Azure Percept security recommendations
Review the guidelines below for information on configuring firewalls and general security best practices with Azure Percept.
Configuring firewalls for Azure Percept DK
If your networking setup requires that you explicitly permit connections made from Azure Percept DK devices, review the following list of components.
This checklist is a starting point for firewall rules:
| URL (* = wildcard) | Outbound TCP Ports | Usage |
|---|---|---|
| *.auth.azureperceptdk.azure.net | 443 | Azure DK SOM Authentication and Authorization |
| *.auth.projectsantacruz.azure.net | 443 | Azure DK SOM Authentication and Authorization |
Additionally, review the list of connections used by Azure IoT Edge.
Additional recommendations for deployment to production
Azure Percept DK offers a great variety of security capabilities out of the box. In addition to those powerful security features included in the current release, Microsoft also suggests the following guidelines when considering production deployments:
- Strong physical protection of the device itself
- Ensure data-at-rest encryption is enabled
- Continuously monitor the device posture and quickly respond to alerts
- Limit the number of administrators who have access to the device
Next steps
Maklum balas
Kirim dan lihat maklum balas untuk