Security - AWS Connected Vehicle Solution


When you build systems on AWS infrastructure, security responsibilities are shared between you and AWS. This shared model can reduce your operational burden as AWS operates, manages, and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the services operate. For more information about security on AWS, visit the AWS Security Center.

IAM Roles

When you configure an existing application to communicate with the connected vehicle solution, you must specify which data the application can access and process. The connected vehicle solution automatically creates a custom AWS Identity and Access Management role for the application that permits it to get and decrypt the data.


AWS IoT provides mutual authentication and encryption at all points between the connected device and the AWS IoT Device Gateway so that data is never exchanged without proven identity. AWS IoT supports Signature Version 4 and X.509 certificate based authentication. With AWS IoT, you can use AWS IoT generated certificates as well as those signed by your preferred Certificate Authority (CA).