3 – Manage user access rights for IoT devices - IoT Lens Checklist

3 – Manage user access rights for IoT devices

How do you authenticate and authorize user access to your IoT applications? By requiring users to be authenticated and authorized, you can reduce the risk of misuse or downtime of your IoT devices.

Follow the best practices and check if your workload is well-architected.

ID Priority Best Practice
BP 3.1 Required Implement authentication and authorization for users accessing IoT resources
BP 3.2 Highly Recommended Decouple access to your IoT infrastructure from your IoT applications

For more details, see the following links and information.