Cloud-based security services for the IoT
CSPs that offer IoT services may also provide security services tailored specifically to IoT implementations. These may include:
- Device onboarding
- Key and certificate management
- Policy management
- Persistent configuration management
- Gateway security
- Device management
- Security monitoring
- Compliance monitoring
Device onboarding
Before IoT devices can support your organization's use cases, they must be onboarded into your system. The process of onboarding transitions devices from an untrusted to a trusted state within your organization. After the onboarding process is complete, the devices are registered, provisioned with required identity and cryptographic materials, and configured.
Although onboarding seems like a simple concept, there are two primary challenges that must be overcome:
- The scale of the IoT makes it difficult to onboard all of your devices manually
- Transitioning from untrusted to trusted states provides bad actors an opportunity to infiltrate your...