Audit the security posture of IoT resources across your device fleet to easily identify gaps and vulnerabilities.
Use machine learning (ML) models or define your own device behaviors to monitor traffic from a malicious IP or a spike in connection attempts.
Get security alerts when an audit fails or behavior anomalies are detected. Quickly take actions to minimize operational risk.
Easily mitigate security issues through built-in actions such as updating a device certificate, quarantining a group of devices, or replacing default policies.
How it works
Automate security assessments
Implement security controls, such as authentication, authorization, and continual auditing, with various levels of strictness to comply with security best practices and monitor devices for any anomalies.
Send alarms to your preferred AWS interface
Send alarms to the AWS IoT console, Amazon CloudWatch, Amazon Simple Notification Service (SNS), and AWS IoT Device Management, and take mitigation actions such as pushing security fixes.
Identify and evaluate attack vectors
Detect the use of insecure network services and protocols with known security weaknesses, and plan the appropriate remediation to prevent unauthorized device access or data disclosure.
Analyze historical device behavior for anomalies
Use ML models to analyze historical device data. For example, you can continuously ingest and evaluate message size data, which can point to issues such as credential abuse.