AWS Public Sector Blog
Category: Security, Identity, & Compliance
The essential role of a landing zone in a government’s digital transformation
Creating a government that is more transparent, better performing, and capable of responding to the needs of its citizens in real-time is not without its challenges. Governments must navigate a complex landscape of legacy systems, stringent regulations, and the need to protect sensitive citizen data. This is when the concept of a landing zone becomes essential.
Preparing for CMMC 2.0 compliance: What contractors can do today
CMMC compliance will soon be a must-have for federal contractors, so they need to plan now for how to achieve it. The path towards compliance differs according to the level needed and the assessments involved. Fortunately, there is no shortage of resources available to help—including from Amazon Web Services (AWS) and its partners.
Deploying AWS Modular Data Center: From ordering to delivery and installation
The Amazon Web Services (AWS) Modular Data Center (MDC) is a service that enables rapid deployment of AWS managed data centers for running location- or latency-sensitive applications in locations with limited infrastructure. It reduces deployment time in remote areas and supports up to five racks of AWS Outposts or AWS Snow Family devices. In this post, we guide you through the end-to-end process of deploying the MDC at your site.
Empowering the public sector with secure, governed generative AI experimentation
The Generative AI Sandbox on AWS, powered by Amazon Bedrock Studio, provides a secure, governed, and isolated environment for organizations to explore the power of large language models (LLMs) and other generative artificial intelligence capabilities. Bedrock Studio users can test different LLMs side by side to understand which ones best suit their specific use cases: from drafting policy documents to analyzing public feedback, or creating educational content.
How AWS can help mission-focused organizations comply with the White House National Security Memorandum on AI
On October 24, 2024, the White House released a National Security Memorandum (NSM) on Artificial Intelligence (AI), which focuses on ensuring US leadership in developing advanced AI technologies. Amazon Web Services (AWS) is uniquely positioned to address the critical needs of the defense and national security customers in advancing their AI capabilities. Our comprehensive suite of AI and high performance computing (HPC) capabilities offers flexible and robust solutions to meet the NSM’s goals and empower national security missions.
Using Login.gov as an OIDC IdP with Amazon Cognito user pools
As federal agencies strive to enhance digital services and create a seamless customer experience, integrating robust identity and access management (IAM) solutions has become paramount. Amazon Cognito, a robust user identity management service offered by Amazon Web Services (AWS), provides a secure and scalable solution for managing user authentication and authorization. When combined with Login.gov, a trusted identity platform developed by the U.S. General Services Administration (GSA), federal agencies can unlock a powerful combination that streamlines user access while maintaining the highest levels of security and compliance.
Using AWS CDK to build an extensible file-scanning solution for Amazon S3 buckets
In today’s digital world, ensuring the security of information is essential. One common scenario where data security is crucial is when files from external sources are received by an organization. While Amazon Simple Storage Service (Amazon S3) provides robust security features like the default encryption of all uploaded files, there are scenarios where it’s important to ensure that the incoming files are free from any kind of malware, such as viruses, before they are processed or stored inside the organization. Read this post to learn more.
The key components of CISA’s Malcolm on Amazon EKS
Malcolm is a powerful, open source network traffic analysis tool suite created by the Cybersecurity and Infrastructure Security Agency (CISA) to aid public and private sector customers in improving their network security monitoring and incident response. Malcolm is most commonly used for incident response, network monitoring, threat hunting, training, and research, but can be adapted for other use cases. In this post, we introduce you to the key components of Malcolm on Amazon Elastic Kubernetes Service (Amazon EKS).
UNSW students build an all-electric race car with AWS
In 2023, the students from Redback Racing at the University of New South Wales (UNSW) wove together their many disciplines of engineering prowess to create their latest cars: RB23 and RB21-D. After developing and going live with their real-time telemetry system on Amazon Web Services (AWS), the team has placed as the highest-ranking Australian squad in the electric vehicle (EV) division of the Australasia Formula SAE competition, placing second overall. Read this post to learn more.
Simplify firewall deployments using centralized inspection architecture with Gateway Load Balancer
As government organizations transition to Amazon Web Services (AWS), they often seek to maintain operational continuity by using their existing on-premises firewall solutions. Gateway Load Balancer (GWLB) enables seamless integration of these firewall appliances into the AWS architecture, ensuring consistent security policies and minimizing disruptions. This post explores best practices for implementing GWLB to facilitate centralized traffic inspection for both east-west and north-south traffic flows.