The Internet of Things on AWS – Official Blog
Category: AWS IoT Core
Use AWS IoT Device Defender and Splunk to monitor the security posture of your IoT application
With the growing adoption of Internet of Things (IoT) applications in regulated industries, such as healthcare, hardening IoT security devices has become a requirement. In addition to ensuring that backend systems are resilient, organizations increasingly invest effort to secure devices outside the traditional enterprise perimeter with zero trust principles. For example, fleet operators for connected […]
Use location data with AWS IoT Device Management to monitor and manage your IoT fleet
AWS IoT Device Management’s location indexing and geoquery feature allows you to search for devices based on their last reported location. You can list devices that are located within a specific geographic area, perform a proximity search relative to a reference location, implement targeted over-the-air (OTA) updates, derive location-specific device performance insights, and identify devices that are no longer in a desired geographic boundary. In this blog, you will learn how to get started with indexing location data and using geoqueries to support your day-to-day IoT fleet management operations.
AWS IoT Core now supports private certificate authorities with fleet provisioning
Introduction Today, AWS IoT Core announces the general availability of self-managed client certificate signing for AWS IoT Core fleet provisioning. The new self-managed certificate signing capability allows you to integrate with an external certificate authority (CA), your own public key infrastructure (PKI), or popular CA services such as AWS Private CA, to sign certificate signing […]
Device onboarding to AWS IoT using Virtual Private Cloud endpoints
Introduction If you operate secure private networks—such as an assembly line’s operational technology (OT) network at a factory or government agency—and intend to connect your devices to AWS, then you need to use X.509 client certificates for authenticating requests to AWS services—all while staying within the Virtual Private Cloud (VPC). In this post, we will demonstrate how […]
Securely sending industrial data to AWS IoT services using unidirectional gateways
Introduction Critical infrastructure customers are challenged to make industrial networks more accessible without significantly increasing cybersecurity risks. This is due in part to the common practice of using Industrial IoT (IIoT) and cloud technologies to analyze large volumes of industrial data to improve operational efficiencies. To be successful, this practice requires a balance between advancing […]
Common architecture patterns to securely connect IoT devices to AWS using private networks
Introduction Increasingly, business leaders are adopting Internet of Things (IoT) solutions to drive revenue growth, streamline operations, and reduce costs. Managing security and safety considerations while connecting your assets to the cloud, whether they’re industrial machines or autonomous vehicles, can be challenging. In the Ten security golden rules for Industrial IoT (IIoT) Solutions, AWS recommends establishing secure […]
Streamlining agriculture operations with serverless anomaly detection using AWS IoT
Introduction Honeybees live in swarms of tens of thousands, gathering nectar. In this process, they carry pollen from one flowering plant to another, pollinating them. ” Close to 75 percent of the world’s crops producing fruits and seeds for human use depend, at least in part, on pollinators[1]. ” As well as being one of nature’s key pollinators, bees transform […]
How to use the new metric export capability of AWS IoT Device Defender
The new metric export feature of AWS IoT Device Defender provides a convenient and cost-effective way for you to export the device metrics from AWS IoT Device Defender to your data lake. With metric export capability, you can now export metrics with a simple configuration change without needing to make any changes to your device firmware. This blog gives an overview of how to configure this capability for new as well as existing workloads.
Ten security golden rules for connected mobility solutions
Introduction Connected mobility solutions are driving changes in the automotive industry. With remote commands, sensors, cameras, artificial intelligence, and 5G mobile networks, vehicles have become increasingly smart and connected. While connected mobility solutions deliver significant customer value, they also introduce new risks to security, safety, and privacy that must be properly managed. Automakers need to […]
How to build a scalable, multi-tenant IoT SaaS platform on AWS using a multi-account strategy
When you set out to build an IoT SaaS platform where your customer, not you, determines how their IoT devices interact with the services, you will quickly understand that no single cloud architecture can be optimized for all scenarios. This blog post introduces an implementation strategy for building multi-tenant IoT SaaS platforms based on real […]