The Internet of Things on AWS – Official Blog

Tag: AWS IoT best practices

Detect Cryptocurrency Mining Threats on Edge Devices using AWS IoT

Introduction Machine learning (ML) at the edge requires powerful edge requires powerful edge devices with a unique set of requirements. The availability, safety, and security requirements for the edge differ from cloud since they are located at the customer site, outside the data center, and interface directly with operational technology (OT) and the internet. Since […]

Learn how to secure your IIoT solutions with AWS IIoT security workshop

Introduction Industrial digital transformation is driving changes to the Operational Technology (OT) landscape, making it more connected to the internet and IT systems and solutions. With OT/IT convergence, OT environments are leveraging more IT solutions to improve productivity and efficiency of production operations. Industrial customers can use AWS edge and cloud services to securely access […]

Automate global device provisioning with AWS IoT Core and Amazon Route 53

Introduction Use AWS IoT Core together with Amazon Route 53 to choose an AWS Region based on geo location or latency and register your devices automatically when they connect for the first time to AWS IoT Core. Time to read 10 minutes Learning level 300 Services used AWS IoT Core,Amazon Route53, Amazon Certificate Manager Private […]

Simplify multi-account device provisioning and certificate authority registration when using AWS IoT Core

Customers often manage multiple AWS accounts to separate their development, staging, and production environments. When deploying IoT workloads on AWS IoT Core, customers usually use unique X.509 certificates for identifying devices and certificate authorities (CAs) for validating the signature of device certificates during provisioning. In this blog, we will demonstrate how to use the newly […]

Automating workflows for AWS IoT Greengrass V2 components

Introduction AWS IoT Greengrass V2 Development Kit Command-Line Interface (GDK CLI) was announced at AWS re:Invent 2021. With GDK CLI you can easily create AWS IoT Greengrass V2 components, flexibly define recipes, and publish these components to AWS IoT Greengrass V2. However, every time there is a change to the AWS Greengrass V2 component recipe, […]

Implement security monitoring across OT, IIoT and cloud with AWS Security Hub

Introduction Industrial digital transformation can increase competitiveness and optimize processes and profitability through the use of big data, IoT, machine-to-machine communication, and machine learning. Continuous digitalization and progressive interconnectivity of the production environment is important to capturing value from industrial IoT (IIoT) solutions. While this new and expanding “physical meets digital” connectivity enables great rewards, […]

Assessing OT and IIoT cybersecurity risk

This blog is co-authored by Ryan Dsouza, AWS and John Cusimano, Deloitte  Introduction Innovative and forward-looking oil and gas, electrical generation and distribution, aviation, maritime, rail, utilities, and manufacturing companies who use Operational Technology (OT) to run their businesses are adopting the cloud in many forms as a result of their digital transformation initiatives. Data […]

7 patterns for IoT data ingestion and visualization- How to decide what works best for your use case

Whether you are just starting with your Internet of Things (IoT) journey, or already have millions of connected IoT devices, you might be looking for ways to maximize the value extracted from your IoT data. IoT devices data can contain a wealth of information within its reported telemetry data, metadata, state, and commands and responses. […]

How to manage IoT device certificate rotation using AWS IoT

Introduction The Internet of Things (IoT) is transforming business operations and customer experiences across a variety of industries. This unlimited opportunity enables business transformation, but if not implemented correctly, it also brings security, risk, and privacy concerns, compromising your data and brand. In industrial facilities, OT (Operational Technology) environments are leveraging more IT solutions to improve […]

How to detect anomalies in device metrics and improve your security posture using AWS IoT Device Defender custom metrics

Introduction IoT applications and devices can be diverse and are used across industries such as utilities, agriculture, manufacturing, mining, and consumer electronics. With the exponential growth of IoT devices and the increasing threat landscape, it also means that IoT security needs to be accounted for and designed into the solution from the ground up. AWS […]