Nineteen cybersecurity best practices used to implement the seven properties of highly secured devices in Azure Sphere

MSR-TR-2020-56 |

Published by Microsoft

This paper is written for the technical cybersecurity professional or IT professional interested in learning more about the architecture and implementation of Azure Sphere. We hope that this paper assists in evaluating the measures used within Azure Sphere to improve the security of IoT devices. It may also act as a reference for companies that wish to compare their current and/or competing IoT offering against Azure Sphere’s own offering on the market. Given its target audience, the paper often uses terms of art that, while familiar to many, may be new to some readers of this paper. Wherever possible acronyms are explained, but the paper is not meant as a tutorial or authoritative source for the details of topics like cryptography, encryption, or the architecture of modern operating systems.