AWS Public Sector Blog

Category: Best Practices

AWS branded background with text "Practical digital sovereignty: Navigating the pillars of compliance, continuity, and control"

Practical digital sovereignty: Navigating the pillars of compliance, continuity, and control

In this series of blog posts, we will examine digital sovereignty and provide practical steps you can apply to your AWS workloads and environments to address the requirements of your business. This post is the first in the series and introduces the topic, exploring the concepts and explaining how you can practically implement them.

AWS branded background with text Six best practices for building resilient higher-education applications on AWS"

Six best practices for building resilient higher-education applications on AWS

Over the past five years, a world-renowned higher education institution has partnered with AWS and AWS Partner EPI-USE to modernize its most critical applications. The result: a serverless, multi-Region, and secure architecture built with the AWS Cloud Development Kit (AWS CDK) that transforms how the institution delivers technology services. This modernization effort revealed six essential best practices that any higher education CIO, CTO, or enterprise architect can implement to strengthen institutional resilience and future-proof their technology infrastructure.

AWS branded background with text "Building national foundation models"

Building national foundation models

This post examines real-world examples of successful national AI programs, explores the hidden economics that make AWS Cloud infrastructure essential, and discusses why cultural sovereignty matters as much as technical capability. Whether you’re planning a national AI strategy or evaluating infrastructure options, these lessons from global leaders will help you avoid common pitfalls and focus resources where they matter most.

A person is holding a cell phone and typing on a laptop. The laptop screen shows a green lock symbol. Concept of security and protection

How to secure communications beyond encryption with AWS Wickr

Read this post to learn about AWS Wickr, a messaging and collaboration service that protects messaging, calling, file sharing, screen sharing, and location sharing with 256-bit end-to-end encryption (E2EE). Wickr combines advanced security for sensitive communications, administrative controls for user and policy management, and data retention for auditing and regulatory needs.