AWS Public Sector Blog

Category: Best Practices

AWS branded background with text "Practical digital sovereignty: Navigating the pillars of compliance, continuity, and control"

Practical digital sovereignty: Navigating the pillars of compliance, continuity, and control

In this series of blog posts, we will examine digital sovereignty and provide practical steps you can apply to your AWS workloads and environments to address the requirements of your business. This post is the first in the series and introduces the topic, exploring the concepts and explaining how you can practically implement them.

AWS branded background with text Six best practices for building resilient higher-education applications on AWS"

Six best practices for building resilient higher-education applications on AWS

Over the past five years, a world-renowned higher education institution has partnered with AWS and AWS Partner EPI-USE to modernize its most critical applications. The result: a serverless, multi-Region, and secure architecture built with the AWS Cloud Development Kit (AWS CDK) that transforms how the institution delivers technology services. This modernization effort revealed six essential best practices that any higher education CIO, CTO, or enterprise architect can implement to strengthen institutional resilience and future-proof their technology infrastructure.

AWS branded background with text "Building national foundation models"

Building national foundation models

This post examines real-world examples of successful national AI programs, explores the hidden economics that make AWS Cloud infrastructure essential, and discusses why cultural sovereignty matters as much as technical capability. Whether you’re planning a national AI strategy or evaluating infrastructure options, these lessons from global leaders will help you avoid common pitfalls and focus resources where they matter most.

A person is holding a cell phone and typing on a laptop. The laptop screen shows a green lock symbol. Concept of security and protection

How to secure communications beyond encryption with AWS Wickr

Read this post to learn about AWS Wickr, a messaging and collaboration service that protects messaging, calling, file sharing, screen sharing, and location sharing with 256-bit end-to-end encryption (E2EE). Wickr combines advanced security for sensitive communications, administrative controls for user and policy management, and data retention for auditing and regulatory needs.

AWS branded background with text "Government efficiency through AI-driven IT modernization with AFS and AWS partnership"

Government efficiency through AI-driven IT modernization with AFS and AWS partnership

Federal agencies are at a pivotal juncture in their technological evolution. Legacy systems, some dating back to the 1960s and 1970s, continue to power essential government services while facing a challenge: the retirement of the workforce that understands and maintains them. Rebecca Wetherly, director of worldwide public sector global system integrator partners at AWS recently sat down with Denise Zheng, chief AI officer at Accenture Federal Services (AFS), to discuss how artificial intelligence (AI) and modernization can help agencies navigate this transition while improving service delivery to citizens.