{"id":39686,"date":"2021-02-22T19:00:58","date_gmt":"2021-02-22T19:00:58","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92903"},"modified":"2021-02-22T19:00:58","modified_gmt":"2021-02-22T19:00:58","slug":"securing-azure-datacenters-with-continuous-iot-ot-monitoring","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/","title":{"rendered":"Securing Azure datacenters with continuous IoT\/OT monitoring"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92913 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/MSC17_dataCenter_001.jpg\" alt=\"Real people. IT professionals build and maintain the LinkedIn server farm which operates on 100% renewable energy. Power is hydro-generated and managed efficiently on-site with minimum new draw from external grid. State-of-the-art facility uses eco-friendly solutions such as using reclaimed water to cool the data center.\" width=\"1200\" height=\"800\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/MSC17_dataCenter_001.jpg 1200w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/MSC17_dataCenter_001-300x200.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/MSC17_dataCenter_001-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/MSC17_dataCenter_001-768x512.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/MSC17_dataCenter_001-293x195.jpg 293w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\"><\/p>\n<p><em>Figure 1: Industrial cooling system for datacenters.<\/em><\/p>\n<p>As more intelligent devices and machinery become connected to the internet, Operational Technology (OT) and the Internet of Things (IoT) have become part of your enterprise network infrastructure\u2014and a growing security risk. With every new factory sensor, wind turbine monitoring device, or smart building, the attack surface grows. Analysts estimate that there will be <a href=\"https:\/\/www.computerweekly.com\/news\/252491495\/Industrial-IoT-connections-to-reach-37-billion-by-2025\" target=\"_blank\" rel=\"noopener noreferrer\">37 billion industrial IoT (IIoT) devices by 2025<\/a>. Even more alarming for business leaders, Gartner predicts that <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2020-09-01-gartner-predicts-75--of-ceos-will-be-personally-liabl\" target=\"_blank\" rel=\"noopener noreferrer\">75 percent of CEOs will be personally liable for cyber-physical incidents by 2024<\/a>.<\/p>\n<p>We\u2019ve spent 15 to 20 years adding layers of telemetry and monitoring for IT security. However, most chief information security officers (CISOs) and security operations center (SOC) teams have little or no visibility into their OT risk. It\u2019s clear that a new approach is needed, one that includes IoT and OT-specific incident response and best practices for bringing the two teams together to defend against increasingly sophisticated cyber threats.<\/p>\n<h2>A changing threat landscape<\/h2>\n<p>In every area of our lives, cyber-physical systems (CPS) go mostly unseen as they quietly monitor building automation, industrial robots, gas pipelines, HVAC systems, turbines, automated warehousing and logistics systems, and other industrial systems. In the past, OT risk was minimized because of \u201cair-gapping\u201d meaning, a physical divide was maintained between OT and IT networks. But digital transformation has disrupted all that. Now devices in the warehouse, refinery, and factory floor are connected directly to corporate IT networks and often to the internet.<\/p>\n<p>Microsoft offers <a href=\"https:\/\/azure.microsoft.com\/en-us\/overview\/iot\/security\/\" target=\"_blank\" rel=\"noopener noreferrer\">end-to-end IoT security solutions<\/a> for new, or \u201cgreenfield,\u201d IoT deployments, but most of today\u2019s IoT and OT devices are still considered \u201cunmanaged\u201d because they\u2019re not provisioned, tracked in a configuration management database (CMDB), or consistently monitored. These devices typically don\u2019t support agents and lack built-in security such as strong credentials and automated patching\u2014making them soft targets for adversaries looking to pivot deeper into corporate networks.<\/p>\n<p>For OT security, the key priorities are safety and availability. Production facilities need to be up and running to keep generating revenue. However, beyond revenue losses, there\u2019s a risk for catastrophic damage and possible loss of life when OT systems are breached. And like IT attacks, an OT breach also poses a risk for theft of intellectual property (IP). According to the Verizon Data Breach Investigations Report (DBIR), <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener noreferrer\">manufacturers are eight times more likely to be breached for theft of IP<\/a>. OT security translates directly into three main types of business risks:<\/p>\n<ul>\n<li><strong>Revenue impact:<\/strong> In 2017, <a href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\" target=\"_blank\" rel=\"noopener noreferrer\">WannaCry<\/a> malware shut down major automotive manufacturers and affected more than 200,000 computers across 150 countries, with damages ranging into billions of dollars. The same year, <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\" target=\"_blank\" rel=\"noopener noreferrer\">NotPetya<\/a> ransomware nearly shut down the mighty Maersk shipping company and several CPG companies. The attack crippled <a href=\"https:\/\/www.bloomberg.com\/news\/features\/2019-12-03\/merck-cyberattack-s-1-3-billion-question-was-it-an-act-of-war\" target=\"_blank\" rel=\"noopener noreferrer\">Merck\u2019s production facilities resulting in losses of $1.3 billion<\/a>. Last year, <a href=\"https:\/\/www.wired.com\/story\/lockergoga-ransomware-crippling-industrial-firms\/\" target=\"_blank\" rel=\"noopener noreferrer\">LockerGoga<\/a> shut down the systems of Norwegian aluminum manufacturing company Norsk Hydro and several other plants. In 2020, <a href=\"https:\/\/www.zdnet.com\/article\/this-is-how-ekans-ransomware-is-targeting-industrial-control-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ekans<\/a> (snake spelled backward) ransomware became the latest OT threat by specifically shutting down industrial control systems (ICS).