SlideShare a Scribd company logo
1 of 34
Download to read offline
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Kriti Bharti
Senior Product Manager
Security Management for
IoT Devices
SRV202
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
What is AWS IoT?
Overview of AWS IoT Device Defender
Rachio use case
SolarNow use case
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Sense & Act
Things
Secure device
connectivity
and messaging
AWS IoT Core
Fleet onboarding,
management, and
SW updates
Fleet
audit and
protection
IoT data analytics
and intelligence
AWS IoT Device
Management
AWS IoT Device
Defender
GatewayEndpoints
AWS Greengrass
AWS IoT 1-Click
AWS IoT
Analytics
Amazon
FreeRTOS
Storage & Compute & Learn
Cloud
Secure local
triggers, actions,
and data sync
Intelligence
Insights & Logic → Action
AWS IoT services
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How can I manage
security for my
fleet of devices
on AWS IoT?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Audit
IoT configurations
Detect device
anomalies
Receive
alerts
Mitigate
security issues
Keep your fleet secure
AWS IoT Device Defender
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Scheduled
Ad-hoc
Audit IoT configurations
Audit checks are mapped to
recommended security best
practices on:
• Certificates
• IoT policies
• Device connection
• Account setting
Schedule audits or run ad-hoc audits
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Audit demo
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Detect device anomalies
Continuously monitors high-
value security metrics from
AWS IoT Core and the device
Define expected behavior
for these metrics
Compares device metrics against
expected device behavior
Use security profiles
to group behaviors
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Introducing –
Franz Garsombke
CTO and Co-Founder, Rachio
franz@rach.io
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Who is Rachio?
Colorado-based IoT company
First product was a smart
irrigation controller
100% designed and
manufactured in Colorado
50+ employees
To make sustainable water use effortless
and personally rewarding
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
The current state of irrigation
Annual waste
1.4 trillion gallons
Equates to 58% of US
residential water waste
Costs homeowners
with irrigation over
$2 billion/year
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Smart sprinkler controller
Easy to control anywhere, anytime
Get complete access to monitor and adjust
your sprinkler system from
your phone, tablet, or laptop
Automatically adapts for weather
Rachio continuously adapts to local
weather forecasts and changing seasons,
automatically optimizing watering
schedules
Weekly 150,000 weather skips
saving 160M gallons of water
Gen1
Gen2
Gen 3
and
Wireless
Flow
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Rachio security use cases
Anomaly detection forefront
of our priority list
Easy, yet powerful device
behavior monitoring
The perfect complement to our existing
IoT infrastructure
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS IoT Device Defender
Detect
Created security profile
with four device behaviors
1. Message received
2. Message sent
3. Message size
4. Authorization failure
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS IoT Device Defender and Rachio
Amazon SNS AWS Lambda
function
AWS IoT Core AWS IoT Device
Defender
CustomerZendesk Integration
Gen 2 Rachio
Smart Controller
Gen 3 Rachio
Smart Controller
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS IoT Device Defender
Detect
Providing immediate value
Enhancements
• Message parsing
using regexp
• Predictive behavior
monitoring
Excited for continued AWS IoT service
evolution
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Introducing –
SolarNow and Eseye
Ian Marsden, CTO Eseye
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
CONNECTIVITY GLOBAL NETWORKS
AWS IoT Competency Partner Eseye enables
SolarNow’s solution
