1 - Control the identity and access of the IoT devices - IoT Lens Checklist

1 - Control the identity and access of the IoT devices

How do you associate IoT identities and permissions with your devices? Your application is responsible for managing how your devices authenticate and authorize their interactions. By creating a process that ensures devices have identity-based permissions for accessing the IoT platform, you establish the greatest control for managing device interactions.

Follow the best practices and check if your workload is well-architected.

ID Priority Best Practice
BP 1.1 Required Assign unique identities to each IoT device
BP 1.2 Highly Recommended Assign least privilege access to devices