AWS Public Sector Blog

Category: AWS Identity and Access Management (IAM)

AWS branded background design with text overlay that says "¬¬¬Extracting insights from PubMed articles using Amazon Q Business"

Extracting insights from PubMed articles using Amazon Q Business

PubMed Central (PMC) is a leading resource for biomedical literature, offering a vast repository of full-text biomedical and life sciences journal articles. While PMC offers immense potential to accelerate scientific progress, inform evidence-based practice, and drive innovation in the biomedical and life sciences fields, the sheer volume of data presents a significant challenge. This is where Amazon Q Business comes in. It’s a powerful service designed to streamline the process of analyzing vast amounts of scientific literature and provide valuable insights efficiently. Read this post to learn more.

AWS branded background design with text overlay that says "How to build a multilingual document summarization application using Amazon Bedrock"

How to build a multilingual document summarization application using Amazon Bedrock

In this post, we showcase a Retrieval-Augmented Generation (RAG) application that can search and query across multiple Indian languages using the Cohere Embed – Multilingual model and Anthropic Claude 3 on Amazon Bedrock. This post focuses on Indian languages, but you can use the approach with other languages that are supported by the large language model.

AWS branded background design with text overlay that says "Building your first generative AI conversational experience on AWS"

Building your first generative AI conversational experience on AWS

Amazon Web Services (AWS) offers a variety of options for building chat-based assistants with generative artificial intelligence (AI) capabilities. The goal of this post is to present in simple words some of these options and what to keep in mind to decide which to use and how to get started.

AWS branded background design with text overlay that says "Empowering the public sector with secure, governed generative AI experimentation"

Empowering the public sector with secure, governed generative AI experimentation

The Generative AI Sandbox on AWS, powered by Amazon Bedrock Studio, provides a secure, governed, and isolated environment for organizations to explore the power of large language models (LLMs) and other generative artificial intelligence capabilities. Bedrock Studio users can test different LLMs side by side to understand which ones best suit their specific use cases: from drafting policy documents to analyzing public feedback, or creating educational content.

AWS branded background design with text overlay that says "How AWS can help mission-focused organizations comply with the White House National Security Memorandum on AI"

How AWS can help mission-focused organizations comply with the White House National Security Memorandum on AI

On October 24, 2024, the White House released a National Security Memorandum (NSM) on Artificial Intelligence (AI), which focuses on ensuring US leadership in developing advanced AI technologies. Amazon Web Services (AWS) is uniquely positioned to address the critical needs of the defense and national security customers in advancing their AI capabilities. Our comprehensive suite of AI and high performance computing (HPC) capabilities offers flexible and robust solutions to meet the NSM’s goals and empower national security missions.

AWS branded background design with text overlay that says "Using Login.gov as an OIDC IdP with Amazon Cognito user pools"

Using Login.gov as an OIDC IdP with Amazon Cognito user pools

As federal agencies strive to enhance digital services and create a seamless customer experience, integrating robust identity and access management (IAM) solutions has become paramount. Amazon Cognito, a robust user identity management service offered by Amazon Web Services (AWS), provides a secure and scalable solution for managing user authentication and authorization. When combined with Login.gov, a trusted identity platform developed by the U.S. General Services Administration (GSA), federal agencies can unlock a powerful combination that streamlines user access while maintaining the highest levels of security and compliance.

AWS branded background design with text overlay that says "The key components of CISA’s Malcolm on Amazon EKS"

The key components of CISA’s Malcolm on Amazon EKS

Malcolm is a powerful, open source network traffic analysis tool suite created by the Cybersecurity and Infrastructure Security Agency (CISA) to aid public and private sector customers in improving their network security monitoring and incident response. Malcolm is most commonly used for incident response, network monitoring, threat hunting, training, and research, but can be adapted for other use cases. In this post, we introduce you to the key components of Malcolm on Amazon Elastic Kubernetes Service (Amazon EKS).

AWS branded background design with text overlay that says "Simplify firewall deployments using centralized inspection architecture with Gateway Load Balancer"

Simplify firewall deployments using centralized inspection architecture with Gateway Load Balancer

As government organizations transition to Amazon Web Services (AWS), they often seek to maintain operational continuity by using their existing on-premises firewall solutions. Gateway Load Balancer (GWLB) enables seamless integration of these firewall appliances into the AWS architecture, ensuring consistent security policies and minimizing disruptions. This post explores best practices for implementing GWLB to facilitate centralized traffic inspection for both east-west and north-south traffic flows.

AWS branded background design with text overlay that says "Battling the food security crisis with Agents for Amazon Bedrock"

Battling the food security crisis with Agents for Amazon Bedrock

The 2024 version of the United Nations (UN) annual report “The State of Food Security and Nutrition in the World” found that about 29.6 percent of the global population, or about 2.4 billion people, were moderately or severely food insecure in 2022, meaning they did not have adequate access to food. Food security can be caused by a number of factors, including poverty, inflationary factors, violent conflict, and the effects of climate change. In this post, we demonstrate how generative artificial intelligence (AI) can help organizations better understand the food security crisis.

AWS branded background with text overlay that says "4 common IoT protocols and their security considerations"

4 common IoT protocols and their security considerations

With the Internet of Things (IoT), selecting the right communication protocol ensures efficient data exchange and seamless connectivity between devices and the cloud. With a multitude of IoT protocols available, choosing the one that best suits your specific use case can be challenging. In this blog, we explore four common protocols used to connect IoT devices to the cloud and shed light on when and where to deploy them for optimal results.