Skip to content

Commit d4d0b09

Browse files
committed
security best practices update
1 parent fc5fefd commit d4d0b09

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

articles/digital-twins/security-best-practices.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: bertvanhoof
77
ms.service: digital-twins
88
services: digital-twins
99
ms.topic: conceptual
10-
ms.date: 09/30/2019
10+
ms.date: 11/19/2019
1111
---
1212

1313
# Azure Digital Twins security best practices
@@ -33,8 +33,8 @@ Some key practices to safely secure your IoT devices include:
3333
> * Limit the role of each device, sensor, and person within your IoT space. If compromised, the effect is minimized.
3434
> * Consider the potential use of device IP address filtering and port restriction.
3535
> * Limit I/O and device bandwidth to improve performance. Rate-limiting can improve security by preventing denial-of-service attacks.
36-
> * Keep device firmware up to date.
37-
> * Periodically audit and review device, network, and gateway security best practices as they continue to improve and evolve.
36+
> * Keep device firmware, operating system, and software up to date.
37+
> * Periodically audit and review device, software, network, and gateway security best practices as they continue to improve and evolve.
3838
3939
Some key practices to safely secure an IoT space include:
4040

@@ -43,16 +43,19 @@ Some key practices to safely secure an IoT space include:
4343
> * Require passwords or keys to be periodically changed or refreshed.
4444
> * Carefully restrict access and permissions by role. See the section [Role-based access control best practices](#role-based-access-control-best-practices) below.
4545
> * Consider a divided network topology so that devices on each network are isolated from the others.
46-
> * Use powerful encryption. Require long passwords, and use secure protocols and two-factor authentication.
46+
> * Use powerful encryption. Require long passwords, use secure protocols, and [multi-factor authentication](https://docs.microsoft.com/azure/active-directory/authentication/concept-mfa-howitworks).
4747
4848
[Monitor](./how-to-configure-monitoring.md) IoT resources to watch for outliers, threats, or resource parameters that fall outside the range of usual operation. Use Azure Analytics for monitoring management.
4949

50+
> [!IMPORTANT]
51+
> Read Azure [IoT security best practices](../iot-fundamentals/iot-security-best-practices.md) to begin a comprehensive IoT security strategy.
52+
5053
> [!NOTE]
5154
> For more information on event processing and monitoring, see [Route events and messages with Azure Digital Twins](./concepts-events-routing.md).
5255
5356
## Azure Active Directory best practices
5457

55-
Azure Digital Twins uses Azure Active Directory to authenticate users and protect applications. Azure Active Directory supports authentication for a variety of modern architectures. They're all based on industry-standard protocols such as OAuth 2.0 or OpenID Connect. A few key practices to secure your IoT space for Azure Active Directory include:
58+
Azure Digital Twins uses [Azure Active Directory](https://docs.microsoft.com/azure/active-directory/authentication/) to authenticate users and protect applications. Azure Active Directory supports authentication for a variety of modern architectures. They're all based on industry-standard protocols such as OAuth 2.0 or OpenID Connect. A few key practices to secure your IoT space for Azure Active Directory include:
5659

5760
> [!div class="checklist"]
5861
> * Store Azure Active Directory app secrets and keys in a secure location, such as [Azure Key Vault](https://azure.microsoft.com/services/key-vault/).

0 commit comments

Comments
 (0)