![]() Solution developer: The solution developer may part of an in-house team or a system integrator specializing in this activity. Hardware manufacturer/integrator: The manufacturers of IoT hardware you're deploying, the integrators assembling hardware from various manufacturers, or the suppliers providing the hardware. The following list is a high-level description of these players. You can develop and execute an IoT security strategy with the active participation of the various players involved in the manufacturing, development, and deployment of IoT devices and infrastructure. To learn more about what Microsoft does to fulfill service provider responsibilities, see Shared responsibilities for cloud computing. ![]() Implementing the recommendations in this article will help you meet the security obligations described in the shared responsibility model. You can divide security in an IoT solution into the following three areas:ĭevice security: Securing the IoT device while it's deployed in the wild.Ĭonnection security: Ensuring all data transmitted between the IoT device and IoT Hub is confidential and tamper-proof.Ĭloud security: Providing a means to secure data while it moves through, and is stored in the cloud.
0 Comments
Leave a Reply. |