Security best practices for AWS IoT Things Graph - AWS IoT Things Graph

Security best practices for AWS IoT Things Graph

AWS IoT Things Graph provides a number of security features to consider as you develop and implement your own security policies. The following best practices are general guidelines and don't represent a complete security solution. Because these best practices might not be appropriate or sufficient for your environment, treat them as helpful considerations rather than prescriptions.

To learn about security in AWS IoT, see Security best practices in AWS IoT in the AWS IoT Developer Guide.

For information about hardware security in AWS IoT Greengrass, see Hardware security integration in the AWS IoT Greengrass Developer Guide.

Cloud deployments require you to use an IAM role to execute AWS IoT Things Graph flows on your behalf. AWS IoT Greengrass deployments require you to use an IAM role for AWS IoT Greengrass to execute flows. These roles should have policies that allow AWS IoT Things Graph to perform all of the actions in your flow. Make sure that these roles have only the permissions that they need to execute your flows.