{"id":421,"date":"2020-10-19T00:00:00","date_gmt":"2020-10-19T00:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/solving-iot-device-security-at-scale-through-standards"},"modified":"2025-06-30T09:57:26","modified_gmt":"2025-06-30T16:57:26","slug":"solving-iot-device-security-at-scale-through-standards","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/","title":{"rendered":"Solving IoT device security at scale through standards"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><strong>Edge Compute Node protection profile (ECN PP)\u2014now available\u2014guides you to engineer, claim, evaluate, and consume device security for IoT.<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Internet of Things (IoT) solution builders these days are more likely to deploy IoT solutions with unsecured devices because they cannot verify device security claims from device makers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Solution builders could create secured devices themselves, however they don\u2019t because they either lack domain expertise or simply prefer to buy devices off-the-shelf. Device makers possess the requisite expertise to secure devices, but lack ability to convey details.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For example, language constructs such as conveying computation, storage, and power profiles of an Industrial PC (IPC), are simply not available for security. Device makers therefore see no motivation to invest in securing devices if they can\u2019t claim the value\u2014hence the current stalemate. Our studies and observations show this stalemate exists for two reasons:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Lack of standards guiding how to holistically engineer and claim device security.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Lack of standards guiding how to consume and verify device security claims.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Given IoT globally connect solutions, supply chains, and interests irrespective of company, geography, or governmental affiliations, effectively solving the stalemate also requires global openness. We undertook this challenge and can report significant progress.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We\u2019re happy to share general availability of the <a href=\"https:\/\/aka.ms\/ecn-pp-full-doc\" target=\"_blank\" rel=\"noopener\">Edge Compute Node protection profile<\/a> (NSCIB-CC-0112146-CR or simply ECN PP), a Common Criteria (ISO 15408) standard, which guides you to engineer, claim, evaluate, and consume security for IoT devices. We build on Common Criteria for transparency, cross-industry practice, global recognition arrangements, and global availability of licensed laboratories.<\/p>\n\n\n\n<figure class=\"wp-block-image has-custom-border\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/5abfdf96-d1fa-4feb-b585-3858778f00c8.webp\" alt=\"Edge Compute Node protection profile.\" style=\"border-radius:0px\" title=\"Edge Compute Node protection profile.\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 1. Starting now, confidently know and acquire only secured devices as baseline to a holistically secured IoT deployment.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">At Microsoft, we created and drove development of ECN PP, however our efforts were immensely amplified by the following partners contributing diverse expertise and experience:<\/p>\n\n\n\n<figure class=\"wp-block-image has-custom-border\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/d143846f-9f0d-4ee4-81d7-6bddd62ad941.webp\" alt=\"Partners who contributed their diverse expertise and experience.\" style=\"border-radius:0px\" title=\"Partners who contributed their diverse expertise and experience.\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 2. We recognize these collaborators with gratitude for amplifying our efforts with their diverse expertise.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We\u2019re excited by this development and so are our partners. Here is what one of our partners had to say:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>\u201cProvenRun\u2019s mission is to help its customers resolve the security challenges linked to the large-scale deployment of connected devices. We are very proud to have contributed our expertise into this mission to enable industry motions that help ensure all IoT deployments are secured-by-design.\u201d\u2014<\/em>Dominique Bolignano, CEO and founder, Prove &amp; Run<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Device makers and solution builders can now freely access <a href=\"https:\/\/aka.ms\/ecn-pp-full-doc\" target=\"_blank\" rel=\"noopener\">ECN PP<\/a> from the <a href=\"https:\/\/www.commoncriteriaportal.org\/\" target=\"_blank\" rel=\"noopener\">Common Criteria official portal<\/a>, and can later view the list of ECN PP certified devices on the same portal. We\u2019re excited to see that ECN PP co-development partners are already putting it into use, as we illustrate one real example at the end of this article.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Device makers of products like <a href=\"https:\/\/azure.microsoft.com\/services\/iot-edge\/\" target=\"_blank\" rel=\"noopener\">Azure IoT Edge<\/a> can now holistically secure devices, objectively claim security, and be assured of differentiated visibility on Azure device catalog, in addition to the Common Criteria portal. We envision other IoT solution providers building custom experiences with ECN PP on their respective platforms. For us, ECN PP is only the beginning of an exciting journey in which we invite you to join us in making it our common journey towards a unified goal.