The Internet of Things on AWS – Official Blog

Introducing TLS 1.3 support in AWS IoT Core

Introduction We’re very pleased to announce that AWS IoT Core now supports Transport Layer Security (TLS) version 1.3 amongst its transport security options. TLS 1.3 offers customers enhanced security and performance as compared to TLS 1.2. Customers can configure the TLS version for their default Amazon Trust Services (ATS) data plane endpoint and for their […]

Using MicroPython to get started with AWS IoT Core

Introduction Customers ask how they can get started with AWS IoT using the devices and languages they are familiar with. To help address this need, AWS has published tutorials such as connecting a Raspberry Pi and creating a virtual device with Amazon EC2 in the AWS IoT Core Developer Guide. This blog walks you through […]

Patterns for building IoT based asset tracking solutions with AWS IoT Core Device Location

Introduction Businesses are recognizing the potential of location based systems, which gives them the ability to track and manage their assets, improving operations. By having a robust asset tracking system in place, organizations gain the capability to capture real-time insights and make informed business decisions. Some common Internet of Things (IoT) use cases for AWS […]

Optimize image classification on AWS IoT Greengrass using ONNX Runtime

Introduction Performing machine learning inference on edge devices using models trained in the cloud has become a popular use case in Internet of Things (IoT) as it brings the benefits of low latency, scalability, and cost savings. When deploying models to edge devices with limited compute and memory, developers have the challenge to manually tune […]

Protecting Linux-based IoT devices against unintended USB access

Introduction The Internet of Things (IoT) industry continues to grow at an aggressive pace. As the number of connected devices ramps up, managing security of these devices at scale can be challenging. One of the potential risks that IoT devices face is unintended USB access, which can occur when an unauthorized connection is made through […]

Deploying and managing an IoT workload on AWS

Introduction When implementing an Internet of Things (IoT) workload, companies are faced with multiple options when it comes to choosing a platform. From building it entirely from scratch, including your own device hardware, all the way to purchasing preconfigured hardware and just connecting to a completely Software as a service (SaaS) IoT platform. The goal […]

Secure IIoT secondary sensing using AWS Snowcone and CloudRail

Introduction One of the major barriers to Industrial IoT (IIoT) adoption is integrating modern IIoT solutions in brownfield environments with legacy components and systems. These legacy industrial components and systems could be 20, 30, 40 years old and are less capable of supporting modern security standards. Physically connecting legacy industrial systems to the cloud can be […]

Ingest industrial data at scale with AWS IoT SiteWise Edge on Microsoft Windows Server

Introduction Industrial customers in manufacturing, oil and gas, energy, and utilities industries commonly use Windows-based industrial devices and infrastructure. The recent release of AWS IoT SiteWise Edge for Windows, enables these customers to rapidly deploy and connect AWS IoT industrial facilities to AWS. Customers will be able to install AWS IoT SiteWise Edge natively on […]

Introducing the latest AWS Well- Architected IoT Lens

Introduction  We are pleased to introduce the latest version of AWS Well-Architected IoT Lens. IoT projects can be complex due to a combination of many factors, including devices, software, use case scenarios, environments, processing patterns, network connectivity technologies, communication protocols, security issues, technical risks, compliance requirements and standards. The AWS Well-Architected IoT Lens provides simple […]

Guidance on using ISA/IEC 62443 for IIoT projects

Introduction With the increasing proliferation of Industrial Internet of Things (IIoT) systems and cloud services for innovation and digital transformation, government agencies and industrial customers are faced with protecting an expanding attack surface. The ISA/IEC 62443 series of standards were written before IIoT technologies were common but provide a strong basis for securing these environments. […]