AWS Public Sector Blog

Tag: AWS Security Hub

Building a secure and low-code bioinformatics workbench on AWS HealthOmics

Singapore General Hospital (SGH), SingHealth Office of Academic Informatics (OAI), and Amazon Web Services (AWS) collaborated to develop a cost-effective, scalable cloud infrastructure that enables researchers to perform their own analyses on a centrally secured and compliant cloud platform. AWS HealthOmics offers a suite of services that help bioinformaticians, researchers, and scientists to store, query, analyze, and generate insights from genomic and other biological data. Read this post to learn more about the three primary components of HealthOmics used in the solution.

AWS branded background design with text overlay that says "University of British Columbia Cloud Innovation Centre: Governing an innovation hub using AWS management services"

University of British Columbia Cloud Innovation Centre: Governing an innovation hub using AWS management services

In January 2020, Amazon Web Services (AWS) inaugurated a Cloud Innovation Centre (CIC) at the University of British Columbia (UBC). The CIC uses emerging technologies to solve real-world problems and has produced more than 50 prototypes in sectors like healthcare, education, and research. The Centre’s work has involved 300-plus AWS accounts across various groups, including external collaborators, UBC staff, students, and researchers. This post discusses the management of AWS in higher education institutions, emphasizing governance to securely foster innovation without compromising security and detailing policies and responsibilities for managing AWS accounts across projects and research.

AWS branded background design with text overlay that says "Streamlining digital transformation in German healthcare with AWS"

Streamlining digital transformation in German healthcare with AWS

Healthcare organizations worldwide are leveraging Amazon Web Services (AWS) and partner solutions to modernize, transform, and innovate their businesses. Ensuring the availability and security of critical applications is paramount. For example, two renowned German medical facilities, Fachklinikum Mainschleife and Max Grundig Klinik, needed to modernize their IT infrastructure to comply with stringent regulatory requirements outlined in the country’s Law for Accelerating the Digitalization of Healthcare (DigiG). Reliable and compliant service offerings from AWS enabled the medical facilities to provide reliable access to essential systems.

AWS branded background design with text overlay that says "Building compliant healthcare solutions using Landing Zone Accelerator"

Building compliant healthcare solutions using Landing Zone Accelerator

In this post, we explore the complexities of data privacy and controls on Amazon Web Services (AWS), examine how creating a landing zone within which to contain such data is important, and highlight the differences between creating a landing zone from scratch compared with using the AWS Landing Zone Accelerator (LZA) for Healthcare. To aid explanation, we use a simple healthcare workload as an example. We also explain how LZA for Healthcare codifies HIPAA controls and AWS Security Best Practices to accelerate the creation of an environment to run protective health information workloads in AWS.

How Livingston Parish prepares for natural disasters by improving resiliency in the cloud

Natural disasters are devastating, often resulting in loss of life, massive property damage, and damage to the critical infrastructure that powers emergency services. This can prompt public sector organizations to consider building more resilient infrastructure. Such was the case for the 911 system in Livingston Parish, Louisiana, an agency that dispatches for 21 public safety agencies including law enforcement, fire, and emergency medical services, and averages over 325 calls for service per day. After a major flood in 2016 knocked out their 911 system, they worked with AWS Partner TailorBuilt Solutions, LLC. to use AWS to become resilient against disaster, reducing service interruptions and improving response times.

What US federal customers need to know about memorandum M-21-31

The US Office of Management and Budget published M-21-31, a memorandum for federal government agencies to define event logging requirements related to cybersecurity incidents. These guidelines aim to support the detection, investigation, and remediation of cyber incidents on federal information systems. The memorandum defines various event logging (EL) tiers and the log data that must be captured for various log categories. Learn the services from AWS that have been called out explicitly in the memorandum for logging and retention requirements at the EL1 level, and the resources you can use to set up these services to capture the required log data.

AWS announces low-to-no cost security services for federal political campaigns and committees

It is essential for election campaigns and committees to have access to the latest security services so they can mitigate risks against security threats at minimal cost. To support this, AWS is collaborating with Defending Digital Campaigns (DDC) to offer more than 20 cybersecurity-related AWS services for low-to-no cost to all active and registered national party committees and federal candidate committees for the US House and US Senate midterm elections that are eligible in accordance with DDC and Federal Election Commission (FEC) criteria.

AWS resources to address Apache Log4j vulnerabilities

This post aims to provide a summary of all the currently disclosed Apache Log4j issues as well as important resources that Amazon Web Services (AWS) has released to help our customers and partners limit any risks posed by these issues.

Automate security orchestration in AWS Security Hub with Trend Micro Cloud One

As organizations mature in their cybersecurity capabilities, they are looking to try and leverage automation to reduce the operational burden of alerting, detecting, and responding to threats. This blog post walks through how to combine findings from disparate security systems into a single operational view to help analysts identify, respond, and remediate existing threats while maintaining a dynamic response platform that scales with their environment.