Security - Real-Time IoT Device Monitoring with Kinesis Data Analytics


When you build systems on AWS infrastructure, security responsibilities are shared between you and AWS. This shared model can reduce your operational burden as AWS operates, manages, and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the services operate. For more information about security on AWS, visit the AWS Security Center.


By default, the Amazon Simple Storage Service (Amazon S3) buckets this solution creates are encrypted. The Amazon Kinesis Data Firehose delivery streams are not encrypted. For end-to-end encryption, we recommend restricting access to the solution’s delivery streams. For more information, see Controlling Access with Amazon Kinesis Data Firehose.

Amazon CloudFront

This solution deploys a static website hosted in an Amazon S3 bucket. To help reduce latency and improve security, this solution includes an Amazon CloudFront distribution with an origin access identity, which is a special CloudFront user that helps restrict access to the solution’s website bucket contents. For more information, see Restricting Access to Amazon S3 Content by Using an Origin Access Identity.