The Internet of Things on AWS – Official Blog

Category: Announcements

Announcing AWS IoT FleetWise object storage in Amazon S3

Introduction Today, we are excited to announce that AWS IoT FleetWise now supports object storage in Amazon Simple Storage Service (Amazon S3). This new feature makes it easy and cost-effective for automotive customers to create and manage data pipelines from their vehicles. A customer can now select where vehicle data is persisted in the cloud depending […]

Convert glTF to 3D Tiles for streaming of large models in AWS IoT TwinMaker

Introduction Have you experienced long wait times when loading up a 3D scene in AWS IoT TwinMaker? Perhaps struggling with poor rendering performance when navigating a complex 3D model? There is a way to convert your models into the 3D Tiles standard for efficient streaming in a scene. In this blog you will learn how […]

Introducing the latest AWS Well- Architected IoT Lens

Introduction  We are pleased to introduce the latest version of AWS Well-Architected IoT Lens. IoT projects can be complex due to a combination of many factors, including devices, software, use case scenarios, environments, processing patterns, network connectivity technologies, communication protocols, security issues, technical risks, compliance requirements and standards. The AWS Well-Architected IoT Lens provides simple […]

Identify misconfigured IoT policies using AWS IoT Device Defender

Introduction We are excited to announce a new AWS IoT Device Defender audit feature to identify potential misconfigurations when using wild cards in Internet of Things (IoT) policies. AWS IoT Device Defender is a fully managed IoT security service that enables you to audit and monitor your IoT device fleet and secure your IoT configurations […]

Identifying IoT device certificates with a revoked intermediate CA using AWS IoT Device Defender

Introduction Dynamically verifiable device identity is a foundational component of a Zero Trust Architecture (ZTA). Ongoing dynamic evaluation of identity and trust requires complete and timely visibility into relevant components of that identity. Active device certificates issued by a revoked intermediate Certificate Authority (CA) can pose a security threat due to the intermediate CA being […]

Introducing new MQTTv5 features for AWS IoT Core to help build flexible architecture patterns

Introduction We are excited to announce that AWS IoT Core now supports MQTTv5 features that help enhance communications of large-scale device deployments and innovate device messaging patterns. Customers who already have MQTTv3.1.1 deployments can make use of the new MQTTv5 features as AWS IoT Core provides seamless integration between both versions and supports heterogeneous deployments […]

Improve your security posture with AWS IoT Device Defender direct integration with AWS Security Hub

Introduction We are excited to announce that AWS IoT Device Defender is now integrated with AWS Security Hub. This integration allows you to ingest alarms and their attributes from audit and detect features in one central location, without custom coding. This will help you offload or reduce complexity of managing disparate workflows from multiple security […]

Connect to remote devices using AWS IoT Secure Tunneling

Introduction When devices are deployed behind restricted firewalls at remote sites, you need a way to gain access to those devices for troubleshooting, configuration updates, and other operational tasks. This is where, secure tunneling, a feature of AWS IoT Device Management has been helping customers to do remote tasks. To help elevate customers even further, AWS has […]

Learn how to secure your IIoT solutions with AWS IIoT security workshop

Introduction Industrial digital transformation is driving changes to the Operational Technology (OT) landscape, making it more connected to the internet and IT systems and solutions. With OT/IT convergence, OT environments are leveraging more IT solutions to improve productivity and efficiency of production operations. Industrial customers can use AWS edge and cloud services to securely access […]

Simplify multi-account device provisioning and certificate authority registration when using AWS IoT Core

Customers often manage multiple AWS accounts to separate their development, staging, and production environments. When deploying IoT workloads on AWS IoT Core, customers usually use unique X.509 certificates for identifying devices and certificate authorities (CAs) for validating the signature of device certificates during provisioning. In this blog, we will demonstrate how to use the newly […]