Eseye
Five pillars of IoT
YOUR INTELLIGENCE
AWS IoT Device Defender
YOUR DEVICE
CLOUD
INTEGRATION
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
SolarNow
Transforming lives and communities
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS IoT Device Defender
Detect
Monitor connectivity metrics to detect violations
Metrics can be collected from the device or generated
by the network
Eseye through the AWS Marketplace enables metric
collection on legacy devices
AWS IoT CoreSolarNow
Devices
Cellular
Network
Eseye
AWS IoT Device
Defender
DATA
METRICS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
IAM Amazon
CloudWatch
Amazon
RDS
Amazon
DynamoDB
Amazon
S3
AWS Elastic
Beanstalk
Amazon
Kinesis
Amazon
Cognito
Amazon
SNS
AmazonMachine
Learning
AWS
Lambda
Search AnalyticsAccess & IDUI
LogicQueueNotification
AWS IoT
Core
SolarNow
Devices
SolarNow architecture
Cellular
Network
Eseye
Eseye
Marketplace
Integration
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
IAM Amazon
CloudWatch
Amazon
RDS
Amazon
DynamoDB
Amazon
S3
AWS Elastic
Beanstalk
Amazon
Kinesis
Amazon
Cognito
Amazon
SNS
AmazonMachine
Learning
AWS
Lambda
Search AnalyticsAccess & IDUI
LogicQueueNotification
SolarNow
Devices
SolarNow architecture
including AWS IoT Device Defender
Amazon
SNS
AWS Lambda
function
Email
notification
Metrics
AWS IoT Device
Defender
Security
Profiles
Cellular
Network
Eseye
AWS IoT
Core
Eseye
Marketplace
Integration
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Aggregate data compared to device-level data
No. of Bytes
7–25 7–26 7–27 7–28 7–29 7–30 7–31 8–01 8–02 7–25 7–26 7–27 7–28 7–29 7–30 7–31 8–01 8–02
120,000
100,000
80,000
60,000
40,000
20,000
0
No. of Bytes
1,400,000
1,200,000
1,000,000
800,000
600,000
400,000
200,000
0
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
192.168.111.2
34.208.239.28
34.214.217.104
35.160.146.103
35.167.163.245
52.11.14.157
52.25.183.60
2.25.65.226
52.35.211.165
54.149.203.141
54.186.223.134
54.71.183.55
7–25 7–26 7–27 7–28 7–29 7–30 7–31 8–01 8–02
Destination IP analysis
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS IoT Device Defender security profile setup
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Set up AWS Lambda to suspend device
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
View violations
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.© 2018 ESEYE Limited. Company Confidential
Benefits of AWS IoT Device Defender
AWS IoT Device Defender, and Eseye’s global AnyNet Secure SIM,
delivers for SolarNow
• Affordable, scalable, ongoing connected security management services
on AWS IoT Console
• Is quick to configure “out of the box” and does not need costly developers
or bespoke software
Removes risk
• Identifies and reports misconfiguration, hacking, misuse
• Protects SolarNow’s customers from livelihood and potentially
life threatening service interruptions
• Protects SolarNow’s brand and business revenue model
Is the simplest way for SolarNow to achieve a high level of connectivity,
security, and performance anomaly management, globally, on AWS IoT
© 2018 ESEYE Limited. Company Confidential
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Receive alerts
Alerts generated based on identified
anomalies and audit findings
Alerts sent to:
• AWS IoT Console
• Amazon CloudWatch
• Amazon SNS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Investigate and mitigate
security issues
Review historical and contextual
information
Get recommendations
Take actions that make sense
for your devices and use cases
• Revoke permissions
• Reboot a device
• Reset factory defaults
• Push security fixes
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS IoT Device
Defender –
Better together with AWS
IoT edge-based software
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Submit session feedback
1. Tap the Schedule icon.
2. Select the session you
attended.
3. Tap Session Evaluation to
submit your feedback.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thank you!

