The Internet of Things on AWS – Official Blog

Category: Security

Amazon Kinesis Video Streams Privacy and E2E Security Overview

Introduction In a world increasingly driven by Internet of Things (IoT) devices and real-time video streaming, privacy and security has become more critical than ever. Whether used in smart homes, industrial automation, or healthcare, Amazon Kinesis Video Streams offers a fully managed, scalable, and secure platform for streaming live video from devices to the AWS […]

Securing the future of mobility: UNECE WP.29 and AWS IoT for connected vehicle cybersecurity

Introduction As the automotive industry races towards a future of connected and autonomous vehicles, cybersecurity has emerged as a critical concern. With vehicles becoming increasingly reliant on software, sensors, and connectivity, they also become potential targets for cyberattacks. Recognizing this challenge, the United Nations Economic Commission for Europe (UNECE) has introduced the World Forum for […]

How to implement Zero Trust IoT solutions with AWS IoT

“Zero Trust” is an often-misunderstood term, it is not a product but a security model and associated set of architectural principles and patterns. One of the main challenges customers face is determining how Zero Trust principles can be applied to IoT and how to get started with incorporating Zero Trust principles using AWS IoT. In […]

Use AWS IoT Device Defender and Splunk to monitor the security posture of your IoT application

Use AWS IoT Device Defender and Splunk to monitor the security posture of your IoT application

With the growing adoption of Internet of Things (IoT) applications in regulated industries, such as healthcare, hardening IoT security devices has become a requirement. In addition to ensuring that backend systems are resilient, organizations increasingly invest effort to secure devices outside the traditional enterprise perimeter with zero trust principles. For example, fleet operators for connected […]

AWS IoT Core now supports private certificate authorities with fleet provisioning

Introduction Today, AWS IoT Core announces the general availability of self-managed client certificate signing for AWS IoT Core fleet provisioning. The new self-managed certificate signing capability allows you to integrate with an external certificate authority (CA), your own public key infrastructure (PKI), or popular CA services such as AWS Private CA, to sign certificate signing […]

Ten security golden rules for connected mobility solutions

Introduction Connected mobility solutions are driving changes in the automotive industry. With remote commands, sensors, cameras, artificial intelligence, and 5G mobile networks, vehicles have become increasingly smart and connected. While connected mobility solutions deliver significant customer value, they also introduce new risks to security, safety, and privacy that must be properly managed. Automakers need to […]

How to update changing certificate requirements with AWS IoT Core

NOTE: This post covers an important announcement related to renewal of Symantec Server Intermediate Certificate Authority (ICA) and an upcoming switch of AWS IoT Core – control plane endpoints and newly supported AWS IoT Core customer endpoints to TLS1.2 specification. Overview In this post, we discuss upcoming changes to Symantec Server Intermediate Certificate Authority (ICA) […]

Securing modern Connected Vehicle platforms with AWS IoT

AWS is excited to announce new and updated architectural guidance and design patterns for securing modern Connected Vehicle platforms with AWS IoT. You can find updated guidance for modernization in the complementary blog, Building and Modernizing Connected Vehicle Platforms with AWS IoT. Connected Vehicle platforms provide connectivity to cloud resources, enabling the automotive industry and […]

Introducing the latest AWS Well- Architected IoT Lens

Introduction  We are pleased to introduce the latest version of AWS Well-Architected IoT Lens. IoT projects can be complex due to a combination of many factors, including devices, software, use case scenarios, environments, processing patterns, network connectivity technologies, communication protocols, security issues, technical risks, compliance requirements and standards. The AWS Well-Architected IoT Lens provides simple […]

Guidance on using ISA/IEC 62443 for IIoT projects

Introduction With the increasing proliferation of Industrial Internet of Things (IIoT) systems and cloud services for innovation and digital transformation, government agencies and industrial customers are faced with protecting an expanding attack surface. The ISA/IEC 62443 series of standards were written before IIoT technologies were common but provide a strong basis for securing these environments. […]