Skip to content

Commit 1d26ace

Browse files
committedJun 14, 2018
fix flushed out broken links
1 parent c8ce972 commit 1d26ace

16 files changed

+39
-31
lines changed
 

‎articles/iot-accelerators/TOC.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -94,10 +94,10 @@
9494
# Reference
9595
## [Developer Reference Guide](https://github.com/Azure/azure-iot-pcs-remote-monitoring-dotnet/wiki/Developer-Reference-Guide)
9696
## [Developer Troubleshooting Guide](https://github.com/Azure/azure-iot-pcs-remote-monitoring-dotnet/wiki/Developer-Troubleshooting-Guide)
97-
## [Security from the ground up](/azure/iot-fundamentals/iot-hub-security-ground-up.md)
98-
## [Security best practices](/azure/iot-fundamentals/iot-security-best-practices.md)
99-
## [Security architecture](/azure/iot-fundamentals/iot-security-architecture.md)
100-
## [Secure your IoT deployment](/azure/iot-fundamentals/iot-security-deployment.md)
97+
## [Security from the ground up](/azure/iot-fundamentals/iot-security-ground-up?context=azure/iot-accelerators/render-context)
98+
## [Security best practices](/azure/iot-fundamentals/iot-security-best-practices?context=azure/iot-accelerators/render-context)
99+
## [Security architecture](/azure/iot-fundamentals/iot-security-architecture?context=azure/iot-accelerators/render-context)
100+
## [Secure your IoT deployment](/azure/iot-fundamentals/iot-security-deployment?context=azure/iot-accelerators/render-context)
101101

102102
# Related
103103
## Solutions

‎articles/iot-accelerators/iot-accelerators-faq-cf.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -203,4 +203,4 @@ You can also explore some of the other features and capabilities of the IoT solu
203203
204204
* [Predictive Maintenance solution accelerator overview](iot-accelerators-predictive-overview.md)
205205
* [Connected Factory solution accelerator overview](iot-accelerators-connected-factory-overview.md)
206-
* [IoT security from the ground up](securing-iot-ground-up.md)
206+
* [IoT security from the ground up](/azure/iot-fundamentals/iot-security-ground-up)

‎articles/iot-accelerators/iot-accelerators-faq-rm-v2.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -40,4 +40,4 @@ You can also explore some of the other features and capabilities of the IoT solu
4040
* [Explore the capabilities of the Remote Monitoring solution accelerator](iot-accelerators-remote-monitoring-explore.md)
4141
* [Predictive Maintenance solution accelerator overview](iot-accelerators-predictive-overview.md)
4242
* [Connected Factory solution accelerator overview](iot-accelerators-connected-factory-overview.md)
43-
* [IoT security from the ground up](securing-iot-ground-up.md)
43+
* [IoT security from the ground up](/azure/iot-fundamentals/iot-security-ground-up)

‎articles/iot-accelerators/iot-accelerators-faq.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -84,4 +84,4 @@ You can also explore some of the other features and capabilities of the IoT solu
8484
* [Explore the capabilities of the Remote Monitoring solution accelerator](iot-accelerators-remote-monitoring-explore.md)
8585
* [Predictive Maintenance solution accelerator overview](iot-accelerators-predictive-overview.md)
8686
* [Connected Factory solution accelerator overview](iot-accelerators-connected-factory-overview.md)
87-
* [IoT security from the ground up](securing-iot-ground-up.md)
87+
* [IoT security from the ground up](/azure/iot-fundamentals/iot-security-ground-up)

‎articles/iot-accelerators/iot-accelerators-predictive-overview.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ You can also explore some of the other features and capabilities of the IoT solu
139139

140140
[lnk_capture_value]: http://download.microsoft.com/download/0/7/D/07D394CE-185D-4B96-AC3C-9B61179F7080/Capture_value_from_the_Internet%20of%20Things_with_Predictive_Maintenance.PDF
141141
[lnk-faq]: iot-accelerators-faq.md
142-
[lnk-security-groundup]:securing-iot-ground-up.md
142+
[lnk-security-groundup]:/azure/iot-fundamentals/iot-security-ground-up
143143
[lnk-azureiotsuite]: https://www.azureiotsolutions.com/
144144
[lnk_free_trial]: http://azure.microsoft.com/pricing/free-trial/
145145
[lnk-azureiotsuite]: https://www.azureiotsolutions.com

‎articles/iot-accelerators/iot-accelerators-predictive-walkthrough.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -71,5 +71,5 @@ You can also explore some of the other features and capabilities of the IoT solu
7171
[lnk-cortana-analytics]: http://gallery.cortanaintelligence.com/Collection/Predictive-Maintenance-Template-3
7272
[lnk-azureiotsuite]: https://www.azureiotsolutions.com/
7373
[lnk-faq]: iot-accelerators-faq.md
74-
[lnk-security-groundup]:securing-iot-ground-up.md
74+
[lnk-security-groundup]:/azure/iot-fundamentals/iot-security-ground-up
7575
[lnk-machine-learning]: https://azure.microsoft.com/services/machine-learning/
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
### YamlMime:ContextObject
2+
brand: azure
3+
breadcrumb_path: ../../bread/toc.yml
4+
toc_rel: TOC.md

