{"id":2393,"date":"2018-08-20T00:00:00","date_gmt":"2018-08-20T00:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/hardening-the-security-of-azure-iot-edge-2"},"modified":"2023-05-11T15:38:03","modified_gmt":"2023-05-11T22:38:03","slug":"hardening-the-security-of-azure-iot-edge-2","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/","title":{"rendered":"Hardening the security of Azure IoT Edge"},"content":{"rendered":"<p><a href=\"https:\/\/docs.microsoft.com\/azure\/iot-edge\/\" target=\"_blank\" rel=\"noopener\">Azure IoT Edge<\/a> which recently became <a href=\"https:\/\/azure.microsoft.com\/blog\/azure-iot-edge-generally-available-for-enterprise-grade-scaled-deployments\/\" target=\"_blank\" rel=\"noopener\">generally available<\/a>, designs in security from the ground up with avenues for custom security hardening. Security hardening entails additional security measures for given deployments in response to perceived higher threats like physical accessibility of devices by malicious actors. But how do stakeholders go about with security hardening?<\/p>\n<p>The nature of IoT, Azure IoT Edge included, is such that security threats differ between products and deployments, and solutions are seldom one size fits all. There\u2019s always the need to balance security investments with protection goals and missing this balance results in either inadequate protection or overspending. One very important axis towards achieving this balance is to assess the risks on the IoT device and invest in adequate secure silicon hardware technologies like hardware security modules (HSM) for mitigation. HSM products widely vary in capabilities and cost with some costing orders of magnitude more than others. Rather than coerce the use of one HSM for security hardening, Azure IoT Edge takes a more customizing and accommodating approach.<\/p>\n<p>Azure IoT Edge introduces the <a href=\"https:\/\/docs.microsoft.com\/azure\/iot-edge\/iot-edge-security-manager\" target=\"_blank\" rel=\"noopener\">Azure IoT Edge security manager<\/a> to facilitate achievement of this balance.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"1807_EdgeSecurityManager\" height=\"732\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/08\/35093220-1361-4dd7-bc3a-ce0aba90103a.webp\" title=\"1807_EdgeSecurityManager\" width=\"871\"><\/p>\n<p>The Azure IoT Edge security manager is a well-bounded security core for protecting the IoT Edge device and all its components by abstracting the secure silicon hardware. It is the focal point for security hardening and provides technology integration point to original device manufacturers (OEM).<\/p>\n<p>Azure IoT Edge security managers enable stakeholders to harden their deployments with secure silicon technologies optimal for their deployment. While original design and device manufacturers (ODM and OEM) are the primary technology integrators for hardening IoT Edge devices, all IoT Edge stakeholders participate in the choice of secure silicon technologies to integrate through independent contributions to demand and supply market forces.<\/p>\n<p>One can envision IoT evolving to an era when the world adopts a single commonly trusted one security processor fits all with cost spread out across all stakeholders to become immaterial, but such is deep into the future. Until then, Azure IoT security manager enables all to meet custom security goals using technologies of choice.<\/p>\n<h2>Additional resources<\/h2>\n<ul>\n<li>Read more about <a href=\"https:\/\/docs.microsoft.com\/azure\/iot-edge\/iot-edge-security-manager\" target=\"_blank\" rel=\"noopener\">Azure IoT security manager<\/a> and how to get started.<\/li>\n<li>Read our whitepaper on <a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fwhitepaper-selecting-the-right-secure-hardware-for-your-iot-deployment%2F&#038;data=02%7C01%7C%7Cd08e21ff321343a6e86508d60302b761%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636699707527517865&#038;sdata=19od62WfswOpaduS6p8XKcG06H5WQhrZWvExbTEdGMo%3D&#038;reserved=0\" target=\"_blank\" rel=\"noopener\">selecting the right secure hardware for your iot deployment<\/a>.<\/li>\n<li>Read our whitepaper on <a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=http%3A%2F%2Fdownload.microsoft.com%2Fdownload%2FD%2F3%2F9%2FD3948E3C-D5DC-474E-B22F-81BA8ED7A446%2FEvaluating_Your_IOT_Security_whitepaper_EN_US.pdf&#038;data=02%7C01%7C%7Cd08e21ff321343a6e86508d60302b761%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636699707527517865&#038;sdata=%2FZHY9v7uKByZ1mFH6gPmlakuQ%2B0jMv7e8IoG%2F6LOfWU%3D&#038;reserved=0\" target=\"_blank\" rel=\"noopener\">evaluating your IoT security<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Azure IoT Edge which recently became generally available, designs in security from the ground up with avenues for custom security hardening. Security hardening entails additional security measures for given deployments in response to perceived higher threats like physical accessibility of devices by malicious actors.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1466,1485],"tags":[],"audience":[3055,3053,3056],"content-type":[],"product":[1487],"tech-community":[],"topic":[],"coauthors":[62],"class_list":["post-2393","post","type-post","status-publish","format-standard","hentry","category-hybrid-multicloud","category-internet-of-things","audience-developers","audience-it-decision-makers","audience-it-implementors","product-azure-iot-edge"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hardening the security of Azure IoT Edge | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"Azure IoT Edge which recently became generally available, designs in security from the ground up with avenues for custom security hardening. Security hardening entails additional security measures for given deployments in response to perceived higher threats like physical accessibility of devices by malicious actors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hardening the security of Azure IoT Edge | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"Azure IoT Edge which recently became generally available, designs in security from the ground up with avenues for custom security hardening. Security hardening entails additional security measures for given deployments in response to perceived higher threats like physical accessibility of devices by malicious actors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-20T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-11T22:38:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/08\/35093220-1361-4dd7-bc3a-ce0aba90103a.webp\" \/>\n<meta name=\"author\" content=\"Eustace Asanghanwa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eustace Asanghanwa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/eustace-asanghanwa\/\",\"@type\":\"Person\",\"@name\":\"Eustace Asanghanwa\"}],\"headline\":\"Hardening the security of Azure IoT Edge\",\"datePublished\":\"2018-08-20T00:00:00+00:00\",\"dateModified\":\"2023-05-11T22:38:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/\"},\"wordCount\":391,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/08\/35093220-1361-4dd7-bc3a-ce0aba90103a.webp\",\"articleSection\":[\"Hybrid + multicloud\",\"Internet of things\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/\",\"name\":\"Hardening the security of Azure IoT Edge | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/08\/35093220-1361-4dd7-bc3a-ce0aba90103a.webp\",\"datePublished\":\"2018-08-20T00:00:00+00:00\",\"dateModified\":\"2023-05-11T22:38:03+00:00\",\"description\":\"Azure IoT Edge which recently became generally available, designs in security from the ground up with avenues for custom security hardening. Security hardening entails additional security measures for given deployments in response to perceived higher threats like physical accessibility of devices by malicious actors.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/08\/35093220-1361-4dd7-bc3a-ce0aba90103a.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/08\/35093220-1361-4dd7-bc3a-ce0aba90103a.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hybrid + multicloud\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/hybrid-multicloud\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hardening the security of Azure IoT Edge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hardening the security of Azure IoT Edge | Microsoft Azure Blog","description":"Azure IoT Edge which recently became generally available, designs in security from the ground up with avenues for custom security hardening. Security hardening entails additional security measures for given deployments in response to perceived higher threats like physical accessibility of devices by malicious actors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/","og_locale":"en_US","og_type":"article","og_title":"Hardening the security of Azure IoT Edge | Microsoft Azure Blog","og_description":"Azure IoT Edge which recently became generally available, designs in security from the ground up with avenues for custom security hardening. Security hardening entails additional security measures for given deployments in response to perceived higher threats like physical accessibility of devices by malicious actors.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2018-08-20T00:00:00+00:00","article_modified_time":"2023-05-11T22:38:03+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/08\/35093220-1361-4dd7-bc3a-ce0aba90103a.webp","type":"","width":"","height":""}],"author":"Eustace Asanghanwa","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Eustace Asanghanwa","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/eustace-asanghanwa\/","@type":"Person","@name":"Eustace Asanghanwa"}],"headline":"Hardening the security of Azure IoT Edge","datePublished":"2018-08-20T00:00:00+00:00","dateModified":"2023-05-11T22:38:03+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/"},"wordCount":391,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/08\/35093220-1361-4dd7-bc3a-ce0aba90103a.webp","articleSection":["Hybrid + multicloud","Internet of things"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/","name":"Hardening the security of Azure IoT Edge | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/08\/35093220-1361-4dd7-bc3a-ce0aba90103a.webp","datePublished":"2018-08-20T00:00:00+00:00","dateModified":"2023-05-11T22:38:03+00:00","description":"Azure IoT Edge which recently became generally available, designs in security from the ground up with avenues for custom security hardening. Security hardening entails additional security measures for given deployments in response to perceived higher threats like physical accessibility of devices by malicious actors.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/08\/35093220-1361-4dd7-bc3a-ce0aba90103a.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2018\/08\/35093220-1361-4dd7-bc3a-ce0aba90103a.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/hardening-the-security-of-azure-iot-edge-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Hybrid + multicloud","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/hybrid-multicloud\/"},{"@type":"ListItem","position":3,"name":"Hardening the security of Azure IoT Edge"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/2393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=2393"}],"version-history":[{"count":0,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/2393\/revisions"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=2393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=2393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=2393"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=2393"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=2393"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=2393"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=2393"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=2393"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=2393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}