This chapter reviews several key security topics including threat modeling, security protocols, encryption, and key management as well as managing user identities and supporting multi-tenancy in your solution.
Threat Modeling
Cybercrime and IoT security have been front and center in the news this past year. Defining the security strategy for an IoT solution that uses public cloud platforms requires understanding the surface areas of vulnerability and the attack vectors that cyber ...