Skip to content

Commit eeeb046

Browse files
committed
fix H2 in iot-overview-security
1 parent f64add5 commit eeeb046

File tree

1 file changed

+10
-12
lines changed

1 file changed

+10
-12
lines changed

articles/iot/iot-overview-security.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Typically on an edge-based solution, you want to secure your end-to-end operatio
3838
- Ensure governance through applying policies with [Azure Policy for Kubernetes](/azure/governance/policy/concepts/policy-for-kubernetes).
3939
- Grant access and connect to your Kubernetes clusters from anywhere, and manage access by using [Azure role-based access control (Azure RBAC)](/azure/azure-arc/kubernetes/azure-rbac) on your cluster.
4040

41-
## Microsoft Defender for IoT and for Containers
41+
### Microsoft Defender for IoT and for Containers
4242

4343
Microsoft Defender for IoT is a unified security solution built specifically to identify IoT and operational technology (OT) devices, vulnerabilities, and threats. Microsoft Defender for Containers is a cloud-native solution to improve, monitor, and maintain the security of your containerized assets (Kubernetes clusters, Kubernetes nodes, Kubernetes workloads, container registries, container images and more), and their applications, across multicloud and on-premises environments.
4444

@@ -47,7 +47,7 @@ Both Defender for IoT and Defender for Containers can automatically monitor some
4747
- [Microsoft Defender for Containers - overview](/azure/defender-for-cloud/defender-for-containers-introduction)
4848
- [Microsoft Defender for IoT for organizations - overview](../defender-for-iot/organizations/overview.md).
4949

50-
## Asset security
50+
### Asset security
5151

5252
- **Secrets management**: Use [Azure Key Vault](/azure/key-vault/general/overview) to store and manage asset's sensitive information such as keys, passwords, certificates, and secrets. Azure IoT Operations uses Azure Key Vault as the managed vault solution on the cloud, and uses [Azure Key Vault Secret Store extension for Kubernetes](/azure/azure-arc/kubernetes/secret-store-extension) to sync the secrets down from the cloud and store them on the edge as Kubernetes secrets. To learn more, see [Manage secrets for your Azure IoT Operations deployment](../iot-operations/secure-iot-ops/howto-manage-secrets.md).
5353

@@ -61,7 +61,7 @@ Both Defender for IoT and Defender for Containers can automatically monitor some
6161

6262
- **Follow device manufacturer security and deployment best practices**: If the device manufacturer provides security and deployment guidance, follow that guidance in addition to the generic guidance listed in this article.
6363

64-
## Connection security
64+
### Connection security
6565

6666
- **Use Transport Layer Security (TLS) to secure connections from assets**: All communication within Azure IoT Operations is encrypted using TLS. To provide a secure-by-default experience that minimizes inadvertent exposure of your edge-based solution to attackers, Azure IoT Operations is deployed with a default root CA and issuer for TLS server certificates. For a production deployment, we recommend using your own CA issuer and an enterprise PKI solution.
6767

@@ -73,7 +73,7 @@ Both Defender for IoT and Defender for Containers can automatically monitor some
7373

7474
- **Set up a secure connection to OPC UA server**: When connecting to an OPC UA server, you should determine which OPC UA servers you trust to securely establish a session with. To learn more, see [Configure OPC UA certificates infrastructure for the connector for OPC UA](../iot-operations/discover-manage-assets/howto-configure-opcua-certificates-infrastructure.md).
7575

76-
## Edge security
76+
### Edge security
7777

7878
- **Keep the edge runtime environment up-to-date**: Keep your cluster and Azure IoT Operations deployment up-to-date with the latest patches and minor releases to get all available security and bug fixes. For production deployments, [turn off auto-upgrade for Azure Arc](/azure/azure-arc/kubernetes/agent-upgrade#toggle-automatic-upgrade-on-or-off-when-connecting-a-cluster-to-azure-arc) to have complete control over when new updates are applied to your cluster. Instead, [manually upgrade agents](/azure/azure-arc/kubernetes/agent-upgrade#manually-upgrade-agents) as needed.
7979

@@ -83,7 +83,7 @@ Both Defender for IoT and Defender for Containers can automatically monitor some
8383

8484
- **Provide the least privilege needed for the topic asset in your MQTT broker**: Authorization policies determine what actions the clients can perform on the broker, such as connecting, publishing, or subscribing to topics. Configure the MQTT broker to use one or multiple authorization policies with the BrokerAuthorization resource. To learn more, see [Configure MQTT broker authorization](../iot-operations/manage-mqtt-broker/howto-configure-authorization.md).
8585

