Clone this wiki locally
There are a number of ways to add security to an MQTT environment to meet various security challenges. Different implementations may offer different sets of security features.
The following table describes some of these challenges and associated controls:
|Security Challenge||Suggested Controls|
|Unencrypted communications||Communications Encryption Options|
|Require Authentication||Authentication Features|
|Require Authorization Rules||Authorization Features|
|Server Configuration Control||Server Security Considerations|