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-we-see-security-in-iot\">How we see security in IoT<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Our vision for security in IoT is a world in which every IoT ecosystem stakeholder chooses and actions contributes to overall security of IoT\u2014where consumers and benefactors are simply secured by default. To a solution builder as an example, this means building with components that have been certified to deliver all security and compliance requirements for the target solution.&nbsp; We achieve this vision by standardizing a baseline and then evolve this baseline with maturity. Given afore described stalemate between the IoT solution builder and device maker, it stands to reason for the IoT device, and not the security subcomponent which would be the minimum baseline as Figure 1 above illustrates.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"sizing-the-solution-right-device-security-promise\">Sizing the solution right\u2014device security promise<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">A major goal in security is to balance efficacy with cost, otherwise unintended consequences result. Choose cheaper and risk efficacy or spend too much and risk security budget cuts. For IoT devices, secured silicon (hardware security module or simply HSM) is often the last defense to deliver resistance against tampering from malicious physical access. Secure silicon, together with associated engineering and operating costs is also the biggest cost driver. A need therefore arises to appropriately size secure silicon investments for the IoT deployment risk profile. We address this need by providing a useful tool to judge the coverage expected of the secure silicon, a tool we call device security promise which currently offer a standard promise, secure element promise, and secure enclave promise for sizing.<\/p>\n\n\n\n<figure class=\"wp-block-image has-custom-border\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/8fb81a58-d062-4be6-b20f-1ae66f194ce7.webp\" alt=\"Device security promise levels for IoT devices.\" style=\"border-radius:0px\" title=\"Device security promise levels for IoT devices.\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 3. Device security promise for IoT devices.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If you wondered how to assess the IoT deployment risk, then you are in luck. The <a href=\"https:\/\/www.iiconsortium.org\/smm.htm\" target=\"_blank\" rel=\"noopener\">IoT Security Maturity Model (SMM)<\/a> by the <a href=\"https:\/\/www.iiconsortium.org\/\" target=\"_blank\" rel=\"noopener\">Industrial Internet Consortium (ICC)<\/a> delivers excellent tools and guidance for exactly this purpose. You can also learn more here about the role of secure silicon in securing IoT.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It is worthwhile to note device security promise only conveys the scope of secure silicon isolation. Robustness in protection for example, shows how much resistance one can expect from the secure silicon against physical and environmental tampering. This derives from depth in secure silicon security engineering and qualifiable through standards such as, the National Institute of Standards and Technology\u2019s (<a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noopener\">NIST<\/a>), Federal Information Processing Standard 140-2 (FIPS 140-2), and Platform Security Architecture certification (<a href=\"https:\/\/www.psacertified.org\/\" target=\"_blank\" rel=\"noopener\">PSA Certified<\/a>\u2122). ECN PP captures and reports compliances to standards addressing robustness for a holistic view of the device security posture. The approach taken by ECN PP is equally important.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"measurable-goals-over-prescriptions\">Measurable goals over prescriptions<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">ECN PP defines measurable security goals instead of component prescription. This approach invites and engages unique talents and expertise of device makers in achieving these goals for efficacy\u2014while simultaneously garnering product differentiation. We avoid prescriptions to preclude blind compliance with no stake in efficacy, which brings us back to the problem we set out to solve. The result is, a modular protection profile that presents a comprehensive security goal, grouped under convenient categories, and accommodates device security promise customization.<\/p>\n\n\n\n<figure class=\"wp-block-image has-custom-border\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/4e84bb5c-b641-492d-95ad-d2e09d6ee084.webp\" alt=\"ECN PP modularly structured for device security promise customization.\" style=\"border-radius:0px\" title=\"ECN PP modularly structured for device security promise customization.\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 4. ECN PP modularly structured for device security promise customization.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"taking-device-security-certification-to-the-next-level-with-programmatic-real-time-attestations\">Taking device security certification to the next level with programmatic real-time attestations<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">ECN PP on its own provides the tools that help enable secured IoT deployments through standards for collaboration and global transparency, however we envision using it to build more. To start, while Common Criterial portal shall remain authoritative listing for security ECN PP compliant devices, device makers with ECN PP compliant devices certified for Azure will merit product targeted recognition within our IoT device catalog. We\u2019re excited for this ability to recognize our device partner commitment to security. We\u2019re equally excited about our current engagements to build on ECN PP and deliver programmatic real-time device security attestations.