What’s new with AWS IoT? This is an Introduction to the AWS IoT Platform and an overview of new features. Join us for a discussion on the features launched over the last year, and the best practices on how to use the AWS IoT Platform to get your device data into the cloud.
The end-to-end concept starts from prototyping through manufacturing to delivering a product to market, all with security in mind. The kit helps devices comply with the AWS IoT security model which states a device must use mutual authentication to be authorized on the AWS cloud.
There are two main challenges to achieving this goal: providing a trusted authentication and handling securely the private keys in a large-scale production environment. The pre-configured ATECC508MAHAW meets these challenges by leveraging AWS IoT Just-In-Time Registration (JITR). The JITR combined with the mutual authentication handshake enables bulk certificate upload from IoT devices to the AWS IoT service once a system is deployed.
There are two main challenges to achieving this goal: providing a trusted authentication and handling securely the private keys in a large-scale production environment. The pre-configured ATECC508MAHAW meets these challenges by leveraging AWS IoT Just-In-Time Registration (JITR). The JITR combined with the mutual authentication handshake enables bulk certificate upload from IoT devices to the AWS IoT service once a system is deployed.
The AT88CKECC-AWS-XSTK-B kit for AWS IoT has been designed to help the engineer starting to prototype and learn the basics of secure provisioning. The secure element is pre-configured but not provisioned with keys out of the box. The Python based scripts are here to guide the user through the steps of provisioning and illustrate the process their company will go through when implementing certificate based authentication in a production environment. Once the kit is provisioned, it provides a unique, trusted and protected identity.
Trust cannot rely only on the device but also on the manufacturing process. Exploiting third party weaknesses is one of the top targets for hackers. Isolating keys and secrets from manufacturing is equally vital. Customers can leave this burden to Microchip's secure factories and leverage our trusted provisioning service already used by thousands of companies. It's zero touch, the private keys are never exposed.