This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.
Implementing IoT security using AWS services
As noted in the previous sections, IoT implementations can have some
very unique challenges not present in traditional IT deployments.
For example, deploying a consumer IoT device, such as what iRobot
has done using AWS to handle scale and spikes, can introduce a new
classification of threats to be addressed. Industrial deployments of
IoT (IIoT) devices (such as how
SKF
The following are 10 best practices to build a secure IoT deployment.
Best practices
1. Conduct a formal security risk assessment using a common framework
3. Provision IoT devices and systems with unique identities and credentials
4. Define appropriate update mechanisms for software and firmware updates.
7. Secure both the IoT environment and supporting IT environments to the same level of criticality
9. Create incident response playbooks, and build automation as your security response matures