AWS Public Sector Blog

Category: Security, Identity, & Compliance

Enabling resilient hybrid edge architectures with AWS

Enabling resilient hybrid edge architectures with AWS

Organizations operating in austere environments require robust, resilient architectures that maintain operations regardless of connectivity status. This post explores how to implement and deploy resilient hybrid edge architectures using Amazon Web Services (AWS), with a focus on network resilience, data synchronization, security, and configuration management. We’ll cover best practices for deploying and managing hybrid architectures […]

Framework for platform expansion to Europe, Middle East and beyond

Framework for platform expansion to Europe, Middle East and beyond

In a previous post on the Public Sector Blog, we covered six key strategies in which Amazon Web Services (AWS) empowers AWS Partners to expand their platforms globally to reach more customers while meeting requirements such as data residency and sovereignty. These ranged from using AWS Global Infrastructure to AWS services that make it easier for […]

Accelerating GovTech development with Kiro

Accelerating GovTech development with Kiro

Government agencies, educational institutions, and GovTech vendors face a unique challenge: delivering AI-powered applications while navigating compliance requirements, limited budgets, and legacy constraints. A single accessibility remediation cycle can cost $50,000 or more. Audit preparation takes weeks. Security reviews delay citizen services by months. Small IT teams struggle to maintain expertise across Federal Risk and […]

TIC 3.0 architecture migration for federal agencies using AWS Transit Gateway

TIC 3.0 architecture migration for federal agencies using AWS Transit Gateway

Federal agencies operating in the cloud face a challenge with Trusted Internet Connection 2.0. All internet traffic must backhaul through on-premises infrastructure, creating bottlenecks that limit cloud adoption and degrade performance. The TIC 3.0 initiative addresses this by enabling agencies to implement security controls directly in the cloud, providing secure internet connectivity for federal workloads, […]

Modernizing evidence management in Salesforce public sector solutions with Amazon S3

Modernizing evidence management in Salesforce public sector solutions with Amazon S3

Public sector agencies manage increasing volumes of digital evidence within casework, inspections, investigations, and enforcement operations. This evidence often includes large unstructured files such as body camera footage, surveillance video, photographs, audio interviews, and document scans. Although Salesforce Public Sector Solutions (PSS) provides a structured case management and chain-of-custody framework, storing high-volume evidence directly inside […]

Domino Data Lab secures container supply chains at scale using Chainguard on AWS

Domino Data Lab secures container supply chains at scale using Chainguard on AWS

Ivanti’s 2025 State of Cybersecurity Report revealed that only one in three organizations feel prepared to protect themselves from software supply chain threats. According to Cowbell’s Cyber Roundup Report 2024, with respect to supply chain threats, operating systems pose the greatest immediate threat as “they form the foundational layer of an organization’s entire IT infrastructure.” […]

How to travel safely based on crime patterns using AWS services

Walking in urban areas, especially at night, can be intimidating. Surveys show that 40% of Americans, the highest in three decades, say they are afraid to walk alone at night, and two-thirds avoid certain activities due to fear of crime. Vulnerable groups, including women and children, are affected even more. Similar studies across European countries […]

Prepare for FedRAMP 20x with AWS automation and validation

Prepare for FedRAMP 20x with AWS automation and validation

This post shows you how to use Amazon Web Services (AWS) services to meet Federal Risk and Authorization Management Program (FedRAMP) 20x requirements, reducing authorization time from months to weeks through automated compliance pipelines and continuous validation. You’ll learn how to build a trust center, automate vulnerability detection, generate Key Security Indicators (KSIs), and implement […]

AWS branded background with text "Accelerate your Information Security Manual (ISM) compliance with AWS Managed Services (AMS)"

Accelerate your Information Security Manual (ISM) compliance with AWS Managed Services (AMS)

To help you accelerate your compliance journey and improve your security posture, AWS Support offers AWS Managed Services (AMS). In this post, we explore how AMS security operations capabilities complement your existing teams and processes to accelerate your ISM compliance and optimize your cloud security posture overall.

AWS branded background with text "How Contra Costa County District Attorney's Office modernized subpoena processing with AWS and CC Tech Digital"

How Contra Costa County District Attorney’s Office modernized subpoena processing with AWS and CC Tech Digital

The Contra Costa County District Attorney’s Office partnered with AWS and CC Tech Digital, an AWS Advanced Tier Partner, to modernize its subpoena handling process using a cloud-native, serverless solution on AWS. Read this post to learn more.