The Internet of Things on AWS – Official Blog
Using AWS IoT Device Management commands to simplify remote actions on IoT devices
Introduction In today’s highly connected modern world, Internet of Things (IoT) devices are transforming how we interact with our homes, offices, and industries. Smart technology now extends from homes to cars and industrial equipment. Controlling these devices remotely is essential and offers improved productivity, user experience, and risk management. This blog explores how to send […]
Introducing the latest AWS Well-Architected Framework: IoT Lens
AWS is pleased to introduce an update to the AWS Well-Architected Framework: IoT Lens. The IoT Lens provides simple and detailed guidance to build IoT workloads on AWS. This updated version aims to address questions around complexity, security, performance, cost, and technical risk. Introduction Designing Internet of Things (IoT) workloads can be challenging as sensors, […]
Securely sending industrial data to AWS IoT services using unidirectional gateways
Introduction Critical infrastructure customers are challenged to make industrial networks more accessible without significantly increasing cybersecurity risks. This is due in part to the common practice of using Industrial IoT (IIoT) and cloud technologies to analyze large volumes of industrial data to improve operational efficiencies. To be successful, this practice requires a balance between advancing […]
Ten security golden rules for connected mobility solutions
Introduction Connected mobility solutions are driving changes in the automotive industry. With remote commands, sensors, cameras, artificial intelligence, and 5G mobile networks, vehicles have become increasingly smart and connected. While connected mobility solutions deliver significant customer value, they also introduce new risks to security, safety, and privacy that must be properly managed. Automakers need to […]
Secure IIoT secondary sensing using AWS Snowcone and CloudRail
Introduction One of the major barriers to Industrial IoT (IIoT) adoption is integrating modern IIoT solutions in brownfield environments with legacy components and systems. These legacy industrial components and systems could be 20, 30, 40 years old and are less capable of supporting modern security standards. Physically connecting legacy industrial systems to the cloud can be […]
Introducing the latest AWS Well- Architected IoT Lens
Introduction We are pleased to introduce the latest version of AWS Well-Architected IoT Lens. IoT projects can be complex due to a combination of many factors, including devices, software, use case scenarios, environments, processing patterns, network connectivity technologies, communication protocols, security issues, technical risks, compliance requirements and standards. The AWS Well-Architected IoT Lens provides simple […]
Guidance on using ISA/IEC 62443 for IIoT projects
Introduction With the increasing proliferation of Industrial Internet of Things (IIoT) systems and cloud services for innovation and digital transformation, government agencies and industrial customers are faced with protecting an expanding attack surface. The ISA/IEC 62443 series of standards were written before IIoT technologies were common but provide a strong basis for securing these environments. […]
Identify misconfigured IoT policies using AWS IoT Device Defender
Introduction We are excited to announce a new AWS IoT Device Defender audit feature to identify potential misconfigurations when using wild cards in Internet of Things (IoT) policies. AWS IoT Device Defender is a fully managed IoT security service that enables you to audit and monitor your IoT device fleet and secure your IoT configurations […]
Identifying IoT device certificates with a revoked intermediate CA using AWS IoT Device Defender
Introduction Dynamically verifiable device identity is a foundational component of a Zero Trust Architecture (ZTA). Ongoing dynamic evaluation of identity and trust requires complete and timely visibility into relevant components of that identity. Active device certificates issued by a revoked intermediate Certificate Authority (CA) can pose a security threat due to the intermediate CA being […]
Improve your security posture with AWS IoT Device Defender direct integration with AWS Security Hub
Introduction We are excited to announce that AWS IoT Device Defender is now integrated with AWS Security Hub. This integration allows you to ingest alarms and their attributes from audit and detect features in one central location, without custom coding. This will help you offload or reduce complexity of managing disparate workflows from multiple security […]








