The IoT Architect's Guide to Attainable Security and Privacy by Damilare D. Fagbemi;David M Wheeler;JC Wheeler;
Author:Damilare D. Fagbemi;David M Wheeler;JC Wheeler; [Неизв.]
Language: eng
Format: epub
Publisher: CRC Press (Unlimited)
Published: 2020-01-25T21:00:00+00:00
In the Dalit Device Software Updates view, the system administrator publishes signed containers to the Container Registry. The container registry is simply a repository of update files stored as containers. Afterwards, the system administrator uses a web application (also hosted via AWS S3), with the aid of a Lambda function, in order to publish a new desired state to the Device Shadow compute service. The Lambda function is accessible to the web app via an API (or URL) it exposes through the Amazon API Gateway⢠compute service. The API gateway is simply a service that allows for easy creation and manipulation of REST APIs. The Amazon API Gateway can be used to create an API that is simultaneously connected to disparate cloud-hosted data sources, presenting a simplified interface for a client accessing that API. In our current example case, the REST API is connected to the functions exposed by the âset desired device stateâ serverless function.
Take a moment to consider what was described in the last paragraph and compare it with the approaches described in âDevice Maintenance, Updates, and Monitoringâ in Section 6.4.2. Might there be a smarter way to architect this update system for Dalit? Take a moment to analyze. Yes, youâve probably found it. It is possible and perhaps better to architect a system in which device updates are tagged with a device ID or device group ID, such that the system can automatically associate an update with the device or devices. This will eliminate our example step in which an administrator manually updates the device shadow service with a configuration that directs a device to pull down an update from the container registry. Our challenge to you: Go architect it!
Let us not forget that the system administratorâs access to the device shadow service and the container registry must be authenticated and authorized via the identity service. Figure 6.6 depicts the adminâs authentication to the device shadow service via Cognito. But although Figure 6.6 does not include the adminâs authentication to the container registry, that is just as important. How would you accomplish such authentication? There are a few optionsâutilizing a built-in authentication service such as AWS Cognito, or allowing Secure Shell (SSH)âbased direct access to the network and machine(s) that host the container registry. Both approaches make use of the identity service. Also, in either case, the principle of least privilege must be enforced to ensure that only the administrators who are designated to update containers in the container registry have those access permissions.
The Device Shadow service is popularized by AWS but can be implemented by any cloud provider or in a private cloud. It holds records of the last known state and desired future state of edge devices, even when the device is offline. The Device Shadow service publishes new desired states to a corresponding topic on the message broker, where they are be picked up by edge devices that are subscribed to the same topic. To update the edge devices, the future state contains information about the URL of the elastic container registry where the updates reside.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7817)
Robo-Advisor with Python by Aki Ranin(7718)
Offensive Shellcode from Scratch by Rishalin Pillay(6155)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(5124)
Ego Is the Enemy by Ryan Holiday(4980)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4450)
Python for ArcGIS Pro by Silas Toms Bill Parker(4224)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3942)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3694)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3290)
Liar's Poker by Michael Lewis(3240)
Speed Up Your Python with Rust by Maxwell Flitton(3236)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3199)
Extreme DAX by Michiel Rozema & Henk Vlootman(3180)
Agile Security Operations by Hinne Hettema(3128)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3118)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3087)
Cryptography Algorithms by Massimo Bertaccini(3004)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2990)
