io-key
25
>
14.1
Security
Content
Mobile data transmission ........................................................................................................................25
Data storage and data processing .........................................................................................................25
Data transmission from the cloud to the customer .................................................................................25
User administration and access control .................................................................................................26
59426
>
14.1.1
Mobile data transmission
59427
The mobile service of all io-keys used by the customer is switched in the mobile service provider's own
M2M/IoT Access Point Name (APN). The data is transferred directly from the M2M/IoT service
gateway to the ifm cloud via Cloud Interconnect.
>
APN
59428
The mobile access point (APN) defines the way how the AIK050 connects to the mobile radio network.
The AIK050 connects itself via the APN with the M2M/IoT application in the ifm cloud. Each AIK050
receives a dedicated private IP address from the mobile operator network.
>
14.1.2
Data storage and data processing
59429
The ifm cloud is run on servers operated in Germany.
ifm cloud is hosted at Amazon Web Services (AWS). AWS is certified according to ISO 27001, DSS
and other standards. It provides extensive physical security measures and is subject to independent
audits. For security reasons, not all details will be published.
Each sub-client (also called tenant) of the ifm cloud is operated in a separate instance. This prevents
data from being swapped between sub-clients.
>
14.1.3
Data transmission from the cloud to the customer
59430
ifm cloud ensures that your data will remain confidential and cannot be manipulated by an end-to-end
implementation of HTTPS from devices to applications. It uses state-of-the-art encryption technology
that has been independently rated "A" by SSLlabs. Every communication with ifm cloud is subject to
individual authentication and authorisation.
Agents communicate with the ifm cloud via HTTPS to send and receive data. IoT applications also use
HTTPS for communication. Thanks to this, the entire path from agent to end user is secured.
>
Agents
59431
In order to protect machine-to-machine applications from being accessed, ifm.cloud uses agents. An
agent is a function that performs three tasks for a specific manufacturer and device type:
•
It translates the device-specific interface protocol into a single reference protocol.
•
It translates the specific domain model of the device into a reference domain model.
•
It enables secure remote communication in various network architectures.