Skip to content

Commit 9807a14

Browse files
committed
Move best practices files to correct locations
1 parent c9d5f9b commit 9807a14

13 files changed

+239
-279
lines changed

articles/iot-accelerators/.openpublishing.redirection.iot-accelerators.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -522,7 +522,7 @@
522522
},
523523
{
524524
"source_path_from_root": "/articles/iot-accelerators/iot-accelerators-security-deployment.md",
525-
"redirect_url": "/azure/iot-fundamentals/iot-security-deployment",
525+
"redirect_url": "/azure/iot-fundamentals/iot-security-best-practices",
526526
"redirect_document_id": false
527527
},
528528
{

articles/iot-dps/concepts-device-oem-security-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ For more information, see [provisioning](about-iot-dps.md#provisioning-process)
182182
## Resources
183183

184184
In addition to the recommended security practices in this article, Azure IoT provides resources to help with selecting secure hardware and creating secure IoT deployments:
185-
- Azure IoT [security recommendations](../iot-fundamentals/security-recommendations.md) to guide the deployment process.
185+
- Azure IoT [security best practices](../iot-fundamentals/security-best-practices.md) to guide the deployment process.
186186
- The [Microsoft Defender for Cloud](https://azure.microsoft.com/services/security-center/) offers a service to help create secure IoT deployments.
187187
- For help with evaluating your hardware environment, see the whitepaper [Evaluating your IoT Security](https://download.microsoft.com/download/D/3/9/D3948E3C-D5DC-474E-B22F-81BA8ED7A446/Evaluating_Your_IOT_Security_whitepaper_EN_US.pdf).
188188
- For help with selecting secure hardware, see [The Right Secure Hardware for your IoT Deployment](https://download.microsoft.com/download/C/0/5/C05276D6-E602-4BB1-98A4-C29C88E57566/The_right_secure_hardware_for_your_IoT_deployment_EN_US.pdf).

articles/iot-fundamentals/.openpublishing.redirection.iot-fundamentals.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,16 @@
44
"source_path_from_root": "/articles/iot-fundamentals/iot-solution-apaas-paas.md",
55
"redirect_url": "/azure/iot-fundamentals",
66
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/iot-fundamentals/iot-security-recommendations.md",
10+
"redirect_url": "/azure/iot-fundamentals/iot-security-best-practices",
11+
"redirect_document_id": true
12+
},
13+
{
14+
"source_path_from_root": "/articles/iot-fundamentals/iot-security-deployment.md",
15+
"redirect_url": "/azure/iot-fundamentals/iot-security-best-practices",
16+
"redirect_document_id": true
717
}
818
]
919
}

articles/iot-fundamentals/iot-security-best-practices.md

Lines changed: 224 additions & 1 deletion
Large diffs are not rendered by default.

articles/iot-fundamentals/iot-security-deployment.md

Lines changed: 0 additions & 18 deletions
This file was deleted.

articles/iot-fundamentals/security-recommendations.md

Lines changed: 0 additions & 62 deletions
This file was deleted.

articles/iot-fundamentals/toc.yml

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,14 +20,10 @@
2020
href: howto-use-iot-explorer.md
2121
- name: Security
2222
items:
23-
- name: Recommendations
24-
href: security-recommendations.md
2523
- name: Security best practices
2624
href: iot-security-best-practices.md
2725
- name: Security architecture
2826
href: iot-security-architecture.md
29-
- name: Secure deployment
30-
href: iot-security-deployment.md
3127
- name: Resources
3228
items:
3329
- name: Azure IoT services

articles/iot-hub/.openpublishing.redirection.iot-hub.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@
9797
},
9898
{
9999
"source_path_from_root": "/articles/iot-hub/iot-hub-security-deployment.md",
100-
"redirect_url": "/azure/iot-fundamentals/iot-security-deployment",
100+
"redirect_url": "/azure/iot-fundamentals/iot-security-best-practices",
101101
"redirect_document_id": false
102102
},
103103
{

articles/iot-hub/TOC.yml

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -239,15 +239,10 @@
239239
- name: Security controls by Azure Policy
240240
displayName: regulatory, compliance, standards, Azure Security Benchmark, Azure Foundations Benchmark, CMMC, FedRAMP, HIPAA
241241
href: ./security-controls-policy.md
242-
- name: IoT security recommendations
243-
displayName: security
244-
href: ../iot-fundamentals/security-recommendations.md?context=%2fazure%2fiot-hub%2frc%2frc
245242
- name: IoT security best practices
246243
href: ../iot-fundamentals/iot-security-best-practices.md?context=%2fazure%2fiot-hub%2frc%2frc
247244
- name: IoT security architecture
248245
href: ../iot-fundamentals/iot-security-architecture.md?context=%2fazure%2fiot-hub%2frc%2frc
249-
- name: Secure your IoT deployment
250-
href: ../iot-fundamentals/iot-security-deployment.md?context=%2fazure%2fiot-hub%2frc%2frc
251246

252247
- name: How-to guides
253248
items:

0 commit comments

Comments
 (0)