The Internet of Things on AWS – Official Blog

Category: AWS IoT Device Defender

Assessing OT and IIoT cybersecurity risk

This blog is co-authored by Ryan Dsouza, AWS and John Cusimano, Deloitte  Introduction Innovative and forward-looking oil and gas, electrical generation and distribution, aviation, maritime, rail, utilities, and manufacturing companies who use Operational Technology (OT) to run their businesses are adopting the cloud in many forms as a result of their digital transformation initiatives. Data […]

Read More

How to manage IoT device certificate rotation using AWS IoT

Introduction The Internet of Things (IoT) is transforming business operations and customer experiences across a variety of industries. This unlimited opportunity enables business transformation, but if not implemented correctly, it also brings security, risk, and privacy concerns, compromising your data and brand. In industrial facilities, OT (Operational Technology) environments are leveraging more IT solutions to improve […]

Read More

How to detect anomalies in device metrics and improve your security posture using AWS IoT Device Defender custom metrics

Introduction IoT applications and devices can be diverse and are used across industries such as utilities, agriculture, manufacturing, mining, and consumer electronics. With the exponential growth of IoT devices and the increasing threat landscape, it also means that IoT security needs to be accounted for and designed into the solution from the ground up. AWS […]

Read More

What actions customers can take to protect, detect, and respond to Log4j vulnerabilities in Operational Technology (OT) and Industrial Internet of Things (IIoT) environments

In this post we will provide guidance to help industrial customers respond to the recently disclosed Log4j vulnerability. This post covers how to identify if you are susceptible to the issue, and then how to address the vulnerability in OT and IIoT environments. The Log4j vulnerability (CVE-2021-44228, CVE-2021-45046) is a critical vulnerability (CVSS 3.1 base […]

Read More

How to implement zero trust IoT solutions with AWS IoT

Introduction Zero trust is often misunderstood. It’s not a product but a security model and associated set of architectural principles and patterns. One of the main challenges customers face is determining how zero-trust principles can be applied to Internet of Things (IoT) and how to get started with incorporating zero trust with Amazon Web Services […]

Read More

Build a proof-of-concept IoT solution in under 3 hours with the AWS IoT Device Client

Introduction You may be starting on your IoT journey, or have thousands of devices connected already. Maybe you just built an IoT business application, and want to deploy it to your fleet. You’re looking for a way to build functionality to control, update, monitor, or secure your IoT devices. To guide you through this process […]

Read More

Building a scalable IoT system for connected air purifiers on AWS IoT: Blueair (a Unilever company)

Introduction Our homes contain everything from dust, cooking fumes, and chemicals released from paint, furniture, and cleaning agents. Add to that polluted outdoor air making its way into our homes through ventilation, and you’ve got a cocktail of toxins floating around between your four walls. Clean air has proven positive health benefits. It can provide […]

Read More
Diagram showingthe IoT Lens for the AWS Well-Architected Framework

Build an AWS IoT Well-Architected environment with the IoT Lens

There are an estimated 31 billion IoT devices in 2020, and this is expected to increase to 75 billion by 2025 according to Security Today. You may be starting on your IoT journey or have hundreds of thousands of devices connected and want to improve your architecture and reduce your cost. To guide you through […]

Read More
This image shows what happens when you Click over to the History tab in the AWS IoT Device Defender console. You can see all the alarm events that occurred over the past 24 hours (you can select additional options from drop down to display up to 30 days. The green line represents alarms cleared and red indicates devices still in alarm. Hovering over the lines and dots, you can see the date, time, and status of the alarms during this timestamp.

AWS IoT Device Defender Announces ML Detect GA

Today, AWS announced the general availability of AWS IoT Device Defender Machine Learning Detect and Mitigation (ML Detect), a new feature that automatically detects IoT device-level operational and security anomalies based on learnings from past device data. Customers can already use AWS IoT Device Defender’s Rules Detect feature to manually set static alarms. ML Detect […]

Read More