More Related Content

What's hot

Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Amazon Web Services
 
IoT: Detect abnormal device behavior and disconnect devices automatically
IoT: Detect abnormal  device behavior  and disconnect  devices automaticallyIoT: Detect abnormal  device behavior  and disconnect  devices automatically
IoT: Detect abnormal device behavior and disconnect devices automaticallyAWS Germany
 
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Amazon Web Services
 
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ... How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...Amazon Web Services
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...Amazon Web Services
 
Technology as a means for compliance - GRC206 - AWS re:Inforce 2019
Technology as a means for compliance - GRC206 - AWS re:Inforce 2019 Technology as a means for compliance - GRC206 - AWS re:Inforce 2019
Technology as a means for compliance - GRC206 - AWS re:Inforce 2019 Amazon Web Services
 
Account automation and temporary AWS credential service - GRC328 - AWS re:Inf...
Account automation and temporary AWS credential service - GRC328 - AWS re:Inf...Account automation and temporary AWS credential service - GRC328 - AWS re:Inf...
Account automation and temporary AWS credential service - GRC328 - AWS re:Inf...Amazon Web Services
 
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...Amazon Web Services
 
Roger Dickinson - Making Enterprise Virtual Reality a Practical Reality - Cod...
Roger Dickinson - Making Enterprise Virtual Reality a Practical Reality - Cod...Roger Dickinson - Making Enterprise Virtual Reality a Practical Reality - Cod...
Roger Dickinson - Making Enterprise Virtual Reality a Practical Reality - Cod...Codemotion
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...NetworkCollaborators
 
Threat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitThreat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitAmazon Web Services
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureNetworkCollaborators
 
Using AWS IoT & Amazon SageMaker to Improve Manufacturing Operations - SVC204...
Using AWS IoT & Amazon SageMaker to Improve Manufacturing Operations - SVC204...Using AWS IoT & Amazon SageMaker to Improve Manufacturing Operations - SVC204...
Using AWS IoT & Amazon SageMaker to Improve Manufacturing Operations - SVC204...Amazon Web Services
 
Getting Physical with Web Bluetooth - Uri Shaked, BlackBerry
Getting Physical with Web Bluetooth - Uri Shaked, BlackBerryGetting Physical with Web Bluetooth - Uri Shaked, BlackBerry
Getting Physical with Web Bluetooth - Uri Shaked, BlackBerryCodemotion Tel Aviv
 
Bringing the Internet of Things “IoT” to Government: Enabling Smart Nations
Bringing the Internet of Things “IoT” to Government: Enabling Smart NationsBringing the Internet of Things “IoT” to Government: Enabling Smart Nations
Bringing the Internet of Things “IoT” to Government: Enabling Smart NationsAmazon Web Services
 
Data protection using encryption in AWS - SEC201 - Santa Clara AWS Summit
Data protection using encryption in AWS - SEC201 - Santa Clara AWS SummitData protection using encryption in AWS - SEC201 - Santa Clara AWS Summit
Data protection using encryption in AWS - SEC201 - Santa Clara AWS SummitAmazon Web Services
 
Lacework slides from AWS Meetups
Lacework slides from AWS MeetupsLacework slides from AWS Meetups
Lacework slides from AWS MeetupsJohn Varghese
 
Which use-cases and XaaS services are growing? IaaS, hybrid cloud & Kubernetes
Which use-cases and XaaS services are growing? IaaS, hybrid cloud & KubernetesWhich use-cases and XaaS services are growing? IaaS, hybrid cloud & Kubernetes
Which use-cases and XaaS services are growing? IaaS, hybrid cloud & KubernetesSally Laouacheria
 

What's hot (20)

Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
 
IoT: Detect abnormal device behavior and disconnect devices automatically
IoT: Detect abnormal  device behavior  and disconnect  devices automaticallyIoT: Detect abnormal  device behavior  and disconnect  devices automatically
IoT: Detect abnormal device behavior and disconnect devices automatically
 
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
 
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ... How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...
 
Technology as a means for compliance - GRC206 - AWS re:Inforce 2019
Technology as a means for compliance - GRC206 - AWS re:Inforce 2019 Technology as a means for compliance - GRC206 - AWS re:Inforce 2019
Technology as a means for compliance - GRC206 - AWS re:Inforce 2019
 
Account automation and temporary AWS credential service - GRC328 - AWS re:Inf...
Account automation and temporary AWS credential service - GRC328 - AWS re:Inf...Account automation and temporary AWS credential service - GRC328 - AWS re:Inf...
Account automation and temporary AWS credential service - GRC328 - AWS re:Inf...
 
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
 
Roger Dickinson - Making Enterprise Virtual Reality a Practical Reality - Cod...
Roger Dickinson - Making Enterprise Virtual Reality a Practical Reality - Cod...Roger Dickinson - Making Enterprise Virtual Reality a Practical Reality - Cod...
Roger Dickinson - Making Enterprise Virtual Reality a Practical Reality - Cod...
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
 
Threat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitThreat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS Summit
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
Getting Started with AWS IoT
Getting Started with AWS IoTGetting Started with AWS IoT
Getting Started with AWS IoT
 
Using AWS IoT & Amazon SageMaker to Improve Manufacturing Operations - SVC204...
Using AWS IoT & Amazon SageMaker to Improve Manufacturing Operations - SVC204...Using AWS IoT & Amazon SageMaker to Improve Manufacturing Operations - SVC204...
Using AWS IoT & Amazon SageMaker to Improve Manufacturing Operations - SVC204...
 
