Skip to content

Commit 682ca9d

Browse files
authored
Merge pull request #242029 from ochimo/velma_docs
Initial draft of Defender for IoT Firmware analysis documentation
2 parents c181b29 + 0602252 commit 682ca9d

File tree

11 files changed

+163
-0
lines changed

11 files changed

+163
-0
lines changed

articles/defender-for-iot/device-builders/TOC.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@
3030
href: tutorial-investigate-security-recommendations.md
3131
- name: Investigate security alerts
3232
href: tutorial-investigate-security-alerts.md
33+
- name: Analyze an IoT/OT firmware image
34+
href: tutorial-analyze-firmware.md
3335
- name: Concepts
3436
items:
3537
- name: Agent portfolio overview and OS support
@@ -60,6 +62,9 @@
6062
href: concept-customizable-security-alerts.md
6163
- name: Security recommendations for IoT Hub
6264
href: concept-recommendations.md
65+
- name: Firmware analysis (preview)
66+
displayName: IoT, OT, firmware, analysis
67+
href: overview-firmware-analysis.md
6368
- name: How-to guides
6469
items:
6570
- name: Install Defender for IoT micro agent for Edge

articles/defender-for-iot/device-builders/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,8 @@ landingContent:
4141
url: concept-recommendations.md
4242
- text: Event aggregation
4343
url: concept-event-aggregation.md
44+
- text: Firmware analysis (preview)
45+
url: overview-firmware-analysis.md
4446
- title: How-to
4547
linkLists:
4648
- linkListType: how-to-guide
218 KB
Loading
205 KB
Loading
209 KB
Loading
151 KB
Loading
180 KB
Loading
301 KB
Loading
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
title: Firmware analysis for device builders - Microsoft Defender for IoT
3+
description: Learn how Microsoft Defender for IoT's firmware analysis helps device builders to market and deploy highly secure IoT/OT devices.
4+
ms.topic: conceptual
5+
ms.date: 06/15/2023
6+
#Customer intent: As a device builder, I want to understand how firmware analysis can help secure my IoT/OT devices and products.
7+
---
8+
9+
# Firmware analysis for device builders
10+
11+
Just like computers have operating systems, IoT devices have firmware, and it's the firmware that runs and controls IoT devices. For IoT device builders, security is a near-universal concern as IoT devices have traditionally lacked basic security measures.
12+
13+
For example, IoT attack vectors typically use easily exploitable--but easily correctable--weaknesses such as hardcoded user accounts, outdated and vulnerable open-source packages, or a manufacturer's private cryptographic signing key.
14+
15+
Use Microsoft Defender for IoT's firmware analysis to identify embedded security threats, vulnerabilities, and common weaknesses that may be otherwise undetectable.
16+
17+
> [!NOTE]
18+
> The Defender for IoT **Firmware analysis** page is in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
19+
>
20+
21+
## How to be sure your firmware is secure
22+
23+
Defender for IoT can analyze your firmware for common weaknesses and vulnerabilities, and provide insight into your firmware security. This analysis is useful whether you build the firmware in-house or receive firmware from your supply chain.
24+
25+
- **Software bill of materials (SBOM)**: Receive a detailed listing of open-source packages used during the firmware's build process. See the package version and what license governs the use of the open-source package.
26+
27+
- **CVE analysis**: See which firmware components have publicly known security vulnerabilities and exposures.
28+
29+
- **Binary hardening analysis**: Identify binaries that haven't enabled specific security flags during compilation like buffer overflow protection, position independent executables, and more common hardening techniques.
30+
31+
- **SSL certificate analysis**: Reveal expired and revoked TLS/SSL certificates.
32+
33+
- **Public and private key analysis**: Verify that the public and private cryptographic keys discovered in the firmware are necessary and not accidental.
34+
35+
- **Password hash extraction**: Ensure that user account password hashes use secure cryptographic algorithms.
36+
37+
## Next steps
38+
39+
- [Analyze a firmware image](tutorial-analyze-firmware.md)

articles/defender-for-iot/device-builders/release-notes.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,17 @@ Noted features are in PREVIEW. The [Azure Preview Supplemental Terms](https://az
1515

1616
For more information, see [Upgrade the Microsoft Defender for IoT micro agent](upgrade-micro-agent.md).
1717

18+
## July 2023
19+
20+
**Firmware analysis public preview announcement**
21+
22+
Microsoft Defender for IoT Firmware analysis is now available in public preview. Defender for IoT can analyze your device firmware for common weaknesses and vulnerabilities, and provide insight into your firmware security. This analysis is useful whether you build the firmware in-house or receive firmware from your supply chain.
23+
24+
For more information, see [Firmware analysis for device builders](overview-firmware-analysis.md).
25+
26+
:::image type="content" source="media/tutorial-firmware-analysis/overview.png" alt-text="Screenshot that shows clicking view results button for a detailed analysis of the firmware image.":::
27+
28+
1829
## December 2022
1930

2031
**Version 4.6.2**:

0 commit comments

Comments
 (0)