AWS IoT Device Defender

Security management across your IoT devices and fleets

Use natural language questions and simplye keywords to get the answers you are looking for.

Customize your intelligent search application by making use of Kendra's capability to understand domain-specific language across 14 different industries or add specific business vocabulary. 

Amazon Kendra uses Machine Learning to continuously optimize search results based on end-user search patterns and feedback.

Find the most-up-to-date content across all your content repositories using a secure, single search interface.

Keeping Connected Device Secure (2:00)
AWS IoT Device Defender
Learn how to use AWS IoT Device Defender to manage the security of your IoT fleet. Get an overview of the key capabilities, such as auditing IoT configurations and continuously monitoring IoT devices.
AWS IoT Device Defender
Learn how to use AWS IoT Device Defender to manage the security of your IoT fleet. Get an overview of the key capabilities, such as auditing IoT configurations and continuously monitoring IoT devices.

How it works

AWS IoT Device Defender makes it easy to audit configurations, authenticate devices, detect anomalies, and receive alerts to help secure your IoT device fleet.
Diagram showing Device Defender connected to AWS IoT Core and AWS IoT Device Management providing alerts and security management across devices.
 Click to enlarge

Use cases

Automate security assessments


Implement security controls, such as authentication, authorization, and continual auditing, with various levels of strictness to comply with security best practices and monitor devices for any anomalies.

Send alarms to your preferred AWS interface

Send alarms to the AWS IoT console, Amazon CloudWatch, Amazon Simple Notification Service (SNS), and AWS IoT Device Management, and take mitigation actions such as pushing security fixes.

Identify and evaluate attack vectors


Detect the use of insecure network services and protocols with known security weaknesses, and plan the appropriate remediation to prevent unauthorized device access or data disclosure.

Analyze historical device behavior for anomalies

Use ML models to analyze historical device data. For example, you can continuously ingest and evaluate message size data, which can point to issues such as credential abuse.

How to get started

Sign into the console

Access the AWS IoT Device Defender console.

Sign in »

Learn how to use AWS IoT Device Defender

Take the online training course.

Start training »

Want to learn more?

Explore AWS IoT Device Defender documentation.

Explore more »

Explore more of AWS