Real-Time IoT Device Monitoring with Kinesis Data Analytics
Real-Time IoT Device Monitoring with Kinesis Data Analytics

The AWS Documentation website is getting a new look!
Try it now and let us know what you think. Switch to the new look >>

You can return to the original look by selecting English in the language selector above.


When you build systems on AWS infrastructure, security responsibilities are shared between you and AWS. This shared model can reduce your operational burden as AWS operates, manages, and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the services operate. For more information about security on AWS, visit the AWS Security Center.


By default, the Amazon Simple Storage Service (Amazon S3) buckets this solution creates are encrypted. The Amazon Kinesis Data Firehose delivery streams are not encrypted. For end-to-end encryption, we recommend restricting access to the solution’s delivery streams. For more information, see Controlling Access with Amazon Kinesis Data Firehose.

Amazon CloudFront

This solution deploys a static website hosted in an Amazon S3 bucket. To help reduce latency and improve security, this solution includes an Amazon CloudFront distribution with an origin access identity, which is a special CloudFront user that helps restrict access to the solution’s website bucket contents. For more information, see Restricting Access to Amazon S3 Content by Using an Origin Access Identity.