AWS Public Sector Blog
Category: Security, Identity, & Compliance
Enabling AI leadership in the age of government efficiency
Global leaders are convening in Germany this week at the annual Munich Security Conference (MSC) to discuss key foreign policy and security challenges. Amid these discussions, one thing is clear: global leadership increasingly hinges on technological progress. In particular, the rapid progress of artificial intelligence (AI) presents an extraordinary opportunity for transformative innovation. For the U.S. government, this moment marks a crucial inflection point: embrace bold modernization of digital infrastructure and AI investment or risk being outpaced by global competitors.
Unlock the power of fine-grained access control with Amazon Verified Permissions
Public sector organizations face stringent compliance requirements, and any unauthorized access to protected health information (PHI) or personal identifiable information (PII) can result in legal penalties and reputational damage. This post aims to demonstrate how public sector customers can develop a fine-grained authorization module using Amazon Web Services (AWS) identity services, extending beyond the capabilities of traditional role-based access control (RBAC), so they can achieve compliance objectives.
Establishing a robust cloud platform and operational model through the CCoE
This post is part three of a four-part series that addresses how a Cloud Center of Excellence (CCoE) can be a viable solution to address the challenges of digital transformation. In this post, we address the three technical perspectives of the Amazon Web Services Cloud Adoption Framework (AWS CAF). While the business, organizational, and governance perspectives of the AWS CAF are crucial, the CCoE must also focus on the technical capabilities required to build and operate a cloud environment that meets the organization’s needs.
Data ingress and egress through Trusted Research Environments and other secure enclaves
Data Review & Transfer Component (DRTC) on Amazon Web Services (AWS) provides a seamless solution to review, approve, and automate sensitive data transfer requests into and out of secure enclaves. In this post, we take you through the benefits of using DRTC to review data and other research artifacts for sensitivity prior to transfer into and out of these secure environments, in particular Trusted Research Environments (TREs).
Building zero trust for the Department of Defense: Insights from Les Call, Director of the DoD CIO ZT PfMO
In today’s digital landscape, federal agencies face unprecedented challenges in securing their complex information technology (IT) infrastructure. Traditional security models require more capability, which is why departments like the Department of Defense (DoD) and the Cybersecurity and Infrastructure Security Agency (CISA) are mandating zero trust architectures across their agencies. Renzo Rodriguez, managing director of US Federal Solutions Architecture at Amazon Web Services (AWS), sat down with Les Call, director of the Department of Defense CIO Zero Trust Portfolio Management Office, in a recent episode of “Mission Innovation, powered by AWS,” to explore the challenges and strategies of implementing zero trust within the DoD. Read this post for a recap of their conversation.
Allies can share data and technologies and remain compliant with international regulations using AWS
National security and defense depend upon close collaboration between international allies. To protect sensitive data and promote robust cybersecurity frameworks, organizations must consider one another’s compliance requirements. One such requirement is the United States International Traffic in Arms Regulations (ITAR), which restricts and controls the export of defense and military-related technologies in order to safeguard US national security. Here, we set out how an innovation called Trusted Secure Enclaves (TSE) on Amazon Web Services (AWS) allows non-US national organizations who want to use the most modern and innovative technology to deliver defense and security missions using the cloud can do this and be compliant.
Higher Education Community Vendor Assessment Toolkit now available on AWS Artifact
EDUCAUSE and the Shared Assessments working group collaborated with Internet2 and REN-ISAC, to create the Higher Education Community Vendor Assessment Toolkit (HECVAT). EDUCAUSE is a non-profit association committed to advancing the use of technology and data in higher education. The HECVAT is a third-party, vendor questionnaire framework designed for higher education institutions to evaluate the security and privacy posture of cloud and technology providers. It is intended to centralize vendor security and compliance information for ease of use. Amazon Web Services (AWS) now offers both the HECVAT Lite version and Full version to customers on-demand.
Using AWS for EHDS: A technical guide to building a secure health data platform
In an earlier post, Build secure and scalable data platforms for the European Health Data Space (EHDS) with AWS, we discussed a reference architecture for building secure and scalable data platforms for secondary usage of health data in alignment with the European Health Data Space (EHDS) using Amazon Web Services (AWS). This follow-up post walks you through the technical implementation details for building such federated data governance and analysis platforms using AWS. Whether you are a healthcare organization, technology provider, or systems integrator, this post aims to equip you with the technical knowledge to build a secure data platform for secondary usage of health data in alignment with the EHDS Regulation.
Data dissemination for public sector on AWS
Sharing data is essential for organizations to make informed decisions and foster innovation. Amazon Web Services (AWS) offers a variety of tools and services to help distribute data securely and at scale. Whether it’s sharing public data for the common good, monetizing private datasets for business purposes, or collaborating with colleagues, AWS provides the necessary infrastructure and support. Read this post to learn more.
Securing the future of healthcare in the age of generative AI and connected care
The healthcare industry is undergoing a profound transformation, driven by the adoption of generative artificial intelligence (AI), cloud computing, and connected care devices. This digital revolution promises to improve patient outcomes, reduce costs, and enhance the overall healthcare experience. However, it also introduces new challenges in terms of cybersecurity, privacy, and regulatory compliance. To navigate this complex landscape, healthcare organizations are turning to scalable, affordable, and highly available cloud infrastructures such as Amazon Web Services (AWS) to build resilient, secure, and innovative solutions.