The Internet of Things on AWS – Official Blog

Tag: device security

Chain of trust in a device starting from Applications and flowing down through Operating System, Hypervisor, Firmware and finally ending at the Hardware which forms the root of trust.

Using a Trusted Platform Module for endpoint device security in AWS IoT Greengrass

Co-authored by Aniruddh Chitre, AWS Solutions Architect This post demonstrates how AWS IoT Greengrass can be integrated with a Trusted Platform Module (TPM) to provide hardware-based endpoint device security. This integration ensures the private key used to establish device identity can be securely stored in tamper-proof hardware devices to prevent it from being taken out […]

Read More

Support for Secure Elements in FreeRTOS

Secure elements represent a category of devices intended to enhance security in connected devices. For microcontroller (MCU)–based devices, secure elements provide tamper-resistant storage of private keys and certificates, and offloading of cryptographic functions from the host microcontroller. You can now leverage two new qualifications that include support for secure elements within Amazon FreeRTOS.  These qualifications […]

Read More

Securing Amazon FreeRTOS devices at scale with Infineon OPTIGA Trust X

Post by David Walters, Senior Partner Specialist Solutions Architect, IoT at Amazon Web Services, and Artem Yushev, Applications Engineer, Embedded Security Systems, at Infineon. One of the most significant challenges for device manufacturers developing new microcontroller-based IoT devices is how to manufacture and provision those devices at scale without compromising security. In this blog post, we […]

Read More

Announcing Mitigation Actions for AWS IoT Device Defender

There’s a new way for you to act on information discovered by AWS IoT Device Defender audits. Now you can create mitigation actions for audit results that automate a response to alerts from an audit. AWS IoT Device Defender customers often say that it’s invaluable for how AWS gives them visibility into potential malicious device […]

Read More