You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot/iot-overview-security.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ Typically on an edge-based solution, you want to secure your end-to-end operatio
38
38
- Ensure governance through applying policies with [Azure Policy for Kubernetes](/azure/governance/policy/concepts/policy-for-kubernetes).
39
39
- Grant access and connect to your Kubernetes clusters from anywhere, and manage access by using [Azure role-based access control (Azure RBAC)](/azure/azure-arc/kubernetes/azure-rbac) on your cluster.
40
40
41
-
## Microsoft Defender for IoT and for Containers
41
+
###Microsoft Defender for IoT and for Containers
42
42
43
43
Microsoft Defender for IoT is a unified security solution built specifically to identify IoT and operational technology (OT) devices, vulnerabilities, and threats. Microsoft Defender for Containers is a cloud-native solution to improve, monitor, and maintain the security of your containerized assets (Kubernetes clusters, Kubernetes nodes, Kubernetes workloads, container registries, container images and more), and their applications, across multicloud and on-premises environments.
44
44
@@ -47,7 +47,7 @@ Both Defender for IoT and Defender for Containers can automatically monitor some
47
47
-[Microsoft Defender for Containers - overview](/azure/defender-for-cloud/defender-for-containers-introduction)
48
48
-[Microsoft Defender for IoT for organizations - overview](../defender-for-iot/organizations/overview.md).
49
49
50
-
## Asset security
50
+
###Asset security
51
51
52
52
-**Secrets management**: Use [Azure Key Vault](/azure/key-vault/general/overview) to store and manage asset's sensitive information such as keys, passwords, certificates, and secrets. Azure IoT Operations uses Azure Key Vault as the managed vault solution on the cloud, and uses [Azure Key Vault Secret Store extension for Kubernetes](/azure/azure-arc/kubernetes/secret-store-extension) to sync the secrets down from the cloud and store them on the edge as Kubernetes secrets. To learn more, see [Manage secrets for your Azure IoT Operations deployment](../iot-operations/secure-iot-ops/howto-manage-secrets.md).
53
53
@@ -61,7 +61,7 @@ Both Defender for IoT and Defender for Containers can automatically monitor some
61
61
62
62
-**Follow device manufacturer security and deployment best practices**: If the device manufacturer provides security and deployment guidance, follow that guidance in addition to the generic guidance listed in this article.
63
63
64
-
## Connection security
64
+
###Connection security
65
65
66
66
-**Use Transport Layer Security (TLS) to secure connections from assets**: All communication within Azure IoT Operations is encrypted using TLS. To provide a secure-by-default experience that minimizes inadvertent exposure of your edge-based solution to attackers, Azure IoT Operations is deployed with a default root CA and issuer for TLS server certificates. For a production deployment, we recommend using your own CA issuer and an enterprise PKI solution.
67
67
@@ -73,7 +73,7 @@ Both Defender for IoT and Defender for Containers can automatically monitor some
73
73
74
74
-**Set up a secure connection to OPC UA server**: When connecting to an OPC UA server, you should determine which OPC UA servers you trust to securely establish a session with. To learn more, see [Configure OPC UA certificates infrastructure for the connector for OPC UA](../iot-operations/discover-manage-assets/howto-configure-opcua-certificates-infrastructure.md).
75
75
76
-
## Edge security
76
+
###Edge security
77
77
78
78
-**Keep the edge runtime environment up-to-date**: Keep your cluster and Azure IoT Operations deployment up-to-date with the latest patches and minor releases to get all available security and bug fixes. For production deployments, [turn off auto-upgrade for Azure Arc](/azure/azure-arc/kubernetes/agent-upgrade#toggle-automatic-upgrade-on-or-off-when-connecting-a-cluster-to-azure-arc) to have complete control over when new updates are applied to your cluster. Instead, [manually upgrade agents](/azure/azure-arc/kubernetes/agent-upgrade#manually-upgrade-agents) as needed.
79
79
@@ -83,7 +83,7 @@ Both Defender for IoT and Defender for Containers can automatically monitor some
83
83
84
84
-**Provide the least privilege needed for the topic asset in your MQTT broker**: Authorization policies determine what actions the clients can perform on the broker, such as connecting, publishing, or subscribing to topics. Configure the MQTT broker to use one or multiple authorization policies with the BrokerAuthorization resource. To learn more, see [Configure MQTT broker authorization](../iot-operations/manage-mqtt-broker/howto-configure-authorization.md).