‎articles/iot-hub/TOC.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -86,10 +86,10 @@
8686
### [Use the IoTHubClient](iot-hub-device-sdk-c-iothubclient.md)
8787
### [Use the serializer](iot-hub-device-sdk-c-serializer.md)
8888

89-
## [Security from the ground up](/azure/iot-fundamentals/iot-hub-security-ground-up.md)
90-
## [Security best practices](/azure/iot-fundamentals/iot-security-best-practices.md)
91-
## [Security architecture](/azure/iot-fundamentals/iot-security-architecture.md)
92-
## [Secure your IoT deployment](/azure/iot-fundamentals/iot-security-deployment.md)
89+
## [Security from the ground up](/azure/iot-fundamentals/iot-security-ground-up?context=azure/iot-accelerators/render-context)
90+
## [Security best practices](/azure/iot-fundamentals/iot-security-best-practices?context=azure/iot-accelerators/render-context)
91+
## [Security architecture](/azure/iot-fundamentals/iot-security-architecture?context=azure/iot-accelerators/render-context)
92+
## [Secure your IoT deployment](/azure/iot-fundamentals/iot-security-deployment?context=azure/iot-accelerators/render-context)
9393
## Secure using X.509 CA certificates
9494
### [X.509 CA certificate security overview](iot-hub-x509ca-overview.md)
9595
#### [X.509 CA certificate security concepts](iot-hub-x509ca-concept.md)

‎articles/iot-hub/iot-hub-configure-file-upload-cli.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ To further explore the capabilities of IoT Hub, see:
149149

150150
[lnk-devguide]: iot-hub-devguide.md
151151
[lnk-iotedge]: ../iot-edge/tutorial-simulate-device-linux.md
152-
[lnk-securing]: iot-hub-security-ground-up.md
152+
[lnk-securing]: /azure/iot-fundamentals/iot-security-ground-up
153153

154154

155155
[lnk-free-trial]: https://azure.microsoft.com/pricing/free-trial/

‎articles/iot-hub/iot-hub-configure-file-upload-powershell.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ To further explore the capabilities of IoT Hub, see:
137137

138138
[lnk-devguide]: iot-hub-devguide.md
139139
[lnk-iotedge]: ../iot-edge/tutorial-simulate-device-linux.md
140-
[lnk-securing]: iot-hub-security-ground-up.md
140+
[lnk-securing]: /azure/iot-fundamentals/iot-security-ground-up
141141
[lnk-powershell-install]: https://docs.microsoft.com/powershell/azure/install-azurerm-ps
142142
[lnk-powershell-storage]: https://docs.microsoft.com/powershell/module/azurerm.storage/
143143
[lnk-powershell-iothub]: https://docs.microsoft.com/powershell/module/azurerm.iothub/new-azurermiothub

‎articles/iot-hub/iot-hub-configure-file-upload.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -62,4 +62,4 @@ To further explore the capabilities of IoT Hub, see:
6262

6363
[lnk-devguide]: iot-hub-devguide.md
6464
[lnk-iotedge]: ../iot-edge/tutorial-simulate-device-linux.md
65-
[lnk-securing]: iot-hub-security-ground-up.md
65+
[lnk-securing]: /azure/iot-fundamentals/iot-security-ground-up

‎articles/iot-hub/iot-hub-create-through-portal.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -169,5 +169,5 @@ To further explore the capabilities of IoT Hub, see:
169169

170170
[lnk-devguide]: iot-hub-devguide.md
171171
[lnk-iotedge]: ../iot-edge/tutorial-simulate-device-linux.md
172-
[lnk-securing]: iot-hub-security-ground-up.md
172+
[lnk-securing]: /azure/iot-fundamentals/iot-security-ground-up
173173
[lnk-devguide-endpoints]: iot-hub-devguide-endpoints.md

‎articles/iot-hub/render-context.yml

+4
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
### YamlMime:ContextObject
2+
brand: azure
3+
breadcrumb_path: ../../bread/toc.yml
4+
toc_rel: TOC.md

‎articles/iot-suite/iot-suite-v1-faq.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ You can also explore some of the other features and capabilities of the IoT Suit
105105
* [IoT security from the ground up][lnk-security-groundup]
106106

107107
[lnk-predictive-overview]:../iot-accelerators/iot-accelerators-predictive-overview.md
108-
[lnk-security-groundup]:../iot-accelerators/securing-iot-ground-up.md
108+
[lnk-security-groundup]:/azure/iot-fundamentals/iot-security-ground-up
109109

110110
[link-azuresupportticket]: https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade
111111
[link-azuresublimits]: https://azure.microsoft.com/documentation/articles/azure-subscription-service-limits/#iot-hub-limits

‎articles/iot-suite/iot-suite-v1-remote-monitoring-device-info.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -128,4 +128,4 @@ Now you've finished learning how you can customize the preconfigured solutions,
128128

129129
[lnk-predictive-overview]:../iot-accelerators/iot-accelerators-predictive-overview.md
130130
[lnk-faq]: iot-suite-v1-faq.md
131-
[lnk-security-groundup]:../iot-accelerators/securing-iot-ground-up.md
131+
[lnk-security-groundup]:/azure/iot-fundamentals/iot-security-ground-up

‎articles/security/security-internet-of-things-overview.md

+12-12
Original file line numberDiff line numberDiff line change
@@ -35,32 +35,32 @@ To help you understand how to secure your IoT solutions, we have the following i
3535
## Security architecture
3636
When designing a system, it is important to understand the potential threats to that system, and add appropriate defenses accordingly, as the system is designed and architected. It is important to design the product from the start with security in mind because understanding how an attacker might be able to compromise a system helps make sure appropriate mitigations are in place from the beginning.
3737

38-
You can learn about IoT security architecture by reading [Internet of Things Security Architecture](../iot-accelerators/iot-security-architecture.md).
38+
You can learn about IoT security architecture by reading [Internet of Things Security Architecture](/azure/iot-fundamentals/iot-security-architecture).
3939

4040
This article discusses the following topics:
4141

42-
* [Security Starts with a Threat Model](../iot-accelerators/iot-security-architecture.md#security-starts-with-a-threat-model)
43-
* [Security in IoT](../iot-accelerators/iot-security-architecture.md#security-in-iot)
44-
* [Threat Modeling the Azure IoT Reference Architecture](../iot-accelerators/iot-security-architecture.md#threat-modeling-the-azure-iot-reference-architecture)
42+
* [Security Starts with a Threat Model](/azure/iot-fundamentals/iot-security-architecture#security-starts-with-a-threat-model)
43+
* [Security in IoT](/azure/iot-fundamentals/iot-security-architecture#security-in-iot)
44+
* [Threat Modeling the Azure IoT Reference Architecture](/azure/iot-fundamentals/iot-security-architecture#threat-modeling-the-azure-iot-reference-architecture)
4545

4646
## Security from the ground up
4747
The IoT poses unique security, privacy, and compliance challenges to businesses worldwide. Unlike traditional cyber technology where these issues revolve around software and how it is implemented, IoT concerns what happens when the cyber and the physical worlds converge. Protecting IoT solutions requires ensuring secure provisioning of devices, secure connectivity between these devices and the cloud, and secure data protection in the cloud during processing and storage. Working against such functionality, however, are resource-constrained devices, geographic distribution of deployments, and many devices within a solution.
4848

49-
You can learn how to handle security in these areas by reading [Internet of Things security from the ground up](../iot-accelerators/securing-iot-ground-up.md).
49+
You can learn how to handle security in these areas by reading [Internet of Things security from the ground up](/azure/iot-fundamentals/iot-security-ground-up).
5050

5151
The article discusses the following topics:
5252

53-
* [Secure infrastructure from the ground up](../iot-accelerators/securing-iot-ground-up.md#secure-infrastructure-from-the-ground-up)
54-
* [Microsoft Azure – secure IoT infrastructure for your business](../iot-accelerators/securing-iot-ground-up.md#microsoft-azure---secure-iot-infrastructure-for-your-business)
53+
* [Secure infrastructure from the ground up](/azure/iot-fundamentals/iot-security-ground-up#secure-infrastructure-from-the-ground-up)
54+
* [Microsoft Azure – secure IoT infrastructure for your business](/azure/iot-fundamentals/iot-security-ground-up#microsoft-azure---secure-iot-infrastructure-for-your-business)
5555

5656
## Best Practices
5757
Securing an IoT infrastructure requires a rigorous security-in-depth strategy. From securing data in the cloud, protecting data integrity while in transit over the public internet, to securely provisioning devices, each layer builds greater security assurance in the overall infrastructure.
5858

59-
You can learn about Internet of Things security best practices by reading [Internet of Things security best practices](../iot-accelerators/iot-security-best-practices.md).
59+
You can learn about Internet of Things security best practices by reading [Internet of Things security best practices](/azure/iot-fundamentals/iot-security-best-practices).
6060

6161
The article discusses the following topics:
6262

63-
* [IoT hardware manufacturer/integrator](../iot-accelerators/iot-security-best-practices.md#iot-hardware-manufacturerintegrator)
64-
* [IoT solution developer](../iot-accelerators/iot-security-best-practices.md#iot-solution-developer)
65-
* [IoT solution deployer](../iot-accelerators/iot-security-best-practices.md#iot-solution-deployer)
66-
* [IoT solution operator](../iot-accelerators/iot-security-best-practices.md#iot-solution-operator)
63+
* [IoT hardware manufacturer/integrator](/azure/iot-fundamentals/iot-security-best-practices.md#iot-hardware-manufacturerintegrator)
64+
* [IoT solution developer](/azure/iot-fundamentals/iot-security-best-practices.md#iot-solution-developer)
65+
* [IoT solution deployer](/azure/iot-fundamentals/iot-security-best-practices.md#iot-solution-deployer)
66+
* [IoT solution operator](/azure/iot-fundamentals/iot-security-best-practices.md#iot-solution-operator)

0 commit comments

Comments
 (0)
Please sign in to comment.