- Products›
- Internet of Things›
- Amazon IoT Core
Amazon IoT Device Defender
Security management for IoT devices
What is Amazon IoT Device Defender
Amazon IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. Amazon IoT Device Defender continuously audits your IoT configurations to make sure that they aren’t deviating from security best practices. A configuration is a set of technical controls you set to help keep information secure when devices are communicating with each other and the cloud. Amazon IoT Device Defender makes it easy to maintain and enforce IoT configurations, such as ensuring device identity, authenticating and authorizing devices, and encrypting device data. Amazon IoT Device Defender continuously audits the IoT configurations on your devices against a set of predefined security best practices. Amazon IoT Device Defender sends an alert if there are any gaps in your IoT configuration that might create a security risk, such as identity certificates being shared across multiple devices or a device with a revoked identity certificate trying to connect to Amazon IoT Core.
Amazon IoT Device Defender also lets you continuously monitor security metrics from devices and Amazon IoT Core for deviations from the expected behaviors for each device. You can define the appropriate behavior for your devices or use machine learning to model the regular device behavior based on historical data. If something doesn’t look right according to defined behaviors or ML models, Amazon IoT Device Defender pushes an alarm so you can take action to mitigate the issue. For example, traffic spikes in outbound traffic might indicate that a device is participating in a DDoS attack. Amazon IoT Greengrass and Amazon FreeRTOS automatically integrate with Amazon IoT Device Defender to provide security metrics from the devices for evaluation.
Amazon IoT Device Defender can send alarms to the Amazon IoT Console, Amazon CloudWatch, and Amazon SNS. If you determine that you need to take an action based on an alarm, you can use Amazon IoT Device Defender built-in mitigation actions such as adding a thing to a thing group (for example, quarantine) or Amazon IoT Device Management to take additional mitigation steps such as pushing security fixes.
Why is IoT Security Important
What are the Challenges With IoT Security
Amazon IoT Device Defender Helps You Manage IoT Security
Continuously Monitor Device Behavior to Identify Anomalies
Audit Device Configurations for Security Vulnerabilities
Receive Alerts and Take Action
How Does Amazon IoT Device Defender Work
Amazon IoT Core provides the security building blocks for you to securely connect devices to the cloud and to other devices. The building blocks allow enforcing security controls such as authentication, authorization, audit logging and end-to-end encryption. However, human or systemic errors and authorized actors with bad intentions can introduce configurations with negative security impacts.
Amazon IoT Device Defender helps you to continuously audit security configurations for compliance with security best practices and your own organizational security policies. For example, cryptographic algorithms once known to provide secure digital signatures for device certificates can be weakened by advances in the computing and cryptanalysis methods. Continual auditing allows you to push new firmware updates and redefine certificates to ensure your devices stay ahead of malicious actors.
Amazon IoT Device Defender also enables you to monitor your device fleets to detect any abnormal device behavior by defining static thresholds or using machine learning models. For example, malicious malware may infect your devices and engage them in botnet attacks against remote hosts. Ongoing monitoring of device behaviors including packets out, bytes out and destination IPs can provide the starting point for you to identify a botnet infection and remediate the issue.
When to Use Amazon IoT Device Defender for IoT Security
When you connect your devices to , it provides the security building blocks for you to securely connect devices to the cloud and to other devices. The building blocks allow enforcing security controls such as authentication, authorization, audit logging and end-to-end encryption. However, human or systemic errors and authorized actors with bad intentions can introduce configurations with negative security impacts.
Continuous Compliance and Adoption of Security Best Practices
Attack Surface Evaluation
Threat Impact Analysis
Amazon IoT Device Defender can facilitate impact analysis of publicly or privately disclosed attack campaigns on your IoT devices. You can define detection rules in Amazon IoT Device Defender based on known indicators of compromise to identify vulnerable devices or devices already compromised. For example, the detection rules can monitor IoT devices for indicators such as network connections to known malicious command and control servers and backdoor service ports open on devices. You can also turn on ML Detect in Amazon IoT Device Defender based on machine learning models using historical device data and identify abnormality of device behaviors without you needing to define normal behavior thresholds. For example, ML Detect can continuously ingest and evaluate IoT device message size data and identify message size anomalies, which can point to issues such as credential abuse.
Customers
Franz Garsombke, CTO - Rachio
“Amazon IoT Device Defender provides device behavior monitoring that is a must-have for any IoT company that is building a secure infrastructure.”
Peter Huisman, CTO - SolarNow
"SolarNow’s business reputation and revenue model is built on zero-tolerance of any controllable service disruption. Amazon IoT Device Defender and Eseye global AnyNet Secure connectivity is the easiest, quickest, and most cost-effective way for us to achieve and scale a high level of device security and anomaly detection. This protects our customers from service interruptions and SolarNow’s reputation for excellent customer service.”