SlideShare a Scribd company logo
1 of 33
Download to read offline
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Securing and Managing IoT
Devices at Scale
Aravind Kodandaramaiah
Solution Developer
Solutions Prototyping
S E C 3 6 7
Michael Weitzel
Solution Developer
Solutions Prototyping
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
Managing devices at scale
Securing devices at scale
Best practices
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Batch Fleet
Provisioning
Real-time
Fleet Index & Search
Fine Grained
Device Logging
& Monitoring
Over the
Air Updates
Maintain Fleet Health
AWS IoT Device Management
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Grouping and Searching for Devices
Organize devices
into logical
hierarchies
Search both the
Registry and
Device Shadow
Group Policies
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thing Groups
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Search Both Registry and Device Shadow
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Job Workflow Using AWS IoT Device Management
subscribe $aws/things/MyThing/jobs/notify
Call DescribeJobExecution API
Execute
Call UpdateJobExecution API
Job document
AWS cloud
AWS IoT
(Continued)
notify topic
accepted topic
rejected topic
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Monitoring Device Events
Monitor Devices Joining
Groups
Monitoring of
Device Updates
Monitor Device
Security Policies
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
IoT Security Approach
Devices can be compromised; security is not point in
time.
• Detecting compromises
• Ensuring notifications and alerts are raised
• Constantly evolving systems to monitor threat landscape
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Secure
configurations
Detect
anomalies
Receive
alerts
Fix security
issues
AWS IoT Device Defender
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Audit Checks
Certificates Policies
Device
Connection
Account
Setting
Expiring
Certificates/CA
Certificates
Overly
permissive IoT
policies
Client ID
Collision
Logging not
enabled
Revoked
Certificates/CA
Certificates
Cognito IDs with
overly
permissive
access
Certificate
shared by
devices
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Detect Abnormal Device Behavior
Security
profiles
Define behavior –
blacklist/whitelist
Define behavior –
thresholds
Monitor device
metrics
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security Profiles -> Group
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Define Device Behavior
Metrics Threshold Blacklist/Whitelist
AWS Metrics • Message Rate (Sent and
Received)
• Message Size
• Authorization Failures
• Source IPs
Device Metrics • TCP Connections
• Open Ports (TCP/UDP)
• In/Outbound Packets
• In/Outbound Bytes
• Destination IPs (TCP)
• Open Ports (TCP/UDP)
• Destination IPs (TCP)
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Receive Alerts
Amazon CloudWatchAWS IoT
Console
Amazon SNS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Investigate and Mitigate
Historical
information
Recommendation AWS IoT Device
Management –
Device Jobs
Contextual
information
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security Best Practices
• JITR > JITP > Preload certs
• Do not share certificates. Ensure every THING has its own
certificate.
• Create fine grained IoT Policies to allow each THING to affect
its own data and not data of other THINGS.
• Enforce Schema on Telemetry data in rules engine/business
logic.
• Stolen, valid certificate & private key or SIGV4 credentials - Set
CloudWatch alarms to trigger on high levels of messages.
• Blacklist offending secrets to mitigate MQTT HTTPS Endpoint
layer 7 DDOS attacks.
• x.509 Certificate
• Use IoT Policies
• IAM Permissions
• IAM Roles
• Cognito for user federation
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Device Management Best Practices
• Device types & device groups
• Use jobs
• JITR
• Track overall AWS operational metrics
• AWS CloudTrail
• Amazon CloudWatch Logs, Metrics & Alarms
Thank you!
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS IoT Policies
{
"Effect": "Allow",
"Action": "iot:Publish",
"Resource": [
"arn:*:topic/private-topic/${iot:ClientId}",
"arn:*:topic/open-topic-space/*"
]
},
{
"Effect": "Allow",
"Action": "iot:Subscribe",
"Resource": "arn:*:topicfilter/private-topic/${iot:ClientId}/*"
}
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Batch Fleet Provisioning – Parameters file
"Parameters": {
"ThingName": {
"Type": "String”
},
"SerialNumber": {
"Type": "String”
},
"Location": {
"Type": "String",
"Default": "WA“
},
"CSR": {
"Type": "String”
}
}
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Batch Fleet Provisioning – Resources File
"Resources" : {
"thing" : {
"Type" : "AWS::IoT::Thing",
"Properties" : {
"ThingName" : {"Ref" :
"ThingName"},
"AttributePayload" : {
"version" : "v1",
"serialNumber" :
{"Ref" : "SerialNumber"}
},
"ThingTypeName" :
"lightBulb-versionA",
"ThingGroups" : ["v1-
lightbulbs", {"Ref" : "Location"}]
},
"certificate": {
"Type": "AWS::IoT::Certificate",
"Properties": {
"CertificateSigningRequest": {
"Ref": "CSR"
},
"Status": "ACTIVE"
}
}
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
CloudTrail – AWS IoT Integration
Provisioning Permissions
Federated Permissions
Registry Commands
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon CloudWatch Logs
Monitor and alert
Centralized access
Archive
Alarm
Event (event-based)
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use Cases for CloudWatch Logs
Track overall AWS operational
metrics
Integrate AWS IoT Logs with
AWS Partner solutions
Make logs actionable by alerting
on errors
Alarm
Event (event-based)
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Rules Engine for IoT Operations
Invoke a Lambda function
Put object in an S3 bucket
Insert, update a
DynamoDB record
Publish to an SNS topic
or endpoint
Publish to an Amazon
Kinesis stream
Publish to Firehose
Republish to AWS IoT
Publish to Amazon ES
Capture a CloudWatch
metric or change an alarm
Write to SQS queue
Thank you!
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.

