In this chapter, you will learn following recipes: Securing a device with IoT Hub Securing a communication IP filtering with IoT Hub IoT Hub access rights Security best practices