<\/p>\n\n\n\n<figure class=\"wp-block-image has-custom-border\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/4fea68ac-c0d6-4622-a601-d29bb6b29148.webp\" alt=\"Real-time attestations setup.\" style=\"border-radius:0px\" title=\"Real-time attestations setup.\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 5. One setup for real-time attestations. We invite lab and device partners for collaboration.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Beyond visibility into overall deployment security posture, programmatic workflows with real-time security attestations will empower solution builders to target workloads only to devices that meet certain security posture. For example, they can target workloads with confidential or privacy content only\u2014to secure enclave promise devices. Another positive outcome are the signals these workflows will generate to device makers for the types of devices in demand based on device security promise.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While this work is just being announced, we\u2019re already seeing strong interest and real engagements illustrated below in figure 6:<\/p>\n\n\n\n<figure class=\"wp-block-image has-custom-border\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/5868880d-17be-46d6-964b-ed7d95f3bcbe.webp\" alt=\"Real engagement highlight showing device maker, Scalys, following ECN PP guidance to select Arm TrustZone\u00c2\u00ae based NXP Layerscape\u00c2\u00ae LS1012A to build a robust secure enclave promise device, and engaging UL to setup for certification.\" style=\"border-radius:0px\" title=\"Real engagement highlight showing device maker, Scalys, following ECN PP guidance to select Arm TrustZone\u00c2\u00ae based NXP Layerscape\u00c2\u00ae LS1012A to build a robust secure enclave promise device, and engaging UL to setup for certification.\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 6. Real engagement highlight showing device maker, Scalys, following ECN PP guidance to select Arm TrustZone\u00ae based <a href=\"https:\/\/aka.ms\/nxp-layerscape-ls1012a\" target=\"_blank\" rel=\"noopener\">NXP Layerscape\u00ae LS1012A<\/a> to build a robust secure enclave promise device, and engaging UL to setup for certification. A solution builder will discover Scalys certified device from Common Criteria portal and build solution they can later attest the device\u2019s security real-time.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-s-next\">What\u2019s next<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">We thank all our partners who have joined us on this journey already to secure IoT for all.&nbsp; See the following resources to learn how you can engage:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Access <a href=\"https:\/\/aka.ms\/ecn-pp-full-doc\" target=\"_blank\" rel=\"noopener\">Edge Compute Node protection profile<\/a> now from the <a href=\"https:\/\/www.commoncriteriaportal.org\/\" target=\"_blank\" rel=\"noopener\">Common Criterial<\/a> official portal.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Device makers: Engineer device security to ECN PP, engage any <a href=\"https:\/\/www.commoncriteriaportal.org\/labs\/\" target=\"_blank\" rel=\"noopener\">Common Criterial licensed lab<\/a> for certification and attestation setup, and view <a href=\"https:\/\/www.commoncriteriaportal.org\/products\/\" target=\"_blank\" rel=\"noopener\">Common Criterial portal for licensed devices<\/a> (allow time for engineering and certification of early devices).<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Solution builders: Demand ECN PP compliant devices for security assurance.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Common Criterial licensed labs: <a href=\"https:\/\/aka.ms\/ecn-pp-cc-lab\" target=\"_blank\" rel=\"noopener\">Contact us<\/a> to setup for device attestation.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Technology partners: <a href=\"https:\/\/forms.office.com\/Pages\/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR_qJ-a3j7DVAgrLSGeGpjElUM1dGMFNIVEFBVkszQ1FZQ1NHS0kxMEZDWi4u\" target=\"_blank\" rel=\"noopener\">Join us<\/a> to evolve ECN PP.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Edge Compute Node protection profile (ECN PP)\u2014now available\u2014guides you to engineer, claim, evaluate, and consume device security for IoT.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1466,1485],"tags":[],"audience":[3055,3053,3056],"content-type":[1511],"product":[1487],"tech-community":[],"topic":[],"coauthors":[62],"class_list":["post-421","post","type-post","status-publish","format-standard","hentry","category-hybrid-multicloud","category-internet-of-things","audience-developers","audience-it-decision-makers","audience-it-implementors","content-type-best-practices","product-azure-iot-edge","review-flag-1680286581-56","review-flag-1-1680286581-825","review-flag-2-1680286581-601","review-flag-3-1680286581-173","review-flag-4-1680286581-250","review-flag-5-1680286581-950","review-flag-6-1680286581-909","review-flag-gener-1680286584-335","review-flag-inter-1680286585-376","review-flag-iot-1680286585-835","review-flag-partn-1680286579-901"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Solving IoT device security at scale through standards | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"Edge Compute Node protection profile (ECN PP)\u2014now available\u2014guides you to engineer, claim, evaluate, and consume device security for IoT.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solving IoT device security at scale through standards | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"Edge Compute Node protection profile (ECN PP)\u2014now available\u2014guides you to engineer, claim, evaluate, and consume device security for IoT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-19T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T16:57:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/5abfdf96-d1fa-4feb-b585-3858778f00c8.webp\" \/>\n<meta name=\"author\" content=\"Eustace Asanghanwa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eustace Asanghanwa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/eustace-asanghanwa\/\",\"@type\":\"Person\",\"@name\":\"Eustace Asanghanwa\"}],\"headline\":\"Solving IoT device security at scale through standards\",\"datePublished\":\"2020-10-19T00:00:00+00:00\",\"dateModified\":\"2025-06-30T16:57:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/\"},\"wordCount\":1424,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/5abfdf96-d1fa-4feb-b585-3858778f00c8.webp\",\"articleSection\":[\"Hybrid + multicloud\",\"Internet of things\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/\",\"name\":\"Solving IoT device security at scale through standards | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/5abfdf96-d1fa-4feb-b585-3858778f00c8.webp\",\"datePublished\":\"2020-10-19T00:00:00+00:00\",\"dateModified\":\"2025-06-30T16:57:26+00:00\",\"description\":\"Edge Compute Node protection profile (ECN PP)\u2014now available\u2014guides you to engineer, claim, evaluate, and consume device security for IoT.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/5abfdf96-d1fa-4feb-b585-3858778f00c8.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/5abfdf96-d1fa-4feb-b585-3858778f00c8.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hybrid + multicloud\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/hybrid-multicloud\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Solving IoT device security at scale through standards\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Solving IoT device security at scale through standards | Microsoft Azure Blog","description":"Edge Compute Node protection profile (ECN PP)\u2014now available\u2014guides you to engineer, claim, evaluate, and consume device security for IoT.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/","og_locale":"en_US","og_type":"article","og_title":"Solving IoT device security at scale through standards | Microsoft Azure Blog","og_description":"Edge Compute Node protection profile (ECN PP)\u2014now available\u2014guides you to engineer, claim, evaluate, and consume device security for IoT.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2020-10-19T00:00:00+00:00","article_modified_time":"2025-06-30T16:57:26+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/5abfdf96-d1fa-4feb-b585-3858778f00c8.webp","type":"","width":"","height":""}],"author":"Eustace Asanghanwa","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Eustace Asanghanwa","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/eustace-asanghanwa\/","@type":"Person","@name":"Eustace Asanghanwa"}],"headline":"Solving IoT device security at scale through standards","datePublished":"2020-10-19T00:00:00+00:00","dateModified":"2025-06-30T16:57:26+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/"},"wordCount":1424,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/5abfdf96-d1fa-4feb-b585-3858778f00c8.webp","articleSection":["Hybrid + multicloud","Internet of things"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/","name":"Solving IoT device security at scale through standards | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/5abfdf96-d1fa-4feb-b585-3858778f00c8.webp","datePublished":"2020-10-19T00:00:00+00:00","dateModified":"2025-06-30T16:57:26+00:00","description":"Edge Compute Node protection profile (ECN PP)\u2014now available\u2014guides you to engineer, claim, evaluate, and consume device security for IoT.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/5abfdf96-d1fa-4feb-b585-3858778f00c8.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2020\/10\/5abfdf96-d1fa-4feb-b585-3858778f00c8.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/solving-iot-device-security-at-scale-through-standards\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Hybrid + multicloud","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/hybrid-multicloud\/"},{"@type":"ListItem","position":3,"name":"Solving IoT device security at scale through standards"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=421"}],"version-history":[{"count":2,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/421\/revisions"}],"predecessor-version":[{"id":44642,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/421\/revisions\/44642"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=421"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=421"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=421"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=421"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=421"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=421"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}