Chapter 8. Internet of Things security
Previous chapters discussed the general principles of securing assets in a cloud-based environment and delved into the specifics of Microsoft Azure authentication and authorization methods, network isolation and access control, data and virtual machine (VM) security, key management, and security monitoring.
This chapter focuses on an important aspect of the larger environment in which the Azure cloud exists: the rapidly expanding Internet of Things (IoT) that is already having a profound impact on how people live and work. As with any new technological development, IoT has the potential to simplify both personal lives and jobs as IT pros, but it also has the ability to introduce new complications.
One of ...
Get Microsoft Azure Security Infrastructure now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.