Chapter 8. Internet of Things security
Previous chapters discussed the general principles of securing assets in a cloud-based environment and delved into the specifics of Microsoft Azure authentication and authorization methods, network isolation and access control, data and virtual machine (VM) security, key management, and security monitoring.
This chapter focuses on an important aspect of the larger environment in which the Azure cloud exists: the rapidly expanding Internet of Things (IoT) that is already having a profound impact on how people live and work. As with any new technological development, IoT has the potential to simplify both personal lives and jobs as IT pros, but it also has the ability to introduce new complications.
One of ...