86-
## Cloud security
86+
### Cloud security
8787

8888
- **Use user-assigned managed identities for cloud connections**: Always use managed identity authentication. When possible, [use user-assigned managed identity](../iot-operations/connect-to-cloud/howto-configure-mqtt-endpoint.md#user-assigned-managed-identity) in data flow endpoints for flexibility and auditability.
8989

@@ -110,15 +110,15 @@ You can divide security in a cloud-based IoT solution into the following three a
110110

111111
Implementing the recommendations in this article helps you meet the security obligations described in the [shared responsibility model](../security/fundamentals/shared-responsibility.md).
112112

113-
## Microsoft Defender for IoT
113+
### Microsoft Defender for IoT
114114

115115
Microsoft Defender for IoT can automatically monitor some of the recommendations included in this article. Microsoft Defender for IoT should be the frontline of defense to protect your cloud-based solution. Microsoft Defender for IoT periodically analyzes the security state of your Azure resources to identify potential security vulnerabilities. It then provides you with recommendations on how to address them. To learn more, see:
116116

117117
- [Enhance security posture with security recommendations](../defender-for-iot/organizations/recommendations.md).
118118
- [What is Microsoft Defender for IoT for organizations?](../defender-for-iot/organizations/overview.md).
119119
- [What is Microsoft Defender for IoT for device builders?](../defender-for-iot/device-builders/overview.md).
120120

121-
## Device security
121+
### Device security
122122

123123
- **Scope hardware to minimum requirements**: Select your device hardware to include the minimum features required for its operation, and nothing more. For example, only include USB ports if they're necessary for the operation of the device in your solution. Extra features can expose the device to unwanted attack vectors.
124124

@@ -148,7 +148,7 @@ Microsoft Defender for IoT can automatically monitor some of the recommendations
148148

149149
- **Use a field gateway to provide security services for legacy or constrained devices**: Legacy and constrained devices might lack the capability to encrypt data, connect with the Internet, or provide advanced auditing. In these cases, a modern and secure field gateway can aggregate data from legacy devices and provide the security required for connecting these devices over the Internet. An [IoT Edge device can be used as a gateway](../iot-edge/iot-edge-as-gateway.md) and provide secure authentication, negotiation of encrypted sessions, receipt of commands from the cloud, and many other security features. [Azure Sphere](/azure-sphere/product-overview/what-is-azure-sphere?view=azure-sphere-integrated&preserve-view=true) can be used as a guardian module to secure other devices, including existing legacy systems not designed for trusted connectivity.
150150

151-
## Connection security
151+
### Connection security
152152

153153
- **Use X.509 certificates to authenticate your devices to IoT Hub or IoT Central**: IoT Hub and IoT Central support both X509 certificate-based authentication and security tokens as methods for a device to authenticate. If possible, use X509-based authentication in production environments as it provides greater security. To learn more, see [Authenticating a device to IoT Hub](../iot-hub/authenticate-authorize-x509.md) and [Device authentication concepts in IoT Central](../iot-central/core/concepts-device-authentication.md).
154154

@@ -158,7 +158,7 @@ Microsoft Defender for IoT can automatically monitor some of the recommendations
158158

159159
- **Consider using Azure Private Link**: Azure Private Link lets you connect your devices to a private endpoint on your virtual network, enabling you to block access to your IoT hub's public device-facing endpoints. To learn more, see [Ingress connectivity to IoT Hub using Azure Private Link](../iot-hub/virtual-network-support.md#ingress-connectivity-to-iot-hub-using-azure-private-link) and [Network security for IoT Central using private endpoints](../iot-central/core/concepts-private-endpoints.md).
160160

161-
## Cloud security
161+
### Cloud security
162162

163163
- **Follow a secure software development methodology**: The development of secure software requires you to consider security from the inception of the project all the way through implementation, testing, and deployment. The [Microsoft Security Development Lifecycle](https://www.microsoft.com/securityengineering/sdl/) provides a step-by-step approach to building secure software.
164164

@@ -190,9 +190,7 @@ Microsoft Defender for IoT can automatically monitor some of the recommendations
190190

191191
---
192192

193-
## Next steps
194-
195-
To learn more about IoT security, see:
193+
## Related Content
196194

197195
- [Azure security baseline for Azure Arc enabled Kubernetes](/security/benchmark/azure/baselines/azure-arc-enabled-kubernetes-security-baseline?toc=/azure/azure-arc/kubernetes/toc.json)
198196
- [Concepts for keeping your cloud-native workload secure](https://kubernetes.io/docs/concepts/security/)

0 commit comments

Comments
 (0)