The Internet of Things on AWS – Official Blog

Category: Security, Identity, & Compliance

This image shows how the customer leverages AWS IoT Device Management to securely manage their fleet of connected refrigerators

Connecting home appliances with a smart home solution built on AWS in the AWS China Region

This blog post introduces how the manufacturers of home appliances can use AWS Services to build and maintain their smart home solutions. These solutions are both the platforms that power their connected products as well as the applications consumers use to control those products. This blog post illustrates a real use case from a customer […]

Read More

Unlock the value of embedded security IP to build secure IoT products at scale

Introduction IoT product development crosses several domains of expertise from embedded design to communication protocols and cloud computing. Because of this complexity “end-to-end” or “edge-to-cloud” IoT security is becoming a challenging concept in the industry. Edge in many cases refers to the device as a single element in the edge-to-cloud chain. But the device must […]

Read More

Ten security golden rules for IoT solutions

The Internet of Things (IoT) solutions help transform your operations and customer experiences across a variety of industries and uses. That unlimited opportunity brings excitement, but it also brings security, risk, and privacy concerns. To protect customers, devices, and companies, every IoT solution should start and end with security.  The best IoT security solution offers […]

Read More

Configuring Cognito User Pools to Communicate with AWS IoT Core

AWS IoT Core supports certificate-based mutual authentication, custom authorizers, and Amazon Cognito Identity as way to authenticate requests to the AWS IoT device gateway. Amazon Cognito User Pools was made generally available last year. It allows customers to easily add user sign up and sign in to mobile and web apps. You can use Cognito […]

Read More