Book Image

Learning AWS IoT

By : Agus Kurniawan
Book Image

Learning AWS IoT

By: Agus Kurniawan

Overview of this book

The Internet of Things market increased a lot in the past few years and IoT development and its adoption have showed an upward trend. Analysis and predictions say that Enterprise IoT platforms are the future of IoT. AWS IoT is currently leading the market with its wide range of device support SDKs and versatile management console. This book initially introduces you to the IoT platforms, and how it makes our IoT development easy. It then covers the complete AWS IoT Suite and how it can be used to develop secure communication between internet-connected things such as sensors, actuators, embedded devices, smart applications, and so on. The book also covers the various modules of AWS: AWS Greengrass, AWS device SDKs, AWS IoT Platform, AWS Button, AWS Management consoles, AWS-related CLI, and API references, all with practical use cases. Near the end, the book supplies security-related best practices to make bi-directional communication more secure. When you've finished this book, you'll be up-and-running with the AWS IoT Suite, and building IoT projects.
Table of Contents (14 chapters)
Title Page
Packt Upsell

Managing AWS IAM

AWS Identity and Access Management (IAM) is one of the Amazon services for managing your identity and access rights on any AWS resource. You can manage users, roles, and policies. You can find the AWS IAM Management Console at

AWS provides IAM for managing all resource security and policies. Through AWS IAM, we can control and limit access and permission for any resource. You can create a new user and set its permission. For security reasons, you should investigate the user's need. You should set minimum permission to access AWS resources. Remove resource permissions if the user does not need them. You can see user permissions on the Permissions tab, as shown in the following screenshot:

As a best security practice, you should not use a user account to access resources directly. You can create an access key ID to access those resources. You can see an access key list in the following screenshot. In this case, you should review access keys...