Building Enhanced Security for Azure IoT Infrastructure | Exam AZ-220 Solution

Is This the Right Solution to Achieve Your Goal?

Question

You need to build enhanced security around your IoT infrastructure.

You want to use Azure Security Center's Defender for IoT where you need to set up a security agent to report on your device's connection events with high priority and collect high priority events in every 5 minutes.

In order to configure the necessary security agents, you decide adding the following script to your device's azureiotsecurity twin, as desired properties:

"ms_iotn:urn_azureiot_Security_SecurityAgentConfiguration": { "highPriorityMessageFrequency": { "value": "PT5M" }, "eventPriorityConnectionCreate": { "value": "High" } } 
Is this the right solution to achieve your goal?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B.

Correct Answer: A.

Option A is CORRECT because in order to set up the security agents, an azureiotsecurity module identity has to be created under your device, and the configuration code above must be added to its twin's ‘desired' parameters section.

Option B is incorrect because custom properties must be set inside the agent configuration object, under the azureiotsecurity module twin, i.e.

it is the module twin of the azureiotsecurity module identity of the device which holds the configuration objects of the security agents, i.e.

security agents must be configured at module level.

References:

Yes, the given solution is correct to achieve the goal of enhancing security around the IoT infrastructure using Azure Security Center's Defender for IoT and configuring the necessary security agents to report on the device's connection events with high priority and collect high priority events in every 5 minutes.

The solution involves adding a JSON object as a desired property to the device's azureiotsecurity twin, which configures the Security Agent to report on the device's connection events with high priority and collect high priority events every 5 minutes. The JSON object includes the following key-value pairs:

  1. "highPriorityMessageFrequency": This key specifies the frequency at which high priority messages should be collected. The value "PT5M" indicates that high priority events should be collected every 5 minutes.

  2. "eventPriorityConnectionCreate": This key specifies the priority level of the device's connection events. The value "High" indicates that the device's connection events should be reported with high priority.

By configuring these desired properties in the device twin, the Security Agent will be configured to collect high priority events every 5 minutes and report on the device's connection events with high priority, enhancing the security around the IoT infrastructure.

Therefore, the correct answer is A. Yes.