The Internet of Things on AWS – Official Blog

Category: Best Practices

Securing modern Connected Vehicle platforms with AWS IoT

AWS is excited to announce new and updated architectural guidance and design patterns for securing modern Connected Vehicle platforms with AWS IoT. You can find updated guidance for modernization in the complementary blog, Building and Modernizing Connected Vehicle Platforms with AWS IoT. Connected Vehicle platforms provide connectivity to cloud resources, enabling the automotive industry and […]

Building and Modernizing Connected Vehicle platforms with AWS IoT

Introduction AWS is excited to announce new and updated architectural guidance and design patterns for modernizing and building Connected Vehicle platforms with AWS IoT. Today, automotive manufacturers (OEMs) are differentiating their portfolios, not just by the hardware and specs they offer, but also by the innovative, software-driven connectivity features they provide. With vehicle connectivity and […]

How to manage AWS IoT Greengrass core device certificates

Introduction We’re very pleased to introduce the Certificate Rotator component for AWS IoT Greengrass, a new component in the Greengrass Software Catalog. AWS IoT Greengrass brings the AWS cloud closer to edge devices to support applications that demand local data processing and low latency. The growing number of edge devices in consumer, enterprise, and industrial […]

Patterns for building IoT based asset tracking solutions with AWS IoT Core Device Location

Introduction Businesses are recognizing the potential of location based systems, which gives them the ability to track and manage their assets, improving operations. By having a robust asset tracking system in place, organizations gain the capability to capture real-time insights and make informed business decisions. Some common Internet of Things (IoT) use cases for AWS […]

Secure IIoT secondary sensing using AWS Snowcone and CloudRail

Introduction One of the major barriers to Industrial IoT (IIoT) adoption is integrating modern IIoT solutions in brownfield environments with legacy components and systems. These legacy industrial components and systems could be 20, 30, 40 years old and are less capable of supporting modern security standards. Physically connecting legacy industrial systems to the cloud can be […]

Guidance on using ISA/IEC 62443 for IIoT projects

Introduction With the increasing proliferation of Industrial Internet of Things (IIoT) systems and cloud services for innovation and digital transformation, government agencies and industrial customers are faced with protecting an expanding attack surface. The ISA/IEC 62443 series of standards were written before IIoT technologies were common but provide a strong basis for securing these environments. […]

How to replicate AWS IoT SiteWise resources across environments

Introduction As you scale your AWS IoT SiteWise applications and move them into production, you may consider adopting common CI/CD methodologies that separate development and QA environments from production environments. This separation allows you to automate the deployment of these applications through deployment pipelines. You also may have multiple business units and/or industrial sites with […]

Identifying IoT device certificates with a revoked intermediate CA using AWS IoT Device Defender

Introduction Dynamically verifiable device identity is a foundational component of a Zero Trust Architecture (ZTA). Ongoing dynamic evaluation of identity and trust requires complete and timely visibility into relevant components of that identity. Active device certificates issued by a revoked intermediate Certificate Authority (CA) can pose a security threat due to the intermediate CA being […]

Enhancing IoT device security using Hardware Security Modules and AWS IoT Device SDK

Introduction Security of operations and security of data are among the top priorities of customers dealing with sensitive information or operating in highly regulated markets. Internet of Things (IoT) customers have the additional challenge of enabling high security standards for IoT communications to their cloud platforms. Data encryption with asymmetric algorithms and cryptographic keys are […]

Training the Amazon SageMaker object detection model and running it on AWS IoT Greengrass – Part 3 of 3: Deploying to the edge

Training the Amazon SageMaker object detection model and running it on AWS IoT Greengrass – Part 3 of 3: Deploying to the edge

Post by Angela Wang and Tanner McRae, Senior Engineers on the AWS Solutions Architecture R&D and Innovation team This post is the third in a series on how to build and deploy a custom object detection model to the edge using Amazon SageMaker and AWS IoT Greengrass. In the previous 2 parts of the series, we walked […]