More Related Content

What's hot

What's hot (20)

Enable Your Smart Factory with the AWS Industrial IoT Reference Solution (MFG...
Enable Your Smart Factory with the AWS Industrial IoT Reference Solution (MFG...Enable Your Smart Factory with the AWS Industrial IoT Reference Solution (MFG...
Enable Your Smart Factory with the AWS Industrial IoT Reference Solution (MFG...
 
Detect Abnormal Device Behavior with AWS IoT Device Defender (IOT313-R3) - AW...
Detect Abnormal Device Behavior with AWS IoT Device Defender (IOT313-R3) - AW...Detect Abnormal Device Behavior with AWS IoT Device Defender (IOT313-R3) - AW...
Detect Abnormal Device Behavior with AWS IoT Device Defender (IOT313-R3) - AW...
 
How to Quickly Get Insights from IoT Data on AWS (ANT337-S) - AWS re:Invent 2018
How to Quickly Get Insights from IoT Data on AWS (ANT337-S) - AWS re:Invent 2018How to Quickly Get Insights from IoT Data on AWS (ANT337-S) - AWS re:Invent 2018
How to Quickly Get Insights from IoT Data on AWS (ANT337-S) - AWS re:Invent 2018
 
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
 
[NEW LAUNCH!] Introducing AWS IoT Things Graph (IOT366) - AWS re:Invent 2018
[NEW LAUNCH!] Introducing AWS IoT Things Graph (IOT366) - AWS re:Invent 2018[NEW LAUNCH!] Introducing AWS IoT Things Graph (IOT366) - AWS re:Invent 2018
[NEW LAUNCH!] Introducing AWS IoT Things Graph (IOT366) - AWS re:Invent 2018
 
Best Practices for AWS IoT Core (IOT347-R1) - AWS re:Invent 2018
Best Practices for AWS IoT Core (IOT347-R1) - AWS re:Invent 2018Best Practices for AWS IoT Core (IOT347-R1) - AWS re:Invent 2018
Best Practices for AWS IoT Core (IOT347-R1) - AWS re:Invent 2018
 
