1 - Control the identity and access of the IoT devices
How do you associate IoT identities and permissions with your devices? Your application is responsible for managing how your devices authenticate and authorize their interactions. By creating a process that ensures devices have identity-based permissions for accessing the IoT platform, you establish the greatest control for managing device interactions.
Follow the best practices and check if your workload is well-architected.
ID | Priority | Best Practice | |
---|---|---|---|
☐ | BP 1.1 | Required | Assign unique identities to each IoT device |
☐ | BP 1.2 | Highly Recommended | Assign least privilege access to devices |