Security in AWS IoT
Cloud security at AWS is the highest priority. As an AWS customer, you benefit from a data center and network architecture that is built to meet the requirements of the most security-sensitive organizations.
Security is a shared responsibility between AWS and you. The shared responsibility model
-
Security of the cloud – AWS is responsible for protecting the infrastructure that runs AWS services in the AWS Cloud. AWS also provides you with services that you can use securely. Third-party auditors regularly test and verify the effectiveness of our security as part of the AWS compliance programs
. To learn about the compliance programs that apply to AWS IoT, see AWS Services in Scope by Compliance Program . -
Security in the cloud – Your responsibility is determined by the AWS service that you use. You are also responsible for other factors including the sensitivity of your data, your company's requirements, and applicable laws and regulations.
This documentation helps you understand how to apply the shared responsibility model when using AWS IoT. The following topics show you how to configure AWS IoT to meet your security and compliance objectives. You also learn how to use other AWS services that help you to monitor and secure your AWS IoT resources.
Topics
- AWS IoT security
- Authentication
- Authorization
- Data protection in AWS IoT Core
- Identity and access management for AWS IoT
- Logging and Monitoring
- Compliance validation for AWS IoT Core
- Resilience in AWS IoT Core
- Using AWS IoT Core with interface VPC endpoints
- Infrastructure security in AWS IoT
- Security monitoring of production fleets or devices with AWS IoT Core
- Security best practices in AWS IoT Core
- AWS training and certification
AWS training and certification
Take the following course to learn about key concepts for AWS IoT security: AWS IoT Security
Primer