[NEW LAUNCH!] Introducing AWS IoT Events (IOT367) - AWS re:Invent 2018
[NEW LAUNCH!] Introducing AWS IoT Events (IOT367) - AWS re:Invent 2018[NEW LAUNCH!] Introducing AWS IoT Events (IOT367) - AWS re:Invent 2018
[NEW LAUNCH!] Introducing AWS IoT Events (IOT367) - AWS re:Invent 2018
 
Tips for Building IoT Applications Faster (IOT366) - AWS re:Invent 2018
Tips for Building IoT Applications Faster (IOT366) - AWS re:Invent 2018Tips for Building IoT Applications Faster (IOT366) - AWS re:Invent 2018
Tips for Building IoT Applications Faster (IOT366) - AWS re:Invent 2018
 
Operationalizing Your Analysis with AWS IoT Analytics (IOT358-R1) - AWS re:In...
Operationalizing Your Analysis with AWS IoT Analytics (IOT358-R1) - AWS re:In...Operationalizing Your Analysis with AWS IoT Analytics (IOT358-R1) - AWS re:In...
Operationalizing Your Analysis with AWS IoT Analytics (IOT358-R1) - AWS re:In...
 
Challenges of Embedded IoT Development and How Amazon FreeRTOS is Changing th...
Challenges of Embedded IoT Development and How Amazon FreeRTOS is Changing th...Challenges of Embedded IoT Development and How Amazon FreeRTOS is Changing th...
Challenges of Embedded IoT Development and How Amazon FreeRTOS is Changing th...
 
AWS IoT - from Cloud to Edge | AWS Floor28
AWS IoT - from Cloud to Edge | AWS Floor28AWS IoT - from Cloud to Edge | AWS Floor28
AWS IoT - from Cloud to Edge | AWS Floor28
 
AWS IoT Security Best Practices
AWS IoT Security Best PracticesAWS IoT Security Best Practices
AWS IoT Security Best Practices
 
Design Continuous Authorization for Rapid Delivery of Mission-Critical Servic...
Design Continuous Authorization for Rapid Delivery of Mission-Critical Servic...Design Continuous Authorization for Rapid Delivery of Mission-Critical Servic...
Design Continuous Authorization for Rapid Delivery of Mission-Critical Servic...
 
Alexa and AWS IoT, ft. VIZIO (IOT302-R1) - AWS re:Invent 2018
Alexa and AWS IoT, ft. VIZIO (IOT302-R1) - AWS re:Invent 2018Alexa and AWS IoT, ft. VIZIO (IOT302-R1) - AWS re:Invent 2018
Alexa and AWS IoT, ft. VIZIO (IOT302-R1) - AWS re:Invent 2018
 
Building IoT Analytics (IOT327-R1) - AWS re:Invent 2018
Building IoT Analytics (IOT327-R1) - AWS re:Invent 2018Building IoT Analytics (IOT327-R1) - AWS re:Invent 2018
Building IoT Analytics (IOT327-R1) - AWS re:Invent 2018
 
AWS-Vizalytics-March-2018 2.pdf
AWS-Vizalytics-March-2018 2.pdfAWS-Vizalytics-March-2018 2.pdf
AWS-Vizalytics-March-2018 2.pdf
 
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
 
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
 
Sicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWSSicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWS
 
Ticketek Sells 1,000s of Tickets a Minute with AWS Service Catalog (MAE204-S)...
Ticketek Sells 1,000s of Tickets a Minute with AWS Service Catalog (MAE204-S)...Ticketek Sells 1,000s of Tickets a Minute with AWS Service Catalog (MAE204-S)...
Ticketek Sells 1,000s of Tickets a Minute with AWS Service Catalog (MAE204-S)...
 

