Skip to Content
Practical Internet of Things Security - Second Edition
book

Practical Internet of Things Security - Second Edition

by Brian Russell, Drew Van Duren
November 2018
Intermediate to advanced
382 pages
11h 20m
English
Packt Publishing
Content preview from Practical Internet of Things Security - Second Edition

Policy management 

CSPs support the definition of roles, the creation of groups, and the allocation of permissions to these objects. Watson IoT, for example, supports predefined security roles to enforce access controls across the cloud IoT implementation. Three categories exist: user roles, application roles, and gateway roles.

Devices themselves can have roles applied to them, and service roles such as backend-trusted can also be configured. Administrators can also define custom roles to meet their unique system needs. The following are the predefined security roles available within Watson IoT: 

Role type Roles
User roles
  • Administrator
  • Operator
  • Developer
  • Analyst
  • Reader
Application roles
  • Standard
  • Operations
  • Backend-trusted
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Industrial Internet of Things Security

Practical Industrial Internet of Things Security

Sravani Bhattacharjee
Core Software Security

Core Software Security

James Ransome, Anmol Misra
IoT Security

IoT Security

Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila

Publisher Resources

ISBN: 9781788625821Other