Getting Physical with Web Bluetooth - Uri Shaked, BlackBerry
Getting Physical with Web Bluetooth - Uri Shaked, BlackBerryGetting Physical with Web Bluetooth - Uri Shaked, BlackBerry
Getting Physical with Web Bluetooth - Uri Shaked, BlackBerry
 
Bringing the Internet of Things “IoT” to Government: Enabling Smart Nations
Bringing the Internet of Things “IoT” to Government: Enabling Smart NationsBringing the Internet of Things “IoT” to Government: Enabling Smart Nations
Bringing the Internet of Things “IoT” to Government: Enabling Smart Nations
 
Data protection using encryption in AWS - SEC201 - Santa Clara AWS Summit
Data protection using encryption in AWS - SEC201 - Santa Clara AWS SummitData protection using encryption in AWS - SEC201 - Santa Clara AWS Summit
Data protection using encryption in AWS - SEC201 - Santa Clara AWS Summit
 
Lacework slides from AWS Meetups
Lacework slides from AWS MeetupsLacework slides from AWS Meetups
Lacework slides from AWS Meetups
 
Which use-cases and XaaS services are growing? IaaS, hybrid cloud & Kubernetes
Which use-cases and XaaS services are growing? IaaS, hybrid cloud & KubernetesWhich use-cases and XaaS services are growing? IaaS, hybrid cloud & Kubernetes
Which use-cases and XaaS services are growing? IaaS, hybrid cloud & Kubernetes
 

Similar to Security Management for IoT devices - SRV202 - Chicago AWS Summit

Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018Amazon Web Services
 
AWS IoT: servizi costruiti per migliorare le performance di business
AWS IoT: servizi costruiti per migliorare le performance di businessAWS IoT: servizi costruiti per migliorare le performance di business
AWS IoT: servizi costruiti per migliorare le performance di businessAmazon Web Services
 
Keep Your IoT Devices Secure (IOT205) - AWS re:Invent 2018
Keep Your IoT Devices Secure (IOT205) - AWS re:Invent 2018Keep Your IoT Devices Secure (IOT205) - AWS re:Invent 2018
Keep Your IoT Devices Secure (IOT205) - AWS re:Invent 2018Amazon Web Services
 
Building IoT Applications for a Smart Home, ft. Vestel (IOT306-R1) - AWS re:I...
Building IoT Applications for a Smart Home, ft. Vestel (IOT306-R1) - AWS re:I...Building IoT Applications for a Smart Home, ft. Vestel (IOT306-R1) - AWS re:I...
Building IoT Applications for a Smart Home, ft. Vestel (IOT306-R1) - AWS re:I...Amazon Web Services
 
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud Amazon Web Services
 
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019 Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019 Amazon Web Services
 
Detect Abnormal Device Behavior with AWS IoT Device Defender (IOT313-R3) - AW...
Detect Abnormal Device Behavior with AWS IoT Device Defender (IOT313-R3) - AW...Detect Abnormal Device Behavior with AWS IoT Device Defender (IOT313-R3) - AW...
Detect Abnormal Device Behavior with AWS IoT Device Defender (IOT313-R3) - AW...Amazon Web Services
 
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoTAWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoTAmazon Web Services
 
IoT Revolution - Unlocking Business Values in Vertical Markets
IoT Revolution - Unlocking Business Values in Vertical MarketsIoT Revolution - Unlocking Business Values in Vertical Markets
IoT Revolution - Unlocking Business Values in Vertical MarketsAmazon Web Services
 
What’s New with Device Qualification Program and IoT Services
What’s New with Device Qualification Program and IoT ServicesWhat’s New with Device Qualification Program and IoT Services
What’s New with Device Qualification Program and IoT ServicesAmazon Web Services
 
What’s New with Device Qualification Program and IoT Services
What’s New with Device Qualification Program and IoT ServicesWhat’s New with Device Qualification Program and IoT Services
What’s New with Device Qualification Program and IoT ServicesAmazon Web Services
 
From Cloud to Edge & back again
From Cloud to Edge & back againFrom Cloud to Edge & back again
From Cloud to Edge & back againBoaz Ziniman
 
Code in the Cloud- Deploy on Microcontroller and Edge Devices
Code in the Cloud- Deploy on Microcontroller and Edge DevicesCode in the Cloud- Deploy on Microcontroller and Edge Devices
Code in the Cloud- Deploy on Microcontroller and Edge DevicesAmazon Web Services
 
AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
 AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
AWS Live Panel Discussion: Simplify Large-Scale IoT Device ManagementAmazon Web Services
 
Edge Computing with AWS Greengrass
Edge Computing with AWS Greengrass Edge Computing with AWS Greengrass
Edge Computing with AWS Greengrass Amazon Web Services
 
AWS IoT_Connected Home Solutions
AWS IoT_Connected Home Solutions AWS IoT_Connected Home Solutions
AWS IoT_Connected Home Solutions Amazon Web Services
 
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS CloudIndustrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS CloudAmazon Web Services
 
AWS Summit Singapore - Getting Smarter at the Edge
AWS Summit Singapore - Getting Smarter at the EdgeAWS Summit Singapore - Getting Smarter at the Edge
AWS Summit Singapore - Getting Smarter at the EdgeAmazon Web Services
 
AIoT: AI Meets IoT (IOT204) - AWS re:Invent 2018
AIoT: AI Meets IoT (IOT204) - AWS re:Invent 2018AIoT: AI Meets IoT (IOT204) - AWS re:Invent 2018
AIoT: AI Meets IoT (IOT204) - AWS re:Invent 2018Amazon Web Services
 
Securing and Managing IoT Devices at Scale (SEC367-R1) - AWS re:Invent 2018
Securing and Managing IoT Devices at Scale (SEC367-R1) - AWS re:Invent 2018Securing and Managing IoT Devices at Scale (SEC367-R1) - AWS re:Invent 2018
Securing and Managing IoT Devices at Scale (SEC367-R1) - AWS re:Invent 2018Amazon Web Services
 

Similar to Security Management for IoT devices - SRV202 - Chicago AWS Summit (20)

Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
Leadership Session: AWS IoT (IOT218-L) - AWS re:Invent 2018
 
AWS IoT: servizi costruiti per migliorare le performance di business
AWS IoT: servizi costruiti per migliorare le performance di businessAWS IoT: servizi costruiti per migliorare le performance di business
AWS IoT: servizi costruiti per migliorare le performance di business
 
Keep Your IoT Devices Secure (IOT205) - AWS re:Invent 2018
Keep Your IoT Devices Secure (IOT205) - AWS re:Invent 2018Keep Your IoT Devices Secure (IOT205) - AWS re:Invent 2018
Keep Your IoT Devices Secure (IOT205) - AWS re:Invent 2018
 
Building IoT Applications for a Smart Home, ft. Vestel (IOT306-R1) - AWS re:I...
Building IoT Applications for a Smart Home, ft. Vestel (IOT306-R1) - AWS re:I...Building IoT Applications for a Smart Home, ft. Vestel (IOT306-R1) - AWS re:I...
Building IoT Applications for a Smart Home, ft. Vestel (IOT306-R1) - AWS re:I...
 
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
IoT Building Blocks_ From Edge Devices to Analytics in the Cloud
 
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019 Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
 
Detect Abnormal Device Behavior with AWS IoT Device Defender (IOT313-R3) - AW...
Detect Abnormal Device Behavior with AWS IoT Device Defender (IOT313-R3) - AW...Detect Abnormal Device Behavior with AWS IoT Device Defender (IOT313-R3) - AW...
Detect Abnormal Device Behavior with AWS IoT Device Defender (IOT313-R3) - AW...
 
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoTAWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
AWS Learning Series: Harnessing the Power of Data | An Introduction to IoT
 
IoT Revolution - Unlocking Business Values in Vertical Markets
IoT Revolution - Unlocking Business Values in Vertical MarketsIoT Revolution - Unlocking Business Values in Vertical Markets
IoT Revolution - Unlocking Business Values in Vertical Markets
 
What’s New with Device Qualification Program and IoT Services
What’s New with Device Qualification Program and IoT ServicesWhat’s New with Device Qualification Program and IoT Services
What’s New with Device Qualification Program and IoT Services
 
What’s New with Device Qualification Program and IoT Services
What’s New with Device Qualification Program and IoT ServicesWhat’s New with Device Qualification Program and IoT Services
What’s New with Device Qualification Program and IoT Services
 
From Cloud to Edge & back again
From Cloud to Edge & back againFrom Cloud to Edge & back again
From Cloud to Edge & back again
 