<\/li>\n<li><strong>IP theft:<\/strong> IP includes proprietary manufacturing processes, formulas, designs, and more. In one instance, <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security Response Center<\/a> (MSRC) discovered hackers were compromising vulnerable IoT devices using their default credentials. Once inside, the hackers scanned the network to see what other systems they could access to get sensitive IP. <a href=\"https:\/\/www.cnbc.com\/2019\/02\/28\/1-in-5-companies-say-china-stole-their-ip-within-the-last-year-cnbc.html\" target=\"_blank\" rel=\"noopener noreferrer\">One in five<\/a> North American-based corporations reports that they have had IPs stolen within the last year.<\/li>\n<li><strong>Safety risks<\/strong>: The Triton attack on a petrochemical facility targeted safety controllers with the intent to cause major structural damage and possible loss of life. The attackers gained a foothold in the IT network then used living-off-the-land (LOTL) tactics to gain remote access to the OT network, where they deployed their purpose-built malware. As this attack demonstrated, increased connectivity between IT and OT networks gives adversaries new avenues of attack for compromising unmanaged OT devices.<\/li>\n<\/ul>\n<p>The U.S. <a href=\"https:\/\/www.cisa.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity and Infrastructure Agency<\/a> (CISA) reports that adversaries are still using many of the tactics seen in the Triton cyberattack to compromise embedded devices in OT systems. CISA has issued three basic recommendations for securing OT:<\/p>\n<ol>\n<li>Create an up-to-date, detailed inventory and map of your OT network.<\/li>\n<li>Use the asset inventory or map to prioritize risks, such as unpatched systems, unauthorized connections between subnets, or unauthorized connections to the internet.<\/li>\n<li>Implement continuous monitoring with anomaly detection.<\/li>\n<\/ol>\n<h2>Azure datacenters\u2014a strategic resource<\/h2>\n<p>Through our cloud, Microsoft serves more than a billion customers and more than 20 million businesses across 60 regions worldwide. Today we help secure more than <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/01\/27\/microsoft-surpasses-10-billion-in-security-business-revenue-more-than-40-percent-year-over-year-growth\/\" target=\"_blank\" rel=\"noopener noreferrer\">400,000 customers across 120 countries<\/a>. These range from small businesses to large enterprises, with 90 of the Fortune 100 using four or more of our security, compliance, identity, and management solutions. Our SOCs process <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/01\/27\/microsoft-surpasses-10-billion-in-security-business-revenue-more-than-40-percent-year-over-year-growth\/\" target=\"_blank\" rel=\"noopener noreferrer\">8 trillion global signals daily<\/a>. Datacenters are the building blocks of the Cloud, and Microsoft has been building datacenters for more than 30 years. Microsoft datacenters constitute a complex industrial-scale facility sitting at the intersection of operational technologies (OT) and information technologies (IT). This includes industrial control systems managing the climate, power and water, physical security systems, diverse MS and non-MS personnel managing the servers and equipment, various networks including LAN and WAN and WiFi, and diverse software tools. Exclusively leveraging IT security solutions is insufficient to secure datacenters because OT systems have a long lifespan, implement network segregation, rely on proprietary protocols, and patching can disrupt operations leading to safety risks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92920 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Data-center-summary-slide-updated.jpg\" alt=\"Infographic showing details about Microsoft datacenters around the world \" width=\"1280\" height=\"720\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Data-center-summary-slide-updated.jpg 1280w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Data-center-summary-slide-updated-300x169.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Data-center-summary-slide-updated-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Data-center-summary-slide-updated-768x432.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Data-center-summary-slide-updated-687x385.jpg 687w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Data-center-summary-slide-updated-1083x609.jpg 1083w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Data-center-summary-slide-updated-767x431.jpg 767w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Data-center-summary-slide-updated-539x303.jpg 539w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\"><\/p>\n<p><em>Figure 2: Microsoft datacenters.<\/em><\/p>\n<p>The biggest risks in securing complex heterogeneous datacenter environments and generations are lack of visibility into the full datacenter stack, and IR plans and playbooks across OT and IT. To address this, we have implemented an end-to-end security monitoring system using Azure Defender for IoT and Azure Sentinel while integrating with Microsoft\u2019s central SOC.