monitor the integrity of IoT Edge operations at runtime
29+
* Provision the device identity and manage transition of trust where needed
30+
* Make sure client agents for services like Device Update for IoT Hub and Microsoft Defender for IoT run safely
3231

33-
The IoT Edge security manager consists of three components:
32+
The IoT Edge security manager has three components:
3433

35-
* The IoT Edge module runtime
36-
* Hardware security module (HSM) abstractions through standard implementations such as PKCS#11 and Trusted Platform Module (TPM)
37-
* A hardware silicon root of trust or HSM (optional, but highly recommended)
34+
* IoT Edge module runtime
35+
* Hardware security module (HSM) abstractions through standard implementations like PKCS#11 and Trusted Platform Module (TPM)
36+
* Hardware silicon root of trust or HSM (optional, but highly recommended)
3837

3938
## Changes in version 1.2 and later
4039

41-
In versions 1.0 and 1.1 of IoT Edge, a component called the **security daemon** was responsible for the logical security operations of the security manager. In the update to version 1.2, several key responsibilities were delegated to the [Azure IoT Identity Service](https://azure.github.io/iot-identity-service/) security subsystem. Once these security-based tasks were removed from the security daemon, its name no longer made sense. To better reflect the work that this component does in version 1.2 and beyond, we renamed it to the **module runtime**.
40+
In versions 1.0 and 1.1 of IoT Edge, a component called the **security daemon** manages the logical security operations of the security manager. In version 1.2, several key responsibilities move to the [Azure IoT Identity Service](https://azure.github.io/iot-identity-service/) security subsystem. After these security tasks move from the security daemon, its name doesn't fit its role. To better reflect what this component does in version 1.2 and later, it's renamed to the **module runtime**.
4241

4342
## The IoT Edge module runtime
4443

@@ -114,22 +113,22 @@ The IoT Edge runtime tracks and reports the version of the IoT Edge module runti
114113

115114
## Hardware security module
116115

117-
The IoT Edge security manager implements the Trusted Platform Module and PKCS#11 interface standards for integrating hardware security modules (HSMs). With these standards, virtually any HSM, including those with proprietary interfaces, can be integrated. We strongly recommend using HSMs for security hardening.
116+
The IoT Edge security manager uses the Trusted Platform Module and PKCS#11 interface standards to integrate hardware security modules (HSMs). These standards let you integrate almost any HSM, including those with proprietary interfaces. Use HSMs to strengthen security.
118117

119118
## Secure silicon root of trust hardware
120119

121-
Secure silicon is necessary to anchor trust inside the IoT Edge device hardware. Secure silicon come in variety to include Trusted Platform Module (TPM), embedded Secure Element (eSE), Arm TrustZone, Intel SGX, and custom secure silicon technologies. The use of secure silicon root of trust in devices is recommended given the threats associated with physical accessibility of IoT devices.
120+
Secure silicon anchors trust in IoT Edge device hardware. Secure silicon includes Trusted Platform Module (TPM), embedded Secure Element (eSE), Arm TrustZone, Intel SGX, and custom secure silicon technologies. Using secure silicon root of trust in devices is important because of the threats that come with physical access to IoT devices.
122121

123-
The IoT Edge security manager aims to identify and isolate the components that defend the security and integrity of the Azure IoT Edge platform for custom hardening. Third parties, like device makers, should make use of custom security features available with their device hardware.
122+
The IoT Edge security manager identifies and isolates the components that protect the security and integrity of the Azure IoT Edge platform for custom hardening. Device makers and other third parties can use custom security features available with their device hardware.
124123

125-
Learn how to harden the Azure IoT security manager with the Trusted Platform Module (TPM) using software or virtual TPMs:
124+
Learn how to harden the Azure IoT security manager with Trusted Platform Module (TPM) by using software or virtual TPMs:
126125

127126
Create and provision an IoT Edge device with a virtual TPM on [Linux](how-to-provision-devices-at-scale-linux-tpm.md) or [Linux on Windows](how-to-provision-devices-at-scale-linux-on-windows-tpm.md).
128127

129128
## Next steps
130129

131-
To learn more about securing your IoT Edge devices, read the following blog posts:
130+
Learn more about securing your IoT Edge devices in these blog posts:
132131

133-
* [Securing the intelligent edge](https://azure.microsoft.com/blog/securing-the-intelligent-edge/).
132+
* [Securing the intelligent edge](https://azure.microsoft.com/blog/securing-the-intelligent-edge/)
134133
* [The blueprint to securely solve the elusive zero-touch provisioning of IoT devices at scale](https://azure.microsoft.com/blog/the-blueprint-to-securely-solve-the-elusive-zerotouch-provisioning-of-iot-devices-at-scale/)
135134
* [Solving IoT device security at scale through standards](https://azure.microsoft.com/blog/solving-iot-device-security-at-scale-through-standards/)

0 commit comments

Comments
 (0)