1 Answer
- Newest
- Most votes
- Most comments
1
Hi sdtslmn. All communication is encrypted using TLS, no matter which device communication protocol you use. There are several client authentication options, but new devices would most commonly use X.509 certificates, with IoT policies (rather than IAM policies) for authorization).
In terms of best practices:
- https://docs.aws.amazon.com/iot/latest/developerguide/iot-security.html
- https://docs.aws.amazon.com/iot/latest/developerguide/security-best-practices.html
- https://docs.aws.amazon.com/wellarchitected/latest/iot-lens/sec-best-practices.html
- https://docs.aws.amazon.com/whitepapers/latest/device-manufacturing-provisioning/device-manufacturing-provisioning.html
Relevant content
- asked 10 months ago
- asked a year ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 3 months ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 9 months ago