<\/p>\n<p>To strengthen its data centers\u2019 operational resiliency worldwide, Microsoft\u2019s Azure data center security team selected <a href=\"https:\/\/www.globenewswire.com\/news-release\/2019\/01\/09\/1682657\/0\/en\/CyberX-Receives-U-S-Technology-Patent-for-ICS-Threat-Monitoring-Analytics.html\" target=\"_blank\" rel=\"noopener noreferrer\">CyberX\u2019s purpose-built IoT and OT cybersecurity platform<\/a> in mid-2019. <a href=\"https:\/\/blogs.microsoft.com\/blog\/2020\/06\/22\/microsoft-acquires-cyberx-to-accelerate-and-secure-customers-iot-deployments\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft subsequently acquired CyberX<\/a> in June 2020 and recently <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/01\/27\/announcing-the-general-availability-of-azure-defender-for-iot\/\" target=\"_blank\" rel=\"noopener noreferrer\">released Azure Defender for IoT<\/a>, which is based on CyberX\u2019s agentless security platform.<\/p>\n<p>Incorporating IoT and OT-aware behavioral analytics and threat intelligence, Azure Defender for IoT delivers continuous IoT and OT asset discovery, vulnerability management, and threat detection. As a Network Detection and Response (NDR) platform that uses passive monitoring and Network Traffic Analysis (NTA), it has zero performance impact on the OT network.<\/p>\n<p>Azure Defender for IoT is now deeply integrated with <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Sentinel<\/a> and is available for on-premises, Azure-connected, and hybrid environments. By using both Azure Defender for IoT and Azure Sentinel as a unified, end-to-end IT and OT security solution, the Azure datacenter security team has been able to reduce complexity and prevent gaps that can lead to vulnerabilities.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-92907\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Picture2-2.png\" alt=\"Microsoft datacenters: Ingestion, detection, and investigation.\" width=\"1133\" height=\"647\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Picture2-2.png 1133w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Picture2-2-300x171.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Picture2-2-1024x585.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/02\/Picture2-2-768x439.png 768w\" sizes=\"auto, (max-width: 1133px) 100vw, 1133px\"><\/p>\n<p><em>Figure 3: Microsoft datacenters: Ingestion, detection, and investigation.<\/em><\/p>\n<h2>How it works<\/h2>\n<p>Azure Sentinel processes alert both from IT and OT, including from Azure Defender for IoT for OT devices such as HMIs, PLCs, biometrics, and badge readers and IT devices such as physical hosts, firewalls, virtual machines, routers, and more. All information is integrated with our incident-response system and our central SOC (including OT and IT playbooks) where machine learning reduces false positives and makes our alerts richer\u2014creating a feedback loop with Azure Sentinel, which further refines and improves our alerting capabilities.<\/p>\n<p>Microsoft datacenter security monitoring and response:<\/p>\n<ul>\n<li>Improves the quality of critical environment inventory for risk-based analysis.<\/li>\n<li>Correlates significant security events across multiple sources.<\/li>\n<li>Advances detections across industrial control system (ICS) networks for known malware, botnet, and command\/control traffic.<\/li>\n<li>Enables machine learning support for insider threat-detection via user and entity behavior analytics (UEBA).<\/li>\n<li>Deploys OT and IT incident-response playbooks using Azure Logic Apps integrated with Microsoft SOC. For example, we implement OT and IT playbooks for scenarios like ransomware or malware, botnet, insider threat, and untracked data-bearing devices.<\/li>\n<li>Detects anomalous activity while reducing noise.<\/li>\n<\/ul>\n<p>In addition, the Microsoft cloud security stack\u2014<a href=\"https:\/\/www.microsoft.com\/en-us\/itshowcase\/microsoft-uses-threat-intelligence-to-protect-detect-and-respond-to-threats\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Threat Intel Center<\/a> (MSTIC) is being expanded with OT capabilities and threat intel.<\/p>\n<h2>OT and IT: Bridging the cultural divide<\/h2>\n<p>OT and IT have traditionally worked on separate sides of the air gap as laid out in the <a href=\"https:\/\/www.automationworld.com\/factory\/iiot\/article\/21132891\/is-the-purdue-model-still-relevant\" target=\"_blank\" rel=\"noopener noreferrer\">Purdue Model<\/a>. But as I mentioned at the top, that physical divide has vanished into the cloud. Thinking in terms of an IT and OT persona that enables both teams to collaborate seamlessly is the security challenge for our time. Here are a few insights that can help bridge the gap:<\/p>\n<ul>\n<li><strong>Mature and boost IT security practices for OT<\/strong>: Patching an OT system isn\u2019t the same as updating IT; there can be dangerous repercussions in the form of factory downtime or safety risks. Empathy is important; the liberties enjoyed in the IT world can\u2019t be blindly applied on OT. However, don\u2019t throw away IT security best practices\u2014boost them with OT capabilities.<\/li>\n<li><strong>Embrace the security journey<\/strong>: Whether you\u2019re in OT or IT, security improvements move like a dial, not a switch. Agree on your guiding principles and tenants, then constantly improving collaboration between OT and IT teams.