AWS Public Sector Blog

Category: Security, Identity, & Compliance

Banner image with headline, "The essential role of a landing zone in a government’s digital transformation"

The essential role of a landing zone in a government’s digital transformation

Creating a government that is more transparent, better performing, and capable of responding to the needs of its citizens in real-time is not without its challenges. Governments must navigate a complex landscape of legacy systems, stringent regulations, and the need to protect sensitive citizen data. This is when the concept of a landing zone becomes essential.

Banner image with headline, "Preparing for CMMC 2.0 compliance: What contractors can do today"

Preparing for CMMC 2.0 compliance: What contractors can do today

CMMC compliance will soon be a must-have for federal contractors, so they need to plan now for how to achieve it. The path towards compliance differs according to the level needed and the assessments involved. Fortunately, there is no shortage of resources available to help—including from Amazon Web Services (AWS) and its partners.

AWS branded background design with text overlay that says "Deploying AWS Modular Data Center: From ordering to delivery and installation"

Deploying AWS Modular Data Center: From ordering to delivery and installation

The Amazon Web Services (AWS) Modular Data Center (MDC) is a service that enables rapid deployment of AWS managed data centers for running location- or latency-sensitive applications in locations with limited infrastructure. It reduces deployment time in remote areas and supports up to five racks of AWS Outposts or AWS Snow Family devices. In this post, we guide you through the end-to-end process of deploying the MDC at your site.

AWS branded background design with text overlay that says "Empowering the public sector with secure, governed generative AI experimentation"

Empowering the public sector with secure, governed generative AI experimentation

The Generative AI Sandbox on AWS, powered by Amazon Bedrock Studio, provides a secure, governed, and isolated environment for organizations to explore the power of large language models (LLMs) and other generative artificial intelligence capabilities. Bedrock Studio users can test different LLMs side by side to understand which ones best suit their specific use cases: from drafting policy documents to analyzing public feedback, or creating educational content.

AWS branded background design with text overlay that says "How AWS can help mission-focused organizations comply with the White House National Security Memorandum on AI"

How AWS can help mission-focused organizations comply with the White House National Security Memorandum on AI

On October 24, 2024, the White House released a National Security Memorandum (NSM) on Artificial Intelligence (AI), which focuses on ensuring US leadership in developing advanced AI technologies. Amazon Web Services (AWS) is uniquely positioned to address the critical needs of the defense and national security customers in advancing their AI capabilities. Our comprehensive suite of AI and high performance computing (HPC) capabilities offers flexible and robust solutions to meet the NSM’s goals and empower national security missions.

AWS branded background design with text overlay that says "Using Login.gov as an OIDC IdP with Amazon Cognito user pools"

Using Login.gov as an OIDC IdP with Amazon Cognito user pools

As federal agencies strive to enhance digital services and create a seamless customer experience, integrating robust identity and access management (IAM) solutions has become paramount. Amazon Cognito, a robust user identity management service offered by Amazon Web Services (AWS), provides a secure and scalable solution for managing user authentication and authorization. When combined with Login.gov, a trusted identity platform developed by the U.S. General Services Administration (GSA), federal agencies can unlock a powerful combination that streamlines user access while maintaining the highest levels of security and compliance.

AWS branded background design with text overlay that says "Using AWS CDK to build an extensible file-scanning solution for Amazon S3 buckets"

Using AWS CDK to build an extensible file-scanning solution for Amazon S3 buckets

In today’s digital world, ensuring the security of information is essential. One common scenario where data security is crucial is when files from external sources are received by an organization. While Amazon Simple Storage Service (Amazon S3) provides robust security features like the default encryption of all uploaded files, there are scenarios where it’s important to ensure that the incoming files are free from any kind of malware, such as viruses, before they are processed or stored inside the organization. Read this post to learn more.

AWS branded background design with text overlay that says "The key components of CISA’s Malcolm on Amazon EKS"

The key components of CISA’s Malcolm on Amazon EKS

Malcolm is a powerful, open source network traffic analysis tool suite created by the Cybersecurity and Infrastructure Security Agency (CISA) to aid public and private sector customers in improving their network security monitoring and incident response. Malcolm is most commonly used for incident response, network monitoring, threat hunting, training, and research, but can be adapted for other use cases. In this post, we introduce you to the key components of Malcolm on Amazon Elastic Kubernetes Service (Amazon EKS).

AWS branded background design with text overly that says "UNSW Students build an all-electric race car with AWS"

UNSW students build an all-electric race car with AWS

In 2023, the students from Redback Racing at the University of New South Wales (UNSW) wove together their many disciplines of engineering prowess to create their latest cars: RB23 and RB21-D. After developing and going live with their real-time telemetry system on Amazon Web Services (AWS), the team has placed as the highest-ranking Australian squad in the electric vehicle (EV) division of the Australasia Formula SAE competition, placing second overall. Read this post to learn more.

AWS branded background design with text overlay that says "Simplify firewall deployments using centralized inspection architecture with Gateway Load Balancer"

Simplify firewall deployments using centralized inspection architecture with Gateway Load Balancer

As government organizations transition to Amazon Web Services (AWS), they often seek to maintain operational continuity by using their existing on-premises firewall solutions. Gateway Load Balancer (GWLB) enables seamless integration of these firewall appliances into the AWS architecture, ensuring consistent security policies and minimizing disruptions. This post explores best practices for implementing GWLB to facilitate centralized traffic inspection for both east-west and north-south traffic flows.