Similar to Securing and Managing IoT Devices at Scale (SEC367-R1) - AWS re:Invent 2018

Secure and Automate AWS Deployments with Next Generation Security
Secure and Automate AWS Deployments with Next Generation SecuritySecure and Automate AWS Deployments with Next Generation Security
Secure and Automate AWS Deployments with Next Generation Security
Amazon Web Services
 
New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your Workload
Amazon Web Services
 

Similar to Securing and Managing IoT Devices at Scale (SEC367-R1) - AWS re:Invent 2018 (20)

Manage IoT Devices throughout Their Lifecycle - AWS Online Tech Talks
Manage IoT Devices throughout Their Lifecycle - AWS Online Tech TalksManage IoT Devices throughout Their Lifecycle - AWS Online Tech Talks
Manage IoT Devices throughout Their Lifecycle - AWS Online Tech Talks
 
AWS IoT: servizi costruiti per migliorare le performance di business
AWS IoT: servizi costruiti per migliorare le performance di businessAWS IoT: servizi costruiti per migliorare le performance di business
AWS IoT: servizi costruiti per migliorare le performance di business
 
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV304 - C...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV304 - C...IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV304 - C...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV304 - C...
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS
 
Threat Detection and Mitigation at Scale on AWS - SID301 - Atlanta AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Atlanta AWS SummitThreat Detection and Mitigation at Scale on AWS - SID301 - Atlanta AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Atlanta AWS Summit
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day One
 
SID301 Threat Detection and Mitigation
 SID301 Threat Detection and Mitigation SID301 Threat Detection and Mitigation
SID301 Threat Detection and Mitigation
 
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
 
Threat Detection and Mitigation at Scale on AWS - SID301 - Chicago AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Chicago AWS SummitThreat Detection and Mitigation at Scale on AWS - SID301 - Chicago AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Chicago AWS Summit
 
Threat Detection and Mitigation at Scale on AWS - SID301 - Anaheim AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Anaheim AWS SummitThreat Detection and Mitigation at Scale on AWS - SID301 - Anaheim AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Anaheim AWS Summit
 
Secure and Automate AWS Deployments with Next Generation Security
Secure and Automate AWS Deployments with Next Generation SecuritySecure and Automate AWS Deployments with Next Generation Security
Secure and Automate AWS Deployments with Next Generation Security
 
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
 
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech Talks
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech TalksHow to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech Talks
How to Easily and Securely Connect Devices to AWS IoT - AWS Online Tech Talks
 
New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your Workload
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
 
Security Management for IoT devices - SRV202 - Chicago AWS Summit
Security Management for IoT devices - SRV202 - Chicago AWS SummitSecurity Management for IoT devices - SRV202 - Chicago AWS Summit
Security Management for IoT devices - SRV202 - Chicago AWS Summit
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoTAWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Securing and Managing IoT Devices at Scale (SEC367-R1) - AWS re:Invent 2018

