The Internet of Things on AWS – Official Blog
Category: AWS Security Hub
AWS IoT Services alignment with US Cyber Trust Mark
Introduction In the ever-evolving digital landscape, the increasing number of Internet of Things (IoT) devices opens up new opportunities while highlighting the critical need to address cybersecurity challenges to ensure reliable services, data protection, and sustained growth. In this blog we will dive into the background of the US Cyber Trust Mark—a new program designed […]
How to implement Zero Trust IoT solutions with AWS IoT
“Zero Trust” is an often-misunderstood term, it is not a product but a security model and associated set of architectural principles and patterns. One of the main challenges customers face is determining how Zero Trust principles can be applied to IoT and how to get started with incorporating Zero Trust principles using AWS IoT. In […]
Ten security golden rules for connected mobility solutions
Introduction Connected mobility solutions are driving changes in the automotive industry. With remote commands, sensors, cameras, artificial intelligence, and 5G mobile networks, vehicles have become increasingly smart and connected. While connected mobility solutions deliver significant customer value, they also introduce new risks to security, safety, and privacy that must be properly managed. Automakers need to […]
Securing modern Connected Vehicle platforms with AWS IoT
AWS is excited to announce new and updated architectural guidance and design patterns for securing modern Connected Vehicle platforms with AWS IoT. You can find updated guidance for modernization in the complementary blog, Building and Modernizing Connected Vehicle Platforms with AWS IoT. Connected Vehicle platforms provide connectivity to cloud resources, enabling the automotive industry and […]
Guidance on using ISA/IEC 62443 for IIoT projects
Introduction With the increasing proliferation of Industrial Internet of Things (IIoT) systems and cloud services for innovation and digital transformation, government agencies and industrial customers are faced with protecting an expanding attack surface. The ISA/IEC 62443 series of standards were written before IIoT technologies were common but provide a strong basis for securing these environments. […]
Identifying IoT device certificates with a revoked intermediate CA using AWS IoT Device Defender
Introduction Dynamically verifiable device identity is a foundational component of a Zero Trust Architecture (ZTA). Ongoing dynamic evaluation of identity and trust requires complete and timely visibility into relevant components of that identity. Active device certificates issued by a revoked intermediate Certificate Authority (CA) can pose a security threat due to the intermediate CA being […]
Improve your security posture with AWS IoT Device Defender direct integration with AWS Security Hub
Introduction We are excited to announce that AWS IoT Device Defender is now integrated with AWS Security Hub. This integration allows you to ingest alarms and their attributes from audit and detect features in one central location, without custom coding. This will help you offload or reduce complexity of managing disparate workflows from multiple security […]
Importing AWS IoT Device Defender audit and detect findings into Security Hub
Introduction In this post, you’ll learn how the integration of IoT security findings into AWS Security Hub works, and you can download AWS CloudFormation templates to implement the solution. After you deploy the solution, every AWS IoT Device Defender audit and detect finding will be recorded as a Security Hub finding. The findings within Security […]
Designing a Single Pane of Glass for Securing your Globally Deployed IoT-Workload
Introduction Companies are investing in large-scale Internet of Things (IoT) projects and deploying global scale IoT platform such as Deutsche Bahn or Carrier. Enterprises are looking for a solution that offers a multi-tenant Single Pane of Glass Device Lifecycle Management (DLM) which caters to both IT and OT operations. In this blog we will focus […]
Learn how to secure your IIoT solutions with AWS IIoT security workshop
Introduction Industrial digital transformation is driving changes to the Operational Technology (OT) landscape, making it more connected to the internet and IT systems and solutions. With OT/IT convergence, OT environments are leveraging more IT solutions to improve productivity and efficiency of production operations. Industrial customers can use AWS edge and cloud services to securely access […]