The Internet of Things on AWS – Official Blog

Category: Internet of Things

Ingesting industrial media to Amazon Kinesis Video Streams using AWS IoT Greengrass V2 components

Introduction Organizations install hundreds of Internet Protocol (IP) cameras to increase security by surveilling indoor and outdoor spaces. This is a common need for manufacturing plant floors across industries such as automotive, commercial, Oil & Gas, public safety, and agri-tech. Companies connect cameras to the cloud to create a centralized view of their siloed data […]

How to replicate AWS IoT SiteWise resources across environments

Introduction As you scale your AWS IoT SiteWise applications and move them into production, you may consider adopting common CI/CD methodologies that separate development and QA environments from production environments. This separation allows you to automate the deployment of these applications through deployment pipelines. You also may have multiple business units and/or industrial sites with […]

Enabling device maintenance across multiple time zones using AWS IoT Jobs

Introduction A benefit of Internet of things (IoT) technology is the ability to connect your devices to the cloud and easily access them from around the world. While this benefit has unlocked many opportunities, it has also has created a major challenge of keeping devices updated. Managing and maintaining a fleet of IoT devices spread […]

Convert Messages from IoT Devices to Voice Commands Using AWS IoT Core and Amazon Polly

AWS IoT Core is a fully managed service that lets you connect billions of IoT devices and route trillions of messages to AWS services without managing infrastructure. One of the key features of AWS IoT Core is Rules Engine. With Rules Engine, you can send data from your IoT devices to other services in AWS. […]

Route messages across multiple accounts with AWS IoT Core and Amazon SQS

Introduction In this blog, we explain how to route AWS IoT Core messages from one or more ingestion accounts to Amazon Simple Queue Service (Amazon SQS) in a data account. It is a common pattern to have IoT telemetry ingested into one account and then require it to be shipped to another account for further […]

Identify misconfigured IoT policies using AWS IoT Device Defender

Introduction We are excited to announce a new AWS IoT Device Defender audit feature to identify potential misconfigurations when using wild cards in Internet of Things (IoT) policies. AWS IoT Device Defender is a fully managed IoT security service that enables you to audit and monitor your IoT device fleet and secure your IoT configurations […]

Schedule remote operations using AWS IoT Device Management Jobs

Introduction Once Internet of Things (IoT) devices are deployed in the field, on-site intervention can be challenging, expensive, and may not be feasible due to technical and logistical constraints. The ability to perform remote updates on your IoT device software is an important factor that improves your IoT application’s lifespan and operational resilience, provisions the […]

Identifying IoT device certificates with a revoked intermediate CA using AWS IoT Device Defender

Introduction Dynamically verifiable device identity is a foundational component of a Zero Trust Architecture (ZTA). Ongoing dynamic evaluation of identity and trust requires complete and timely visibility into relevant components of that identity. Active device certificates issued by a revoked intermediate Certificate Authority (CA) can pose a security threat due to the intermediate CA being […]

Tracking Assets using AWS IoT Core and Amazon Location Service

In this post, we explore the recently launched “location action” feature that connects AWS IoT Core with Amazon Location Service trackers, creating a scalable, simple, and cost effective way to track and store IoT device location updates. Tracking resources and real-world assets is a critical part of any logistics and operations workflow. Companies need a […]

Enhancing IoT device security using Hardware Security Modules and AWS IoT Device SDK

Introduction Security of operations and security of data are among the top priorities of customers dealing with sensitive information or operating in highly regulated markets. Internet of Things (IoT) customers have the additional challenge of enabling high security standards for IoT communications to their cloud platforms. Data encryption with asymmetric algorithms and cryptographic keys are […]