The Internet of Things on AWS – Official Blog
Category: AWS IoT Device Defender
How to detect anomalies in device metrics and improve your security posture using AWS IoT Device Defender custom metrics
Introduction IoT applications and devices can be diverse and are used across industries such as utilities, agriculture, manufacturing, mining, and consumer electronics. With the exponential growth of IoT devices and the increasing threat landscape, it also means that IoT security needs to be accounted for and designed into the solution from the ground up. AWS […]
What actions customers can take to protect, detect, and respond to Log4j vulnerabilities in Operational Technology (OT) and Industrial Internet of Things (IIoT) environments
In this post we will provide guidance to help industrial customers respond to the recently disclosed Log4j vulnerability. This post covers how to identify if you are susceptible to the issue, and then how to address the vulnerability in OT and IIoT environments. The Log4j vulnerability (CVE-2021-44228, CVE-2021-45046) is a critical vulnerability (CVSS 3.1 base […]
How to implement zero trust IoT solutions with AWS IoT
Introduction Zero trust is often misunderstood. It’s not a product but a security model and associated set of architectural principles and patterns. One of the main challenges customers face is determining how zero-trust principles can be applied to Internet of Things (IoT) and how to get started with incorporating zero trust with Amazon Web Services […]
Ten security golden rules for Industrial IoT solutions
Learn some of the best practices for keeping your IIoT infrastructure secure using AWS’s multilayered security approach and comprehensive security services and features.
Build an AWS IoT Well-Architected environment with the IoT Lens
There are an estimated 31 billion IoT devices in 2020, and this is expected to increase to 75 billion by 2025 according to Security Today. You may be starting on your IoT journey or have hundreds of thousands of devices connected and want to improve your architecture and reduce your cost. To guide you through […]
AWS IoT Device Defender Announces ML Detect GA
Today, AWS announced the general availability of AWS IoT Device Defender Machine Learning Detect and Mitigation (ML Detect), a new feature that automatically detects IoT device-level operational and security anomalies based on learnings from past device data. Customers can already use AWS IoT Device Defender’s Rules Detect feature to manually set static alarms. ML Detect […]
Unlock the value of embedded security IP to build secure IoT products at scale
Introduction IoT product development crosses several domains of expertise from embedded design to communication protocols and cloud computing. Because of this complexity “end-to-end” or “edge-to-cloud” IoT security is becoming a challenging concept in the industry. Edge in many cases refers to the device as a single element in the edge-to-cloud chain. But the device must […]
AWS IoT Named “Best Consumer IoT Solution” at 2020 IoT World Awards
At AWS, we build technology to help customers and partners like Bose, Vizio, LG, British Gas Centrica Connected Home, Ayla, NXP, and more solve real world problems and unlock possibilities to create better business outcomes and new consumer experiences. Yesterday, IoT World named AWS IoT the “Best Consumer IoT Solution” for 2020. We are grateful to […]
Announcing Mitigation Actions for AWS IoT Device Defender
There’s a new way for you to act on information discovered by AWS IoT Device Defender audits. Now you can create mitigation actions for audit results that automate a response to alerts from an audit. AWS IoT Device Defender customers often say that it’s invaluable for how AWS gives them visibility into potential malicious device […]
Your guide to AWS IoT at re:Inforce 2019
The first-ever re:Inforce is almost here! As you plan your agenda, we don’t want you to miss any IoT sessions. These sessions will help you better understand the best practices and technology to prepare for, detect, contain, eradicate, and respond to potential threats to your IoT devices, connections, and data. To protect users, devices, and […]