Operational security is a top priority when selecting IoT platforms and weâ€™re proud to say that Watson IoT Platform regularly proves its mettle in meeting and exceeding the exacting security expectations of IoT innovators.
Weâ€™ve blogged before about the robust security standards supported by Watson IoT Platform. These complement the use of open standard secure communications protocols, such as TLS v1.2, that ensure IoT device interactions are authenticated and encrypted. Further, the Watson IoT Platform benefits from Bluemix and Softlayer operational security capabilities compliant with a wide range of Industry Standards.
So, with robust operational platform security in place, how can you configure and manage a security environment appropriate for your device, application and user requirements?
Watson IoT Platform now offers configuration and management of Roles which enable controls to be defined for Users, Applications and Gateways. Configuration of Role permissions grant or restrict the ability to perform particular platform operations. The Watson IoT Platform now allows the categorization of Users, Applications, and Gateways into logical access action classes, called Roles.Â The Roles provide flexibility by controlling the level of access Users, Applications and Gateways have when interacting with services and data within the Watson IoT Platform.Â This introduces a way to specify the allowed behaviors for different types of Users, Applications and Gateways within the platform at a much increased level of granularity.
Watson IoT Platform offers five different predefined roles for Users, six different predefined roles for Applications and two different predefined roles for Gateways. Defining Role permissions at such a level is a robust and accurate way to protect and manage interaction with your IoT resources. It provides options for validating role authorization to create, access, update and delete services and data within platform.
Now, for example, you can:
- Distinguish between Users able to perform privileged operations such as configure services and resources in the Watson IoT Platform and Users only able to view the data intended for them relating to pre-configured services. ThisÂ ensures that data resources are accurately managed and not accessed or changed for unintended purposes.
- Assign privilege to trusted Gateways to create or activate devices.Â This reduces manual administration, and improves automated device provisioning, whilst controlling interaction with Gateways outside the trusted portion of the network.
- Specify Applications able to issue device commands and initiate device management actions distinguishing them from application simply able to subscribed to device events or view device information.Â This protects your solution from unexpected application behavior.
With Role based access control the integrity of Wason IoT Platform is enhanced making your solution more secure. You can read more about the full range of the new Role based security capabilities in the Official Watson IoT Platform Documentation.