85
85
86
-
## Cloud security
86
+
###Cloud security
87
87
88
88
-**Use user-assigned managed identities for cloud connections**: Always use managed identity authentication. When possible, [use user-assigned managed identity](../iot-operations/connect-to-cloud/howto-configure-mqtt-endpoint.md#user-assigned-managed-identity) in data flow endpoints for flexibility and auditability.
89
89
@@ -110,15 +110,15 @@ You can divide security in a cloud-based IoT solution into the following three a
110
110
111
111
Implementing the recommendations in this article helps you meet the security obligations described in the [shared responsibility model](../security/fundamentals/shared-responsibility.md).
112
112
113
-
## Microsoft Defender for IoT
113
+
###Microsoft Defender for IoT
114
114
115
115
Microsoft Defender for IoT can automatically monitor some of the recommendations included in this article. Microsoft Defender for IoT should be the frontline of defense to protect your cloud-based solution. Microsoft Defender for IoT periodically analyzes the security state of your Azure resources to identify potential security vulnerabilities. It then provides you with recommendations on how to address them. To learn more, see:
116
116
117
117
-[Enhance security posture with security recommendations](../defender-for-iot/organizations/recommendations.md).
118
118
-[What is Microsoft Defender for IoT for organizations?](../defender-for-iot/organizations/overview.md).
119
119
-[What is Microsoft Defender for IoT for device builders?](../defender-for-iot/device-builders/overview.md).
120
120
121
-
## Device security
121
+
###Device security
122
122
123
123
-**Scope hardware to minimum requirements**: Select your device hardware to include the minimum features required for its operation, and nothing more. For example, only include USB ports if they're necessary for the operation of the device in your solution. Extra features can expose the device to unwanted attack vectors.
124
124
@@ -148,7 +148,7 @@ Microsoft Defender for IoT can automatically monitor some of the recommendations
148
148
149
149
-**Use a field gateway to provide security services for legacy or constrained devices**: Legacy and constrained devices might lack the capability to encrypt data, connect with the Internet, or provide advanced auditing. In these cases, a modern and secure field gateway can aggregate data from legacy devices and provide the security required for connecting these devices over the Internet. An [IoT Edge device can be used as a gateway](../iot-edge/iot-edge-as-gateway.md) and provide secure authentication, negotiation of encrypted sessions, receipt of commands from the cloud, and many other security features. [Azure Sphere](/azure-sphere/product-overview/what-is-azure-sphere?view=azure-sphere-integrated&preserve-view=true) can be used as a guardian module to secure other devices, including existing legacy systems not designed for trusted connectivity.
150
150
151
-
## Connection security
151
+
###Connection security
152
152
153
153
-**Use X.509 certificates to authenticate your devices to IoT Hub or IoT Central**: IoT Hub and IoT Central support both X509 certificate-based authentication and security tokens as methods for a device to authenticate. If possible, use X509-based authentication in production environments as it provides greater security. To learn more, see [Authenticating a device to IoT Hub](../iot-hub/authenticate-authorize-x509.md) and [Device authentication concepts in IoT Central](../iot-central/core/concepts-device-authentication.md).
154
154
@@ -158,7 +158,7 @@ Microsoft Defender for IoT can automatically monitor some of the recommendations
158
158
159
159
-**Consider using Azure Private Link**: Azure Private Link lets you connect your devices to a private endpoint on your virtual network, enabling you to block access to your IoT hub's public device-facing endpoints. To learn more, see [Ingress connectivity to IoT Hub using Azure Private Link](../iot-hub/virtual-network-support.md#ingress-connectivity-to-iot-hub-using-azure-private-link) and [Network security for IoT Central using private endpoints](../iot-central/core/concepts-private-endpoints.md).
160
160
161
-
## Cloud security
161
+
###Cloud security
162
162
163
163
-**Follow a secure software development methodology**: The development of secure software requires you to consider security from the inception of the project all the way through implementation, testing, and deployment. The [Microsoft Security Development Lifecycle](https://www.microsoft.com/securityengineering/sdl/) provides a step-by-step approach to building secure software.
164
164
@@ -190,9 +190,7 @@ Microsoft Defender for IoT can automatically monitor some of the recommendations
190
190
191
191
---
192
192
193
-
## Next steps
194
-
195
-
To learn more about IoT security, see:
193
+
## Related Content
196
194
197
195
-[Azure security baseline for Azure Arc enabled Kubernetes](/security/benchmark/azure/baselines/azure-arc-enabled-kubernetes-security-baseline?toc=/azure/azure-arc/kubernetes/toc.json)
198
196
-[Concepts for keeping your cloud-native workload secure](https://kubernetes.io/docs/concepts/security/)
0 commit comments