AWS Public Sector Blog

Category: Security, Identity, & Compliance

AWS Public Sector Summit 2019 security presentation screenshot

Security in the public sector: The why and how

Cloud security at AWS is the highest priority. AWS customers benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations. We listen closely to our customers to offer both a secure cloud computing environment and innovative security services that satisfy the security and compliance needs of the most risk-sensitive organizations.

Canada flag outside waving in wind

AWS now able to provide Secure Cloud Services for the Government of Canada

The Government of Canada (GC) signed a framework agreement with AWS to provide Commercially Available Cloud Services for workloads up to the level of Protected B/Medium Integrity/Medium Availability (PBMM). Having a contract vehicle with a Cloud Service Provider (CSP) is a significant step forward in modernizing digital government for Canadians, and will further the Government of Canada’s Cloud and digital strategy. This contract is in addition to the procurement vehicle for unclassified data announced in 2018.

University in California exterior photo

AWS and CITE showcase commitment to student data privacy through the California AB 1584 Compliance Addendum

This month, Amazon Web Services (AWS) and California IT in Education (CITE, formerly CETPA) announced the new California AB 1584 Compliance Addendum, a contract addendum available to AWS customers in California that are required to affirm compliance with California Assembly Bill 1584 (AB 1584) in California Education Code Section 49073.1.

A Road to Identity Federation

A key aspect of cloud adoption is determining how identities will be managed. Typically, federal government customers want to use the same identities managed by their Identity Management System (IDMS) to access cloud resources. Federal agencies have their own well-managed, NIST and HSPD-12 compliant IDMS for issuing, revoking, and entitlements management of their identities. These […]