AWS Public Sector Blog

Category: Security

AWS branded background design with text overlay that says "AWS Marketplace assessed ‘Awardable’ for DoD work in the P1 Solutions Marketplace"

AWS Marketplace assessed ‘Awardable’ for DoD work in the P1 Solutions Marketplace

Amazon Web Services (AWS) is pleased to announce that AWS Marketplace has received “Awardable” status in the Department of Defense (DoD) Platform One (P1) Solutions Marketplace. This designation enables DoD organizations to readily access and procure solutions through AWS Marketplace using established acquisition pathways.

AWS branded background design with text overlay that says "Self-hosting source code of the Landing Zone Accelerator on AWS "

Self-hosting source code of the Landing Zone Accelerator on AWS

Some customers using Amazon Web Services (AWS) prohibit users from installing software from public sources. Recently, the Landing Zone Accelerator on AWS (LZA) solution added optional capabilities to support this use case. Instead of installing directly from the public LZA GitHub repository, which is the default installation path for most customers, LZA can be self-hosted from your own Amazon Simple Storage Service (Amazon S3) bucket. This post shows the technical steps necessary to install LZA using Amazon S3.

AWS branded background design with text overlay that says "Securely onboarding countries to the AWS Cloud"

Securely onboarding countries to the AWS Cloud

In an increasingly digital world, governments and public sector entities are seeking secure and efficient ways to use cloud technologies. As we’ve innovated and expanded the Amazon Web Services (AWS) Cloud, we continue to prioritize making sure customers are in control and able to meet their national regulatory requirements. In this post, we share how AWS is collaborating with national cyber regulators and other public sector entities to enable secure adoption of the AWS Cloud across countries’ public sectors.

AWS branded background design with text overlay that says "Securely running AI algorithms for 100,000 users on private data"

Securely running AI algorithms for 100,000 users on private data

This post explores the architectural design and security concepts employed by Radboud University Medical Center Nijmegen (Radboudumc) to build a secure artificial intelligence (AI) runtime environment on Amazon Web Services (AWS). Business leaders dealing with sensitive or regulated data will find this post invaluable because it demonstrates a proven approach to using the power of AI while maintaining strict data privacy and security standards.

AWS branded background design with text overlay that says "NATO’s march to multi-domain operations: Transforming the alliance with hyperscale cloud"

NATO’s march to multi-domain operations: Transforming the alliance with hyperscale cloud

Across NATO’s 32 member states, today’s rapidly evolving threat landscape requires continuous modernization of advanced technology solutions, underscoring the strategic importance of the alliance’s digital transformation. This modernization effort demands speed, scale, security, and global innovation capabilities to stay ahead. Collaborating with technology leaders like Amazon Web Services (AWS) can accelerate innovation and NATO’s ability to deliver mission-ready solutions to counter known and emerging threats.

AWS branded background design with text overlay that says "Enabling AI leadership in the age of government efficiency"

Enabling AI leadership in the age of government efficiency

Global leaders are convening in Germany this week at the annual Munich Security Conference (MSC) to discuss key foreign policy and security challenges. Amid these discussions, one thing is clear: global leadership increasingly hinges on technological progress. In particular, the rapid progress of artificial intelligence (AI) presents an extraordinary opportunity for transformative innovation. For the U.S. government, this moment marks a crucial inflection point: embrace bold modernization of digital infrastructure and AI investment or risk being outpaced by global competitors.

AWS branded background image with text overlay that says "Unlock the power of fine-grained access control with Amazon Verified Permissions"

Unlock the power of fine-grained access control with Amazon Verified Permissions

Public sector organizations face stringent compliance requirements, and any unauthorized access to protected health information (PHI) or personal identifiable information (PII) can result in legal penalties and reputational damage. This post aims to demonstrate how public sector customers can develop a fine-grained authorization module using Amazon Web Services (AWS) identity services, extending beyond the capabilities of traditional role-based access control (RBAC), so they can achieve compliance objectives.

AWS branded background design with text overlay that says "Establishing a robust cloud platform and operational model through the CCoE"

Establishing a robust cloud platform and operational model through the CCoE

This post is part three of a four-part series that addresses how a Cloud Center of Excellence (CCoE) can be a viable solution to address the challenges of digital transformation. In this post, we address the three technical perspectives of the Amazon Web Services Cloud Adoption Framework (AWS CAF). While the business, organizational, and governance perspectives of the AWS CAF are crucial, the CCoE must also focus on the technical capabilities required to build and operate a cloud environment that meets the organization’s needs.

AWS branded background design with text overlay that says "Allies can share data and technologies and remain compliant with international regulations using AWS"

Allies can share data and technologies and remain compliant with international regulations using AWS

National security and defense depend upon close collaboration between international allies. To protect sensitive data and promote robust cybersecurity frameworks, organizations must consider one another’s compliance requirements. One such requirement is the United States International Traffic in Arms Regulations (ITAR), which restricts and controls the export of defense and military-related technologies in order to safeguard US national security. Here, we set out how an innovation called Trusted Secure Enclaves (TSE) on Amazon Web Services (AWS) allows non-US national organizations who want to use the most modern and innovative technology to deliver defense and security missions using the cloud can do this and be compliant.

AWS branded background design with text overlay that says "Securing the future of healthcare in the age of generative AI and connected care"

Securing the future of healthcare in the age of generative AI and connected care

The healthcare industry is undergoing a profound transformation, driven by the adoption of generative artificial intelligence (AI), cloud computing, and connected care devices. This digital revolution promises to improve patient outcomes, reduce costs, and enhance the overall healthcare experience. However, it also introduces new challenges in terms of cybersecurity, privacy, and regulatory compliance. To navigate this complex landscape, healthcare organizations are turning to scalable, affordable, and highly available cloud infrastructures such as Amazon Web Services (AWS) to build resilient, secure, and innovative solutions.