<\/li>\n<li><strong>Understand the OT persona<\/strong>: IT teams should get to know what a day in the life of an OT person looks like. Our team shadowed OT activity by making site visits, which helped build understanding and establish working relationships.<\/li>\n<li><strong>Appreciate the other team\u2019s priorities<\/strong>: When working with OT, this means understanding the importance of safety and availability. What might be a simple system patch in IT could cause downtime or a safety issue in OT. Establish a common vocabulary and metrics to work out issues together.<\/li>\n<li><strong>Acknowledge preconceptions<\/strong>: OT often feels like the IT security approach will cause disruptions and downtime, leading to audits, escalations, or worse. For that reason, our approach became: \u201cHey, we found a problem. Let\u2019s solve it together.\u201d<\/li>\n<li><strong>Be proactive versus reactive<\/strong>: Do security assessments together and keep the right people in the loop. Set up two-way trainings, such as joint tabletop or red team exercises, and plan for \u201cworst day\u201d scenarios. Create dedicated websites and SharePoint sites where people can reach out with confidence that their concerns will be addressed.<\/li>\n<\/ul>\n<p>For more information on securing smart buildings and bridging the IT and OT gap, watch my SANS webinar presentation titled \u201c<a href=\"https:\/\/www.sans.org\/webcasts\/securing-building-management-systems-data-centers-ot-security-monitoring-115470\" target=\"_blank\" rel=\"noopener noreferrer\">Securing Building Automation &amp; Data Centers with Continuous OT Security Monitoring<\/a>.\u201d<\/p>\n<h2>Learn more<\/h2>\n<p>To learn more about Microsoft Security solutions, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/02\/22\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how Microsoft ensures operational resilience for Azure datacenters with Azure Defender for IOT and Azure Sentinel<br \/>\nThe post Securing Azure datacenters with continuous IoT\/OT monitoring appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39687,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[6426,347,77,236],"class_list":["post-39686","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-azure-security","tag-cybersecurity","tag-iot","tag-iot-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing Azure datacenters with continuous IoT\/OT monitoring 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Azure datacenters with continuous IoT\/OT monitoring 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-22T19:00:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/securing-azure-datacenters-with-continuous-iot-ot-monitoring.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Securing Azure datacenters with continuous IoT\/OT monitoring\",\"datePublished\":\"2021-02-22T19:00:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/\"},\"wordCount\":1747,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/securing-azure-datacenters-with-continuous-iot-ot-monitoring.jpg\",\"keywords\":[\"Azure Security\",\"Cybersecurity\",\"IoT\",\"IoT security\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/\",\"name\":\"Securing Azure datacenters with continuous IoT\/OT monitoring 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/securing-azure-datacenters-with-continuous-iot-ot-monitoring.jpg\",\"datePublished\":\"2021-02-22T19:00:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/securing-azure-datacenters-with-continuous-iot-ot-monitoring.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/securing-azure-datacenters-with-continuous-iot-ot-monitoring.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Security\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/azure-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Securing Azure datacenters with continuous IoT\/OT monitoring\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing Azure datacenters with continuous IoT\/OT monitoring 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/","og_locale":"en_US","og_type":"article","og_title":"Securing Azure datacenters with continuous IoT\/OT monitoring 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-02-22T19:00:58+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/securing-azure-datacenters-with-continuous-iot-ot-monitoring.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Securing Azure datacenters with continuous IoT\/OT monitoring","datePublished":"2021-02-22T19:00:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/"},"wordCount":1747,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/securing-azure-datacenters-with-continuous-iot-ot-monitoring.jpg","keywords":["Azure Security","Cybersecurity","IoT","IoT security"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/","url":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/","name":"Securing Azure datacenters with continuous IoT\/OT monitoring 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/securing-azure-datacenters-with-continuous-iot-ot-monitoring.jpg","datePublished":"2021-02-22T19:00:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/securing-azure-datacenters-with-continuous-iot-ot-monitoring.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/02\/securing-azure-datacenters-with-continuous-iot-ot-monitoring.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/azure-security\/"},{"@type":"ListItem","position":3,"name":"Securing Azure datacenters with continuous IoT\/OT monitoring"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39686"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39686\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39687"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}