8. Deploy security auditing and monitoring mechanisms across your IoT environment and relevant IT systems. - Securing Internet of Things (IoT) with AWS

This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.

8. Deploy security auditing and monitoring mechanisms across your IoT environment and relevant IT systems.

As we’ve discussed, it’s important to ensure the proper configuration of IoT devices when they are put into production and that they are updated. But, it’s also important to monitor their behavior and security posture on an ongoing basis.

  • Deploy auditing and monitoring mechanisms to continuously collect and report activity metrics and logs.

  • Monitor on-device and related off-device activities such as network traffic and entry points, process implementation, and system interactions for any unexpected behavior.

  • Continuously check that your security controls and systems are intact by explicitly testing them.

  • Implement a monitoring solution to create a traffic baseline, and monitor anomalies and adherence to the baseline.

  • Collect security logs and analyze them in real time using automated tooling.

  • Monitor availability of your IoT devices in real time, where technically feasible.

Supporting AWS resources

AWS provides the following capabilities and services to help you monitor your security at varying levels: