You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: articles/security/security-internet-of-things-overview.md
+12-12
Original file line number
Diff line number
Diff line change
@@ -35,32 +35,32 @@ To help you understand how to secure your IoT solutions, we have the following i
35
35
## Security architecture
36
36
When designing a system, it is important to understand the potential threats to that system, and add appropriate defenses accordingly, as the system is designed and architected. It is important to design the product from the start with security in mind because understanding how an attacker might be able to compromise a system helps make sure appropriate mitigations are in place from the beginning.
37
37
38
-
You can learn about IoT security architecture by reading [Internet of Things Security Architecture](../iot-accelerators/iot-security-architecture.md).
38
+
You can learn about IoT security architecture by reading [Internet of Things Security Architecture](/azure/iot-fundamentals/iot-security-architecture).
39
39
40
40
This article discusses the following topics:
41
41
42
-
*[Security Starts with a Threat Model](../iot-accelerators/iot-security-architecture.md#security-starts-with-a-threat-model)
43
-
*[Security in IoT](../iot-accelerators/iot-security-architecture.md#security-in-iot)
44
-
*[Threat Modeling the Azure IoT Reference Architecture](../iot-accelerators/iot-security-architecture.md#threat-modeling-the-azure-iot-reference-architecture)
42
+
*[Security Starts with a Threat Model](/azure/iot-fundamentals/iot-security-architecture#security-starts-with-a-threat-model)
43
+
*[Security in IoT](/azure/iot-fundamentals/iot-security-architecture#security-in-iot)
44
+
*[Threat Modeling the Azure IoT Reference Architecture](/azure/iot-fundamentals/iot-security-architecture#threat-modeling-the-azure-iot-reference-architecture)
45
45
46
46
## Security from the ground up
47
47
The IoT poses unique security, privacy, and compliance challenges to businesses worldwide. Unlike traditional cyber technology where these issues revolve around software and how it is implemented, IoT concerns what happens when the cyber and the physical worlds converge. Protecting IoT solutions requires ensuring secure provisioning of devices, secure connectivity between these devices and the cloud, and secure data protection in the cloud during processing and storage. Working against such functionality, however, are resource-constrained devices, geographic distribution of deployments, and many devices within a solution.
48
48
49
-
You can learn how to handle security in these areas by reading [Internet of Things security from the ground up](../iot-accelerators/securing-iot-ground-up.md).
49
+
You can learn how to handle security in these areas by reading [Internet of Things security from the ground up](/azure/iot-fundamentals/iot-security-ground-up).
50
50
51
51
The article discusses the following topics:
52
52
53
-
*[Secure infrastructure from the ground up](../iot-accelerators/securing-iot-ground-up.md#secure-infrastructure-from-the-ground-up)
54
-
*[Microsoft Azure – secure IoT infrastructure for your business](../iot-accelerators/securing-iot-ground-up.md#microsoft-azure---secure-iot-infrastructure-for-your-business)
53
+
*[Secure infrastructure from the ground up](/azure/iot-fundamentals/iot-security-ground-up#secure-infrastructure-from-the-ground-up)
54
+
*[Microsoft Azure – secure IoT infrastructure for your business](/azure/iot-fundamentals/iot-security-ground-up#microsoft-azure---secure-iot-infrastructure-for-your-business)
55
55
56
56
## Best Practices
57
57
Securing an IoT infrastructure requires a rigorous security-in-depth strategy. From securing data in the cloud, protecting data integrity while in transit over the public internet, to securely provisioning devices, each layer builds greater security assurance in the overall infrastructure.
58
58
59
-
You can learn about Internet of Things security best practices by reading [Internet of Things security best practices](../iot-accelerators/iot-security-best-practices.md).
59
+
You can learn about Internet of Things security best practices by reading [Internet of Things security best practices](/azure/iot-fundamentals/iot-security-best-practices).
0 commit comments