Code in the Cloud- Deploy on Microcontroller and Edge Devices
Code in the Cloud- Deploy on Microcontroller and Edge DevicesCode in the Cloud- Deploy on Microcontroller and Edge Devices
Code in the Cloud- Deploy on Microcontroller and Edge Devices
 
AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
 AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
AWS Live Panel Discussion: Simplify Large-Scale IoT Device Management
 
Edge Computing with AWS Greengrass
Edge Computing with AWS Greengrass Edge Computing with AWS Greengrass
Edge Computing with AWS Greengrass
 
AWS IoT_Connected Home Solutions
AWS IoT_Connected Home Solutions AWS IoT_Connected Home Solutions
AWS IoT_Connected Home Solutions
 
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS CloudIndustrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
 
AWS Summit Singapore - Getting Smarter at the Edge
AWS Summit Singapore - Getting Smarter at the EdgeAWS Summit Singapore - Getting Smarter at the Edge
AWS Summit Singapore - Getting Smarter at the Edge
 
AIoT: AI Meets IoT (IOT204) - AWS re:Invent 2018
AIoT: AI Meets IoT (IOT204) - AWS re:Invent 2018AIoT: AI Meets IoT (IOT204) - AWS re:Invent 2018
AIoT: AI Meets IoT (IOT204) - AWS re:Invent 2018
 
Securing and Managing IoT Devices at Scale (SEC367-R1) - AWS re:Invent 2018
Securing and Managing IoT Devices at Scale (SEC367-R1) - AWS re:Invent 2018Securing and Managing IoT Devices at Scale (SEC367-R1) - AWS re:Invent 2018
Securing and Managing IoT Devices at Scale (SEC367-R1) - AWS re:Invent 2018
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Security Management for IoT devices - SRV202 - Chicago AWS Summit

