The Internet of Things on AWS – Official Blog

Category: AWS IoT Device Defender

PLM Hero Image

Navigating IoT Product Lifecycle Management with AWS IoT

Introduction As our world becomes increasingly interconnected, the Internet of Things (IoT) is becoming an unavoidable part of our daily lives. IoT devices, ranging from smart thermostats in our homes to sophisticated sensors in industrial settings, are everywhere. However, the effective management of these devices throughout their lifecycle presents a significant challenge. AWS IoT services, […]

How to get started with the new disconnected duration metric in AWS IoT Device Defender

Introduction The new disconnected duration metric in AWS IoT Device Defender now provides AWS IoT Device Defender Detect customers the ability to monitor Internet of Things (IoT) device connectivity status and duration of disconnection. Until now, customers had to rely on custom self-managed solutions, using AWS Lambda or Amazon CloudWatch, and Connect/Disconnect event messages from […]

Securing modern Connected Vehicle platforms with AWS IoT

AWS is excited to announce new and updated architectural guidance and design patterns for securing modern Connected Vehicle platforms with AWS IoT. You can find updated guidance for modernization in the complementary blog, Building and Modernizing Connected Vehicle Platforms with AWS IoT. Connected Vehicle platforms provide connectivity to cloud resources, enabling the automotive industry and […]

Deploying and managing an IoT workload on AWS

Introduction When implementing an Internet of Things (IoT) workload, companies are faced with multiple options when it comes to choosing a platform. From building it entirely from scratch, including your own device hardware, all the way to purchasing preconfigured hardware and just connecting to a completely Software as a service (SaaS) IoT platform. The goal […]

Secure IIoT secondary sensing using AWS Snowcone and CloudRail

Introduction One of the major barriers to Industrial IoT (IIoT) adoption is integrating modern IIoT solutions in brownfield environments with legacy components and systems. These legacy industrial components and systems could be 20, 30, 40 years old and are less capable of supporting modern security standards. Physically connecting legacy industrial systems to the cloud can be […]

Introducing the latest AWS Well- Architected IoT Lens

Introduction  We are pleased to introduce the latest version of AWS Well-Architected IoT Lens. IoT projects can be complex due to a combination of many factors, including devices, software, use case scenarios, environments, processing patterns, network connectivity technologies, communication protocols, security issues, technical risks, compliance requirements and standards. The AWS Well-Architected IoT Lens provides simple […]

Guidance on using ISA/IEC 62443 for IIoT projects

Introduction With the increasing proliferation of Industrial Internet of Things (IIoT) systems and cloud services for innovation and digital transformation, government agencies and industrial customers are faced with protecting an expanding attack surface. The ISA/IEC 62443 series of standards were written before IIoT technologies were common but provide a strong basis for securing these environments. […]

Identify misconfigured IoT policies using AWS IoT Device Defender

Introduction We are excited to announce a new AWS IoT Device Defender audit feature to identify potential misconfigurations when using wild cards in Internet of Things (IoT) policies. AWS IoT Device Defender is a fully managed IoT security service that enables you to audit and monitor your IoT device fleet and secure your IoT configurations […]

Identifying IoT device certificates with a revoked intermediate CA using AWS IoT Device Defender

Introduction Dynamically verifiable device identity is a foundational component of a Zero Trust Architecture (ZTA). Ongoing dynamic evaluation of identity and trust requires complete and timely visibility into relevant components of that identity. Active device certificates issued by a revoked intermediate Certificate Authority (CA) can pose a security threat due to the intermediate CA being […]

Improve your security posture with AWS IoT Device Defender direct integration with AWS Security Hub

Introduction We are excited to announce that AWS IoT Device Defender is now integrated with AWS Security Hub. This integration allows you to ingest alarms and their attributes from audit and detect features in one central location, without custom coding. This will help you offload or reduce complexity of managing disparate workflows from multiple security […]