Security monitoring of production fleets or devices with Amazon IoT Core - Amazon IoT Core
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Security monitoring of production fleets or devices with Amazon IoT Core

IoT fleets can consist of large numbers of devices that have diverse capabilities, are long-lived, and are geographically distributed. These characteristics make fleet setup complex and prone to errors. And because devices are often constrained in computational power, memory, and storage capabilities, this limits the use of encryption and other forms of security on the devices themselves. Also, devices often use software with known vulnerabilities. These factors make IoT fleets an attractive target for hackers and make it difficult to secure your device fleet on an ongoing basis.

Amazon IoT Device Defender addresses these challenges by providing tools to identify security issues and deviations from best practices. You can use Amazon IoT Device Defender to analyze, audit, and monitor connected devices to detect abnormal behavior, and mitigate security risks. Amazon IoT Device Defender can audit device fleets to ensure they adhere to security best practices and detect abnormal behavior on devices. This makes it possible to enforce consistent security policies across your Amazon IoT device fleet and respond quickly when devices are compromised. For more information, see Amazon IoT Device Defender.

Amazon IoT Device Advisor pushes updates and patches your fleet as needed. Amazon IoT Device Advisor updates test cases automatically. The test cases that you select are always with latest version. For more information, see Device Advisor.