Best Practices for IoT Security in the Cloud

2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Rameez Loladia, Lead SDE AWS IoT security June 21, 2015 Best Practices for IoT Security in the Cloud AWS IoT DEVICE SDK Set of client libraries to connect, authenticate and exchange messages DEVICE GATEWAY Communicate with devices via MQTT ,HTTP and Websockets AUTHENTICATION AUTHORIZATION Secure with mutual authentication and encryption RULES ENGINE Transform messages based on rules and route to AWS Services AWS Services 3P Services DEVICE SHADOW Persistent thing state during intermittent connections APPLICATIONS AWS IoT API DEVICE REGISTRY Identity and Management of your things AWS IoT Security: Authentication and Authorization AUTHENTICATION AUTHORIZATION Secure with mutual authentication and encryption All Things Around Us are Getting Connected All Things Around Us are Getting Connected A Simple Goal “Securely connect billions of devices to AWS so they can interact with applications and other devices” How is IoT Security Different?

Link: Best Practices for IoT Security in the Cloud
via http://www.slideshare.net

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: