Home Applications Microsoft Azure IoT supports new security hardware to strengthen IoT security

Microsoft Azure IoT supports new security hardware to strengthen IoT security

0
Microsoft Azure IoT supports new security hardware to strengthen IoT security
0

Microsoft’s commitment to leadership in IoT security continues with Azure IoT’s improving the level of trust and confidence in securing IoT deployments.  Azure IoT now supports Device Identity Composition Engine (DICE) and many different kinds of Hardware Security Modules (HSMs). DICE is an upcoming standard at Trusted Computing Group (TCG) for device identification and attestation which enables manufacturers to use silicon gates to create device identification based in hardware, making security hardware part of the DNA of new devices from the ground up. HSMs are the core security technology used to secure device identities and provide advanced functionality such as hardware-based device attestation and zero touch provisioning.

In addition, Azure IoT team is working with standards organizations and major industry partners to employ latest in security best practices to deploy support for a wide variety of Hardware Secure Modules (HSM).  HSMs offer resistant and resilient hardware root of trust in IoT devices. The Azure IoT platform transparently integrates HSM support with platform services like Azure IoT Hub Device Provisioning and Azure IoT Hub Device Management, thereby enabling customers and developers to focus more on identifying specific risks associated with their applications and less on security deployment tactics.

Read the entire article here, Azure IoT supports new security hardware to strengthen IoT security

via the fine folks at Microsoft.

Featured Resources:

Related Articles:

Microsoft Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services, devices and solutions that help people and businesses realize their full potential.

Leave a Reply

| LATEST RESOURCES

White Papers

    Gartner: My “How to Hunt for Security Threats” Paper Published

    My mini-paper on threat hunting is out!Review “How to Hunt for Security Threats” (Gartner GTP access required) and provide feedback here. The abstract states “Technical professionals focused on security are starting to explore the mysterious practice of “threat hunting” to improve their security monitoring and operations. This requires uniquely skilled personnel and wide-ranging data collection […]

    Downloads

      Base Image Script Framework (BIS-F) – Version 6.0.0

      The perfect way to seal your Base Image Every time you build you’re base Image from scratch or update it, you must seal it before deploying it to your cloned devices. No matter if you are using Citrix XenApp/XenDesktop with Machine Creation Services (MCS) or Provisioning Services (PVS), VMware View or Microsoft only, BIS-F supports […]

      On-Demand Webinars

        Latest Videos

          Microsoft Video: What’s new with Azure Machine Learning

          In this session, learn how you can transform your key business scenarios with Azure Machine Learning. You’ll learn how to get started by easily building your own custom model, training and deploying it as a simple web service. We’ll also cover how to quickly create Cortana Intelligence Solutions from preconfigured solutions, reference architectures, and design […]

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win a Tesla P100D

          Visit our Sponsors!


          Close