The Internet of Things on AWS – Official Blog

Tag: IoT Security

This image shows what happens when you Click over to the History tab in the AWS IoT Device Defender console. You can see all the alarm events that occurred over the past 24 hours (you can select additional options from drop down to display up to 30 days. The green line represents alarms cleared and red indicates devices still in alarm. Hovering over the lines and dots, you can see the date, time, and status of the alarms during this timestamp.

AWS IoT Device Defender Announces ML Detect GA

Today, AWS announced the general availability of AWS IoT Device Defender Machine Learning Detect and Mitigation (ML Detect), a new feature that automatically detects IoT device-level operational and security anomalies based on learnings from past device data. Customers can already use AWS IoT Device Defender’s Rules Detect feature to manually set static alarms. ML Detect […]

Read More

Unlock the value of embedded security IP to build secure IoT products at scale

Introduction IoT product development crosses several domains of expertise from embedded design to communication protocols and cloud computing. Because of this complexity “end-to-end” or “edge-to-cloud” IoT security is becoming a challenging concept in the industry. Edge in many cases refers to the device as a single element in the edge-to-cloud chain. But the device must […]

Read More
scaling-authorization-policies-with-aws-iot-core

Scaling authorization policies with AWS IoT Core

Introduction Solutions architects, developers, and system designers building IoT solutions need ways to properly secure data and functions that operate on data across the entire solution landscape. In this post, we describe a few design options for scaling authorization policies focused on multi-user and multi-device use cases with AWS IoT Core. We cover several scenarios, […]

Read More
Improving the management and security of your AWS IoT resources with tagging

Improving the management and security of your AWS IoT resources with tagging

Solution providers operating environments such as smart building, utilities, manufacturing systems, and connected products offer business-to-business services often based on IoT platforms deployed in multitenant deployments. Securely managing those resources by use case, types, locations and by tenants can sometime be hard. Creating hierarchical grouping of things is a common pattern, but it does not […]

Read More
Chain of trust in a device starting from Applications and flowing down through Operating System, Hypervisor, Firmware and finally ending at the Hardware which forms the root of trust.

Using a Trusted Platform Module for endpoint device security in AWS IoT Greengrass

Co-authored by Aniruddh Chitre, AWS Solutions Architect This post demonstrates how AWS IoT Greengrass can be integrated with a Trusted Platform Module (TPM) to provide hardware-based endpoint device security. This integration ensures the private key used to establish device identity can be securely stored in tamper-proof hardware devices to prevent it from being taken out […]

Read More

Support for Secure Elements in FreeRTOS

Secure elements represent a category of devices intended to enhance security in connected devices. For microcontroller (MCU)–based devices, secure elements provide tamper-resistant storage of private keys and certificates, and offloading of cryptographic functions from the host microcontroller. You can now leverage two new qualifications that include support for secure elements within Amazon FreeRTOS.  These qualifications […]

Read More

Securing Amazon FreeRTOS devices at scale with Infineon OPTIGA Trust X

Post by David Walters, Senior Partner Specialist Solutions Architect, IoT at Amazon Web Services, and Artem Yushev, Applications Engineer, Embedded Security Systems, at Infineon. One of the most significant challenges for device manufacturers developing new microcontroller-based IoT devices is how to manufacture and provision those devices at scale without compromising security. In this blog post, we […]

Read More

Ten security golden rules for IoT solutions

The Internet of Things (IoT) solutions help transform your operations and customer experiences across a variety of industries and uses. That unlimited opportunity brings excitement, but it also brings security, risk, and privacy concerns. To protect customers, devices, and companies, every IoT solution should start and end with security.  The best IoT security solution offers […]

Read More
AWS re:Inforce June 25-26 2019

Your guide to AWS IoT at re:Inforce 2019

The first-ever re:Inforce is almost here! As you plan your agenda, we don’t want you to miss any IoT sessions. These sessions will help you better understand the best practices and technology to prepare for, detect, contain, eradicate, and respond to potential threats to your IoT devices, connections, and data. To protect users, devices, and […]

Read More