  • 1.
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Securing and Managing IoT Devices at Scale Aravind Kodandaramaiah Solution Developer Solutions Prototyping S E C 3 6 7 Michael Weitzel Solution Developer Solutions Prototyping
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda Managing devices at scale Securing devices at scale Best practices
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Batch Fleet Provisioning Real-time Fleet Index & Search Fine Grained Device Logging & Monitoring Over the Air Updates Maintain Fleet Health AWS IoT Device Management
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Grouping and Searching for Devices Organize devices into logical hierarchies Search both the Registry and Device Shadow Group Policies
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Thing Groups
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Search Both Registry and Device Shadow
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Job Workflow Using AWS IoT Device Management subscribe $aws/things/MyThing/jobs/notify Call DescribeJobExecution API Execute Call UpdateJobExecution API Job document AWS cloud AWS IoT (Continued) notify topic accepted topic rejected topic
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Monitoring Device Events Monitor Devices Joining Groups Monitoring of Device Updates Monitor Device Security Policies
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. IoT Security Approach Devices can be compromised; security is not point in time. • Detecting compromises • Ensuring notifications and alerts are raised • Constantly evolving systems to monitor threat landscape
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Secure configurations Detect anomalies Receive alerts Fix security issues AWS IoT Device Defender
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Audit Checks Certificates Policies Device Connection Account Setting Expiring Certificates/CA Certificates Overly permissive IoT policies Client ID Collision Logging not enabled Revoked Certificates/CA Certificates Cognito IDs with overly permissive access Certificate shared by devices
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Detect Abnormal Device Behavior Security profiles Define behavior – blacklist/whitelist Define behavior – thresholds Monitor device metrics
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Security Profiles -> Group
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Define Device Behavior Metrics Threshold Blacklist/Whitelist AWS Metrics • Message Rate (Sent and Received) • Message Size • Authorization Failures • Source IPs Device Metrics • TCP Connections • Open Ports (TCP/UDP) • In/Outbound Packets • In/Outbound Bytes • Destination IPs (TCP) • Open Ports (TCP/UDP) • Destination IPs (TCP)
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Receive Alerts Amazon CloudWatchAWS IoT Console Amazon SNS
  • 19. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Investigate and Mitigate Historical information Recommendation AWS IoT Device Management – Device Jobs Contextual information
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Security Best Practices • JITR > JITP > Preload certs • Do not share certificates. Ensure every THING has its own certificate. • Create fine grained IoT Policies to allow each THING to affect its own data and not data of other THINGS. • Enforce Schema on Telemetry data in rules engine/business logic. • Stolen, valid certificate & private key or SIGV4 credentials - Set CloudWatch alarms to trigger on high levels of messages. • Blacklist offending secrets to mitigate MQTT HTTPS Endpoint layer 7 DDOS attacks. • x.509 Certificate • Use IoT Policies • IAM Permissions • IAM Roles • Cognito for user federation
  • 22. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Device Management Best Practices • Device types & device groups • Use jobs • JITR • Track overall AWS operational metrics • AWS CloudTrail • Amazon CloudWatch Logs, Metrics & Alarms
  • 23. Thank you! © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 24. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS IoT Policies { "Effect": "Allow", "Action": "iot:Publish", "Resource": [ "arn:*:topic/private-topic/${iot:ClientId}", "arn:*:topic/open-topic-space/*" ] }, { "Effect": "Allow", "Action": "iot:Subscribe", "Resource": "arn:*:topicfilter/private-topic/${iot:ClientId}/*" }
  • 26. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Batch Fleet Provisioning – Parameters file "Parameters": { "ThingName": { "Type": "String” }, "SerialNumber": { "Type": "String” }, "Location": { "Type": "String", "Default": "WA“ }, "CSR": { "Type": "String” } }
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Batch Fleet Provisioning – Resources File "Resources" : { "thing" : { "Type" : "AWS::IoT::Thing", "Properties" : { "ThingName" : {"Ref" : "ThingName"}, "AttributePayload" : { "version" : "v1", "serialNumber" : {"Ref" : "SerialNumber"} }, "ThingTypeName" : "lightBulb-versionA", "ThingGroups" : ["v1- lightbulbs", {"Ref" : "Location"}] }, "certificate": { "Type": "AWS::IoT::Certificate", "Properties": { "CertificateSigningRequest": { "Ref": "CSR" }, "Status": "ACTIVE" } }
  • 28. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. CloudTrail – AWS IoT Integration Provisioning Permissions Federated Permissions Registry Commands
  • 29. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon CloudWatch Logs Monitor and alert Centralized access Archive Alarm Event (event-based)
  • 30. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Use Cases for CloudWatch Logs Track overall AWS operational metrics Integrate AWS IoT Logs with AWS Partner solutions Make logs actionable by alerting on errors Alarm Event (event-based)
  • 31. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Rules Engine for IoT Operations Invoke a Lambda function Put object in an S3 bucket Insert, update a DynamoDB record Publish to an SNS topic or endpoint Publish to an Amazon Kinesis stream Publish to Firehose Republish to AWS IoT Publish to Amazon ES Capture a CloudWatch metric or change an alarm Write to SQS queue
  • 32. Thank you! © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 33. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.