Skip to content

Commit c9dec3d

Browse files
committed
Fix typo
1 parent 407b797 commit c9dec3d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/iot-dps/concepts-device-oem-security-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ Cons for shared symmetric key:
178178
### Making the right choice for your devices
179179
To choose an authentication method, make sure you consider the benefits and costs of each approach for your unique manufacturing process. For device authentication, usually there's an inverse relationship between how secure a given approach is, and how convenient it is.
180180

181-
In addition to the practices in this article, Azure IoT provides additional resources to help with selecting secure hardware, and creating secure IoT deployments:
181+
In addition to the practices in this article, Azure IoT provides resources to help with selecting secure hardware, and creating secure IoT deployments:
182182
- Azure IoT [security recommendations](../iot-fundamentals/security-recommendations.md) to guide the deployment process.
183183
- The [Azure Security Center](https://azure.microsoft.com/services/security-center/) offers a service to help create secure IoT deployments.
184184
- For help evaluating your hardware environment, see the whitepaper [Evaluating your IoT Security](https://download.microsoft.com/download/D/3/9/D3948E3C-D5DC-474E-B22F-81BA8ED7A446/Evaluating_Your_IOT_Security_whitepaper_EN_US.pdf).

0 commit comments

Comments
 (0)