  • 1. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Kriti Bharti Senior Product Manager Security Management for IoT Devices SRV202
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda What is AWS IoT? Overview of AWS IoT Device Defender Rachio use case SolarNow use case
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Sense & Act Things Secure device connectivity and messaging AWS IoT Core Fleet onboarding, management, and SW updates Fleet audit and protection IoT data analytics and intelligence AWS IoT Device Management AWS IoT Device Defender GatewayEndpoints AWS Greengrass AWS IoT 1-Click AWS IoT Analytics Amazon FreeRTOS Storage & Compute & Learn Cloud Secure local triggers, actions, and data sync Intelligence Insights & Logic → Action AWS IoT services
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. How can I manage security for my fleet of devices on AWS IoT?
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Audit IoT configurations Detect device anomalies Receive alerts Mitigate security issues Keep your fleet secure AWS IoT Device Defender
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Scheduled Ad-hoc Audit IoT configurations Audit checks are mapped to recommended security best practices on: • Certificates • IoT policies • Device connection • Account setting Schedule audits or run ad-hoc audits
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Audit demo
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Detect device anomalies Continuously monitors high- value security metrics from AWS IoT Core and the device Define expected behavior for these metrics Compares device metrics against expected device behavior Use security profiles to group behaviors
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Introducing – Franz Garsombke CTO and Co-Founder, Rachio franz@rach.io
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Who is Rachio? Colorado-based IoT company First product was a smart irrigation controller 100% designed and manufactured in Colorado 50+ employees To make sustainable water use effortless and personally rewarding
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. The current state of irrigation Annual waste 1.4 trillion gallons Equates to 58% of US residential water waste Costs homeowners with irrigation over $2 billion/year
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Smart sprinkler controller Easy to control anywhere, anytime Get complete access to monitor and adjust your sprinkler system from your phone, tablet, or laptop Automatically adapts for weather Rachio continuously adapts to local weather forecasts and changing seasons, automatically optimizing watering schedules Weekly 150,000 weather skips saving 160M gallons of water Gen1 Gen2 Gen 3 and Wireless Flow
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Rachio security use cases Anomaly detection forefront of our priority list Easy, yet powerful device behavior monitoring The perfect complement to our existing IoT infrastructure
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS IoT Device Defender Detect Created security profile with four device behaviors 1. Message received 2. Message sent 3. Message size 4. Authorization failure
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS IoT Device Defender and Rachio Amazon SNS AWS Lambda function AWS IoT Core AWS IoT Device Defender CustomerZendesk Integration Gen 2 Rachio Smart Controller Gen 3 Rachio Smart Controller
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS IoT Device Defender Detect Providing immediate value Enhancements • Message parsing using regexp • Predictive behavior monitoring Excited for continued AWS IoT service evolution
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Introducing – SolarNow and Eseye Ian Marsden, CTO Eseye
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. CONNECTIVITY GLOBAL NETWORKS AWS IoT Competency Partner Eseye enables SolarNow’s solution Eseye Five pillars of IoT YOUR INTELLIGENCE AWS IoT Device Defender YOUR DEVICE CLOUD INTEGRATION
  • 19. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. SolarNow Transforming lives and communities
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS IoT Device Defender Detect Monitor connectivity metrics to detect violations Metrics can be collected from the device or generated by the network Eseye through the AWS Marketplace enables metric collection on legacy devices AWS IoT CoreSolarNow Devices Cellular Network Eseye AWS IoT Device Defender DATA METRICS
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. IAM Amazon CloudWatch Amazon RDS Amazon DynamoDB Amazon S3 AWS Elastic Beanstalk Amazon Kinesis Amazon Cognito Amazon SNS AmazonMachine Learning AWS Lambda Search AnalyticsAccess & IDUI LogicQueueNotification AWS IoT Core SolarNow Devices SolarNow architecture Cellular Network Eseye Eseye Marketplace Integration
  • 22. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. IAM Amazon CloudWatch Amazon RDS Amazon DynamoDB Amazon S3 AWS Elastic Beanstalk Amazon Kinesis Amazon Cognito Amazon SNS AmazonMachine Learning AWS Lambda Search AnalyticsAccess & IDUI LogicQueueNotification SolarNow Devices SolarNow architecture including AWS IoT Device Defender Amazon SNS AWS Lambda function Email notification Metrics AWS IoT Device Defender Security Profiles Cellular Network Eseye AWS IoT Core Eseye Marketplace Integration
  • 23. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Aggregate data compared to device-level data No. of Bytes 7–25 7–26 7–27 7–28 7–29 7–30 7–31 8–01 8–02 7–25 7–26 7–27 7–28 7–29 7–30 7–31 8–01 8–02 120,000 100,000 80,000 60,000 40,000 20,000 0 No. of Bytes 1,400,000 1,200,000 1,000,000 800,000 600,000 400,000 200,000 0
  • 24. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. 192.168.111.2 34.208.239.28 34.214.217.104 35.160.146.103 35.167.163.245 52.11.14.157 52.25.183.60 2.25.65.226 52.35.211.165 54.149.203.141 54.186.223.134 54.71.183.55 7–25 7–26 7–27 7–28 7–29 7–30 7–31 8–01 8–02 Destination IP analysis
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS IoT Device Defender security profile setup
  • 26. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Set up AWS Lambda to suspend device
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. View violations
  • 28. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.© 2018 ESEYE Limited. Company Confidential Benefits of AWS IoT Device Defender AWS IoT Device Defender, and Eseye’s global AnyNet Secure SIM, delivers for SolarNow • Affordable, scalable, ongoing connected security management services on AWS IoT Console • Is quick to configure “out of the box” and does not need costly developers or bespoke software Removes risk • Identifies and reports misconfiguration, hacking, misuse • Protects SolarNow’s customers from livelihood and potentially life threatening service interruptions • Protects SolarNow’s brand and business revenue model Is the simplest way for SolarNow to achieve a high level of connectivity, security, and performance anomaly management, globally, on AWS IoT
  • 29. © 2018 ESEYE Limited. Company Confidential
  • 30. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Receive alerts Alerts generated based on identified anomalies and audit findings Alerts sent to: • AWS IoT Console • Amazon CloudWatch • Amazon SNS
  • 31. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Investigate and mitigate security issues Review historical and contextual information Get recommendations Take actions that make sense for your devices and use cases • Revoke permissions • Reboot a device • Reset factory defaults • Push security fixes
  • 32. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS IoT Device Defender – Better together with AWS IoT edge-based software
  • 33. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Submit session feedback 1. Tap the Schedule icon. 2. Select the session you attended. 3. Tap Session Evaluation to submit your feedback.
  • 34. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Thank you!