You are tasked to build enhanced security around your industrial IoT infrastructure built up from PLCs and environmental sensors of a manufacturing plant.
You decide to use the Azure Defender for IoT.
You want to implement an enhanced security solution without intervening the configuration of the existing devices, in the shortest possible time.
Which of the following options should you choose?
Click on the arrows to vote for the correct answer
A. B. C. D.Correct Answer: A.
Option A is CORRECT because the Defender for IoT sensors are designed to discover and monitor network devices, without the need of any additional deployment on the devices themselves, still providing an enhanced level of security.
Option B is incorrect because while the Defender for IoT security agents allow you to build security directly into the IoT devices, application of the agent-based mode requires deployment of so-called micro agents to the devices, which doesn't match the set requirements.
Option C is incorrect because application of the agent-based mode requires deployment of so-called micro agents to the devices.
No matter what type of agent you use, it doesn't match the requirement.
Option D is incorrect because the “anomaly detection engine” is one of the five analytics detection engines of the Defender for IoT sensors.
It cannot be implemented on its own.
Reference:
When tasked to build enhanced security around an industrial IoT infrastructure built up from PLCs and environmental sensors of a manufacturing plant, using Azure Defender for IoT can help achieve that.
Azure Defender for IoT is a cloud-based solution that provides threat protection for Industrial IoT networks. It helps identify and respond to IoT-specific threats, detect unauthorized access, and provide insights into the security of the devices.
To implement an enhanced security solution without intervening the configuration of the existing devices, in the shortest possible time, the best option would be to choose an agentless solution with Defender for IoT sensors.
Option A, Implementing an agentless solution with Defender for IoT sensors, allows for quick and easy deployment without requiring any configuration changes to the existing devices. The sensors collect data from the network traffic and send it to the cloud-based service for analysis and threat detection. This option is ideal when the devices are not capable of running agents due to resource constraints, or when the devices are running a proprietary operating system that cannot support agents.
Option B, Implementing an agent-based solution Defender for IoT embedded security agent, requires the installation of an agent on each device, which may not be possible without configuration changes. This option may be more suitable for devices that are capable of running agents and can be configured easily.
Option C, Implementing an agent-based solution with custom security agent, requires developing a custom agent and installing it on each device, which can be time-consuming and may not be feasible without configuration changes.
Option D, Implementing Defender for IoT anomaly detection engine, requires the use of machine learning algorithms to identify anomalies in the device behavior. This option is not as effective as the other options, as it is not a complete security solution and may generate false positives.
In conclusion, the best option to implement enhanced security around an industrial IoT infrastructure without intervening the configuration of the existing devices, in the shortest possible time, is to choose an agentless solution with Defender for IoT sensors.