Resource search results
1 - 9 of 9
Almost three years ago, Microsoft introduced a new standard for IoT security and argued, based on an analysis of best-in-class devices, that seven properties must be present on every standalone device that connects to the internet in order to be considered secured. Azure Sphere, now generally available, is Microsoft’s entry into the market: a seven-properties-compliant, end-to-end product offering for building and deploying highly secured IoT devices. These details are captured in a new paper titled, Nineteen cybersecurity best practices used to implement the seven properties of highly secured devices in Azure Sphere. It focuses on why the seven properties are always required and describes best practices used to implement Azure Sphere. The paper provides detailed information about the architecture and implementation of Azure Sphere and discusses design decisions and trade-offs. We hope that the new paper can assist organizations and individuals in evaluating the measures used within Azure Sphere to improve the security of IoT devices. Companies may also want to use this paper as a reference, when assessing Azure Sphere or other IoT offerings.
Microsoft Azure Sphere Operating System currently supports two kinds of network connectivity: Ethernet and Wi-Fi. For customers that require connectivity to the Internet via cellular networks, one option is to use external hardware to route the Ethernet or Wi-Fi to the cellular network. This router-based architecture results in some implications that customers should be aware of. This paper discusses the cellular connectivity options immediately available for customers using Azure Sphere, addresses the security-critical functions that can only be performed through Azure Sphere OS-supported network connections, and identifies the limitations on security-related functions and guarantees that Azure Sphere offers when customers use a cellular-router-based system.
This datasheet outlines how Azure Government Secret provides secure, comprehensive and powerful cloud services to US Government agencies and their partners working with DoD Impact Level 6 data. Learn more about the mission-critical cloud for classified data.
Azure - Updates Quarterly Retrospective - 2019 Q4
To deliver lasting value from IoT, organizations must prioritize security. The current security talent shortage can be an obstacle for companies working to deploy a comprehensive IoT security strategy. But there is a way to augment existing teams and resources, even amidst the talent shortage, with trustworthy solutions that help meet the ongoing security needs of IoT—without diminishing opportunity for innovation.
Azure Updates Quarterly Retrospective - 2019 Q3
Securing Smart Devices is a Greenberg Strategy white paper, sponsored by Microsoft. This study provides insightful snapshots of a rapidly shifting market and the results are clear: consumers expect device manufacturers to take security seriously. Only manufacturers have the power to holistically secure devices from product inception through end-of-life. While adopting an end-to-end security approach for smart products will require investment, the potential to gain market share, add new revenue, and protect customers is well worth the effort.
This paper focuses on five common IoT security risks across your IoT ecosystem and offers tactical guidance for addressing them.
The Device Authentication and Attestation (DAA) service is the primary point of contact with the Azure Sphere Security Service for Azure Sphere devices to authenticate their identity, ensure the integrity and trust of the system software, and certify that they are running a trusted code base. In addition, the DAA service provides Azure Sphere devices with a device authentication certificate, which can be used in downstream authentication flows to services such as the Azure Device Provisioning Service or directly to an Azure IoT Hub.