AWS Public Sector Blog

Category: Technical How-to

Managing Edge of the Edge deployments with Rancher

To help support DIL environments, Amazon Web Services (AWS) created the Snow family of products to include the AWS Snowcone and AWS Snowball devices. The Snow family moves data processing and analysis as close as necessary to where data is created in order to deliver intelligent, real-time responsiveness and streamline the amount of data transferred. To address the challenges of edge of the edge computing, we use the Snowball Edge as a central management hub and a Snowcone as an outer edge device. This how-to shows how to use Rancher as a centralized Kubernetes management tool installed on a Snowball, which has been set up to manage a single-node Kubernetes cluster on a Snowcone. This configuration allows us to fully manage the containers running on one or more Snowcones from the Snowball itself.

Read More
Public sector security serverless - Darren House

How public sector security teams can use serverless technologies to improve outcomes

Serverless applications are typically discreet pieces of code that customers can use to manage security-related processes or stitch together multiple AWS services to solve a larger problem. They allow customers to build and run applications and services without dealing with infrastructure management tasks such as server or cluster provisioning, patching, operating system maintenance, and capacity provisioning. In this blog, I explain the serverless computing model, the Serverless Application Repository (SAR), solution constructs and implementations, why they matter to our government customers, and how they can use them to solve common problems.

Read More
phone notification

Building a government update notification system

Now more than ever, citizens expect effective communications from government agencies in response to COVID-19. These state and local leaders are committed to serving their citizens with the latest news as fast as possible, but not all strategies reach citizens in real time. However, it takes time for the government to implement widely available communication services to provide timely, accurate information. One solution is to concentrate the delivery of information in a single communication channel: SMS text messages.

Read More
aerial photo of doctor on laptop at desk with stethescope and chart

Adding an ingress point and data management to your healthcare data lake

Data lakes can help hospitals and healthcare organizations turn data into insights and maintain business continuity, while preserving patient privacy. A data lake is a centralized, curated, and secured repository that stores all your data, both in its original form and prepared for analysis. A data lake enables you to break down data silos and combine different types of analytics to gain insights and guide better business decisions. In my previous post, “Getting started with a healthcare data lake,” I shared how to get started using data lakes in managing healthcare data and what a good “first sprint” architecture might look like. Here, I walk through building your first solution on AWS using a healthcare data lake as our example workload.

Read More
AWSPS_2020 AI ML Week

AWS Artificial Intelligence and Machine Learning Week is back – Register now

Artificial intelligence (AI) solutions are helping solve some of the biggest short- and long-term challenges within the public sector. But how can you quickly identify new AI-powered opportunities and use cases to solve unique and specific challenges within your organization? AWS AI and ML Week, taking place from September 14-18, includes seven curated webinars from introductory to expert level. Whether you’re new to AI or an experienced machine learning developer, attend our webinars and dive into some of the most common AI use cases for the public sector from this year.

Read More
DNA Genotyping and Sequencing. A bioinformatician analyzes DNA integration data

Five things to consider when moving your research workflows to AWS

Research is done differently in the cloud than in an on-premises lab. Research labs looking to move computational research to the cloud should start with their workflows. There are common themes across computational research workflows that researchers should consider as they begin to move their research workflows to AWS.

Read More
Amazon S3 Glacier

Securing Amazon S3 Glacier with a customer-managed encryption key

Customer managed encryption keys are a common architecture requirement within highly regulated workloads. This post demonstrates how to satisfy this requirement within Amazon Simple Storage Service (Amazon S3), including Amazon S3 Glacier. We also clarify some common points of confusion and demonstrate how objects can be uploaded directly to Amazon S3 Glacier via Amazon S3, which can help meet regulatory requirements as well as potentially save budget.

Read More
CMMC compliance

How to plan for Cybersecurity Maturity Model Certification (CMMC)

Later this year, the Cybersecurity Maturity Model Certification (CMMC) accreditation framework will take effect, impacting U.S. DoD contractors, supply chain, solution providers, and systems integrators. The DoD estimates that more than 300,000 organizations will require certification. In addition, other U.S. federal agencies and international organizations may adopt a similar framework to protect their intellectual property (IP). No matter the size of your organization, cloud-based services can help you meet the requirements of CMMC.

Read More
FIPS mode

Enabling FIPS mode in Amazon Linux 2

Federal Information Processing Standard (FIPS) 140-2 specifies the security requirements for cryptographic modules that protect sensitive information. It is the current United States and Canadian government standard, and is applicable to systems that are required to be compliant with Federal Information Security Management Act (FISMA) or Federal Risk and Authorization Management Program (FedRAMP). In this blog, we demonstrate how to enable FIPS mode in Amazon Linux 2 and verify that unauthorized cryptographic functions are not being used in OpenSSL or the OpenSSH server.

Read More
The Brief May 2020

In case you missed it: May 2020 top blog posts round up

In May 2020, the AWS Public Sector Blog covered stories on the AWS Public Sector Summit Online 2020, chatbots and call centers, and open source solutions. Check out some of the top stories from the blog below. For more blog highlights from this month, you can also check out The Brief, hosted this month by Mike Colson.

Read More