Book Image

Designing Production-Grade and Large-Scale IoT Solutions

By : Mohamed Abdelaziz
Book Image

Designing Production-Grade and Large-Scale IoT Solutions

By: Mohamed Abdelaziz

Overview of this book

With the rising demand for and recent enhancements in IoT, a developer with sound knowledge of IoT is the need of the hour. This book will help you design, build, and operate large-scale E2E IoT solutions to transform your business and products, increase revenue, and reduce operational costs. Starting with an overview of how IoT technologies can help you solve your business problems, this book will be a useful guide to helping you implement end-to-end IoT solution architecture. You'll learn to select IoT devices; real-time operating systems; IoT Edge covering Edge location, software, and hardware; and the best IoT connectivity for your IoT solution. As you progress, you'll work with IoT device management, IoT data analytics, IoT platforms, and put these components to work as part of your IoT solution. You'll also be able to build IoT backend cloud from scratch by leveraging the modern app architecture paradigms and cloud-native technologies such as containers and microservices. Finally, you'll discover best practices for different operational excellence pillars, including high availability, resiliency, reliability, security, cost optimization, and high performance, which should be applied for large-scale production-grade IoT solutions. By the end of this IoT book, you'll be confident in designing, building, and operating IoT solutions.
Table of Contents (15 chapters)
1
Section 1: Anatomy of IoT
5
Section 2: The IoT Backend (aka the IoT Cloud)
10
Section 3: IoT Application Architecture Paradigms and IoT Operational Excellence

IoT Device Defender

As the name suggests, this service is a fully managed device security service that helps in securing the IoT devices that are onboarded and provisioned in the AWS IoT platform.

The AWS IoT Device Defender service continuously audits the IoT devices against IoT configurations that you define to make sure the devices are kept secure and are not deviating from the security best practices.

So, broadly, we can say that the AWS IoT Device Defender service offers the following features:

  • Audit device configuration for security vulnerabilities: AWS IoT, continuously or on demand, audits the IoT device-related resources, such as a device's X.509 certificates, IoT policies, connection settings, and account settings, against the AWS IoT security best practices. To give an example, the audit checks whether the principle of least privilege is used or not, whether there is a shared certificate used with IoT devices or not, whether conflicting MQTT client IDs...