AWS Public Sector Blog
Category: Technical How-to
How public sector security teams can use serverless technologies to improve outcomes
Serverless applications are typically discreet pieces of code that customers can use to manage security-related processes or stitch together multiple AWS services to solve a larger problem. They allow customers to build and run applications and services without dealing with infrastructure management tasks such as server or cluster provisioning, patching, operating system maintenance, and capacity provisioning. In this blog, I explain the serverless computing model, the Serverless Application Repository (SAR), solution constructs and implementations, why they matter to our government customers, and how they can use them to solve common problems.
Building a government update notification system
Now more than ever, citizens expect effective communications from government agencies in response to COVID-19. These state and local leaders are committed to serving their citizens with the latest news as fast as possible, but not all strategies reach citizens in real time. However, it takes time for the government to implement widely available communication services to provide timely, accurate information. One solution is to concentrate the delivery of information in a single communication channel: SMS text messages.
Adding an ingress point and data management to your healthcare data lake
Data lakes can help hospitals and healthcare organizations turn data into insights and maintain business continuity, while preserving patient privacy. A data lake is a centralized, curated, and secured repository that stores all your data, both in its original form and prepared for analysis. A data lake enables you to break down data silos and combine different types of analytics to gain insights and guide better business decisions. In my previous post, “Getting started with a healthcare data lake,” I shared how to get started using data lakes in managing healthcare data and what a good “first sprint” architecture might look like. Here, I walk through building your first solution on AWS using a healthcare data lake as our example workload.
AWS Artificial Intelligence and Machine Learning Week is back – Register now
Artificial intelligence (AI) solutions are helping solve some of the biggest short- and long-term challenges within the public sector. But how can you quickly identify new AI-powered opportunities and use cases to solve unique and specific challenges within your organization? AWS AI and ML Week, taking place from September 14-18, includes seven curated webinars from introductory to expert level. Whether you’re new to AI or an experienced machine learning developer, attend our webinars and dive into some of the most common AI use cases for the public sector from this year.
Five things to consider when moving your research workflows to AWS
Research is done differently in the cloud than in an on-premises lab. Research labs looking to move computational research to the cloud should start with their workflows. There are common themes across computational research workflows that researchers should consider as they begin to move their research workflows to AWS.
Securing Amazon S3 Glacier with a customer-managed encryption key
Customer managed encryption keys are a common architecture requirement within highly regulated workloads. This post demonstrates how to satisfy this requirement within Amazon Simple Storage Service (Amazon S3), including Amazon S3 Glacier. We also clarify some common points of confusion and demonstrate how objects can be uploaded directly to Amazon S3 Glacier via Amazon S3, which can help meet regulatory requirements as well as potentially save budget.
How to plan for Cybersecurity Maturity Model Certification (CMMC)
Later this year, the Cybersecurity Maturity Model Certification (CMMC) accreditation framework will take effect, impacting U.S. DoD contractors, supply chain, solution providers, and systems integrators. The DoD estimates that more than 300,000 organizations will require certification. In addition, other U.S. federal agencies and international organizations may adopt a similar framework to protect their intellectual property (IP). No matter the size of your organization, cloud-based services can help you meet the requirements of CMMC.
Enabling FIPS mode in Amazon Linux 2
Federal Information Processing Standard (FIPS) 140-2 specifies the security requirements for cryptographic modules that protect sensitive information. It is the current United States and Canadian government standard, and is applicable to systems that are required to be compliant with Federal Information Security Management Act (FISMA) or Federal Risk and Authorization Management Program (FedRAMP). In this blog, we demonstrate how to enable FIPS mode in Amazon Linux 2 and verify that unauthorized cryptographic functions are not being used in OpenSSL or the OpenSSH server.
In case you missed it: May 2020 top blog posts round up
In May 2020, the AWS Public Sector Blog covered stories on the AWS Public Sector Summit Online 2020, chatbots and call centers, and open source solutions. Check out some of the top stories from the blog below. For more blog highlights from this month, you can also check out The Brief, hosted this month by Mike Colson.
How to run Schneider Electric’s Responder OMS using AWS Transit Gateway multicast
Government agencies and public sector organizations in energy and utilities rely on smart solutions to detect, locate, and fix utilities outages faster based on input from their customer contact centers and field crews. One popular outage management solution (OMS) is Schneider Electric’s ArcFM Responder (Responder) OMS. In this post, we discuss how to deploy the Schneider Electric’s Responder environment on AWS.