Your company developed a new product and delivered thousands of devices to the market. Seeing the growing security issues on other IoT solutions, the CIO requested that you put in place a few compliance checks in a short amount of time. You thought on developing a robust monitoring mechanism, but the estimated effort and time would not meet the company needs. During this investigation, you read about AWS IoT Device Defender and how it can help you.
In this workshop, you will learn how to use AWS IoT Device Defender to simplify this task. The sample architecture shows an example of how to inspect and update AWS IoT policies that are too permissive and don’t follow AWS IoT best practices.
You will walk through a solution which has the following tasks:
The diagram below depicts the AWS services used in this solution and the main steps executed after completing the setup.
You should only use the architecture and sample code displayed below as a guideline.
AWS IoT Device Defender Audit requires a Role with specific Permissions to act on your account. The audit wizard helps you to setup this Role and create an initial Audit configuration.
If you have run the audit wizard before, you may skip this session. Otherwise, you should follow the steps below to finish this setup.
You may want to check the Permissions required by AWS IoT Device Defender Audit, clicking on Permissions
AWSIoTDeviceDefenderAudit_Role
AWSIoTDeviceDefenderDailyAudit
)
Well done! You set up AWS IoT Device Defender Audit and created your first audit task. Now, let’s work on the mitigation strategy.