The Internet of Things on AWS – Official Blog

Tag: IoT Security

Chain of trust in a device starting from Applications and flowing down through Operating System, Hypervisor, Firmware and finally ending at the Hardware which forms the root of trust.

Using a Trusted Platform Module for endpoint device security in AWS IoT Greengrass

Co-authored by Aniruddh Chitre, AWS Solutions Architect This post demonstrates how AWS IoT Greengrass can be integrated with a Trusted Platform Module (TPM) to provide hardware-based endpoint device security. This integration ensures the private key used to establish device identity can be securely stored in tamper-proof hardware devices to prevent it from being taken out […]

Support for Secure Elements in FreeRTOS

Secure elements represent a category of devices intended to enhance security in connected devices. For microcontroller (MCU)–based devices, secure elements provide tamper-resistant storage of private keys and certificates, and offloading of cryptographic functions from the host microcontroller. You can now leverage two new qualifications that include support for secure elements within Amazon FreeRTOS.  These qualifications […]

Securing Amazon FreeRTOS devices at scale with Infineon OPTIGA Trust X

Post by David Walters, Senior Partner Specialist Solutions Architect, IoT at Amazon Web Services, and Artem Yushev, Applications Engineer, Embedded Security Systems, at Infineon. One of the most significant challenges for device manufacturers developing new microcontroller-based IoT devices is how to manufacture and provision those devices at scale without compromising security. In this blog post, we […]

AWS re:Inforce June 25-26 2019

Your guide to AWS IoT at re:Inforce 2019

The first-ever re:Inforce is almost here! As you plan your agenda, we don’t want you to miss any IoT sessions. These sessions will help you better understand the best practices and technology to prepare for, detect, contain, eradicate, and respond to potential threats to your IoT devices, connections, and data. To protect users, devices, and […]

Automating Security Remediation Using AWS IoT Device Defender

An IoT solution requires managing a large number of devices, usually hundreds of thousands or millions. When you start to work at a large scale, you need to keep your fleet protected by continuously checking if it is following security best practices. It can be challenging for organizations to audit all devices and automatically remediate […]

AWS IoT Greengrass now enables simplified deployments, enhanced security, and greater flexibility

AWS IoT Greengrass allows you to bring local compute, messaging, data caching, sync, and ML inference capabilities to edge devices. Our newest release introduces features that simplify the deployment of Lambda functions to Greengrass, provide more flexibility so you can deploy Greengrass to new environments, and add easy-to-use security capabilities. Starting today, you can use […]

Detect anomalies on connected devices using AWS IoT Device Defender

We often see security breaches depicted in media and popular culture. In the HBO series Silicon Valley, a compromised refrigerator is used by hacker Gilfoyle to run a malicious piece of software. The reality of connected devices isn’t very different from this fictitious scenario. The compromised refrigerator can send consumer data to unauthorized endpoints. Connected […]

Just-in-Time Registration of Device Certificates on AWS IoT

In an earlier blog post about certificates, we discussed how use-your-own-certificate support in AWS IoT lets customers use device certificates signed and issued by their own certificate authority (CA) to connect and authenticate with AWS IoT. This is an alternative to using certificates generated by AWS IoT. Using your own certificate with AWS IoT is […]

Elliptic Curve Cryptography and Forward Secrecy Support in AWS IoT

Introduction AWS IoT now supports Elliptic Curve Cryptography (ECC) for devices connecting to AWS IoT using TLS. You can now request an EC-based certificate for your device from AWS IoT or register your device using an existing EC-based certificate in order to establish a TLS connection. You can also connect your devices to AWS IoT […]