

# Resources
<a name="resources-sec"></a>

 Refer to the following resources to learn more about our best practices for security: 

 **Documentation and blogs** 
+  [AWS IoT Device Management](https://aws.amazon.com/iot-device-management/features/) features 
+  [Security in AWS IoT](https://docs.aws.amazon.com/iot/latest/developerguide/iot-security-identity.html) 
+  [AWS IoT Device Defender](https://docs.aws.amazon.com/iot/latest/developerguide/device-defender.html) 
+  [AWS IoT SiteWise](https://docs.aws.amazon.com/iot-sitewise/latest/userguide/what-is-sitewise.html) 
+  [Authentication](https://docs.aws.amazon.com/iot/latest/developerguide/iot-authentication.html) 
+  [MQTT with TLS client authentication on port 443: Why it is useful and how it works](https://aws.amazon.com/blogs/iot/mqtt-with-tls-client-authentication-on-port-443-why-it-is-useful-and-how-it-works/) 
+  [MQTT 5 supported features](https://docs.aws.amazon.com/iot/latest/developerguide/mqtt.html#mqtt5) 
+  [Assessing OT and IIoT cybersecurity risk](https://aws.amazon.com/blogs/iot/assessing-ot-and-iiot-cybersecurity-risk/) 
+  [Detect anomalies on connected devices using AWS IoT Device Defender](https://aws.amazon.com/blogs/iot/detect-anomalies-connected-devices/) 
+  [Implement security monitoring across OT, IIoT and cloud with AWS Security Hub CSPM](https://aws.amazon.com/blogs/iot/implement-security-monitoring-across-ot-iiot-and-cloud-with-aws-security-hub/) 
+  [Using AWS IoT Core with interface VPC endpoints](https://docs.aws.amazon.com/iot/latest/developerguide/IoTCore-VPC.html) 
+  [AWS IoT secure tunneling](https://docs.aws.amazon.com/iot/latest/developerguide/secure-tunneling.html) 
+  [AWS Systems Manager](https://docs.aws.amazon.com/systems-manager/latest/userguide/what-is-systems-manager.html) 
+  [Network-to-Amazon VPC connectivity options](https://docs.aws.amazon.com/whitepapers/latest/aws-vpc-connectivity-options/network-to-amazon-vpc-connectivity-options.html) 
+  [Ten security golden rules for Industrial IoT solutions](https://aws.amazon.com/blogs/iot/ten-security-golden-rules-for-industrial-iot-solutions/) 
+  [Ten security golden rules for connected mobility solutions](https://aws.amazon.com/blogs/iot/ten-security-golden-rules-for-connected-mobility-solutions/) 
+  [AWS Security Incident Response Guide](https://d1.awsstatic.com/whitepapers/aws_security_incident_response.pdf) 
+  [AWS Backup](https://aws.amazon.com/backup/?whats-new-cards.sort-by=item.additionalFields.postDateTime&whats-new-cards.sort-order=desc) 

 **Whitepapers** 
+  [Designing MQTT Topics for AWS IoT Core](https://docs.aws.amazon.com/whitepapers/latest/designing-mqtt-topics-aws-iot-core/designing-mqtt-topics-aws-iot-core.html?did=wp_card&trk=wp_card) 
+  [Security Best Practices in Manufacturing OT](https://d1.awsstatic.com/whitepapers/security-bp-for-manufacturing-ot.pdf) 
+  [Securing Internet of Things (IoT) with AWS](https://d1.awsstatic.com/whitepapers/Security/Securing_IoT_with_AWS.pdf) 
+  [Device Manufacturing and Provisioning with X.509 Certificates in AWS IoT Core](https://d1.awsstatic.com/whitepapers/device-manufacturing-provisioning.pdf) 