Summary
In conclusion, we have learned about the various ways in which MDIoT aids in identifying threat/attack vectors and vulnerabilities. We have gotten a deeper understanding of the risk assessment report, which, in turn, shines a light on the security score of various devices and provides guidance toward mitigating them as well. To further increase usability and resourcefulness, we looked at the vulnerabilities highlighted in an Azure workbook as well, which aids in creating custom reports that can come in handy for your investigations. Use all of these to stay on top of your assets and devices, and secure them to thwart any attacks coming your way.
In the next chapter, we will explore Enterprise IoT (EIoT), integrating MDIoT with security information and event management (SIEM) solutions such as Microsoft Sentinel (cloud-native SIEM), and the zero-trust approach regarding the IoT/OT industry.