AWS Public Sector Blog
Category: Security
NATO’s march to multi-domain operations: Transforming the alliance with hyperscale cloud
Across NATO’s 32 member states, today’s rapidly evolving threat landscape requires continuous modernization of advanced technology solutions, underscoring the strategic importance of the alliance’s digital transformation. This modernization effort demands speed, scale, security, and global innovation capabilities to stay ahead. Collaborating with technology leaders like Amazon Web Services (AWS) can accelerate innovation and NATO’s ability to deliver mission-ready solutions to counter known and emerging threats.
Enabling AI leadership in the age of government efficiency
Global leaders are convening in Germany this week at the annual Munich Security Conference (MSC) to discuss key foreign policy and security challenges. Amid these discussions, one thing is clear: global leadership increasingly hinges on technological progress. In particular, the rapid progress of artificial intelligence (AI) presents an extraordinary opportunity for transformative innovation. For the U.S. government, this moment marks a crucial inflection point: embrace bold modernization of digital infrastructure and AI investment or risk being outpaced by global competitors.
Unlock the power of fine-grained access control with Amazon Verified Permissions
Public sector organizations face stringent compliance requirements, and any unauthorized access to protected health information (PHI) or personal identifiable information (PII) can result in legal penalties and reputational damage. This post aims to demonstrate how public sector customers can develop a fine-grained authorization module using Amazon Web Services (AWS) identity services, extending beyond the capabilities of traditional role-based access control (RBAC), so they can achieve compliance objectives.
Establishing a robust cloud platform and operational model through the CCoE
This post is part three of a four-part series that addresses how a Cloud Center of Excellence (CCoE) can be a viable solution to address the challenges of digital transformation. In this post, we address the three technical perspectives of the Amazon Web Services Cloud Adoption Framework (AWS CAF). While the business, organizational, and governance perspectives of the AWS CAF are crucial, the CCoE must also focus on the technical capabilities required to build and operate a cloud environment that meets the organization’s needs.
Allies can share data and technologies and remain compliant with international regulations using AWS
National security and defense depend upon close collaboration between international allies. To protect sensitive data and promote robust cybersecurity frameworks, organizations must consider one another’s compliance requirements. One such requirement is the United States International Traffic in Arms Regulations (ITAR), which restricts and controls the export of defense and military-related technologies in order to safeguard US national security. Here, we set out how an innovation called Trusted Secure Enclaves (TSE) on Amazon Web Services (AWS) allows non-US national organizations who want to use the most modern and innovative technology to deliver defense and security missions using the cloud can do this and be compliant.
Securing the future of healthcare in the age of generative AI and connected care
The healthcare industry is undergoing a profound transformation, driven by the adoption of generative artificial intelligence (AI), cloud computing, and connected care devices. This digital revolution promises to improve patient outcomes, reduce costs, and enhance the overall healthcare experience. However, it also introduces new challenges in terms of cybersecurity, privacy, and regulatory compliance. To navigate this complex landscape, healthcare organizations are turning to scalable, affordable, and highly available cloud infrastructures such as Amazon Web Services (AWS) to build resilient, secure, and innovative solutions.
AWS launches £5 million cyber education grant to boost security in the UK
Amazon Web Services (AWS) today announced the launch of its first AWS UK Cyber Education Grant Program, a £5 million initiative aimed at strengthening the cybersecurity capabilities of educational institutions across the United Kingdom. Read this post to learn more about the program.
Amazon Bedrock launches with Claude 3.5 Sonnet in the AWS Top Secret cloud
Amazon Bedrock is now generally available in the Amazon Web Services (AWS) Top Secret cloud. With authority to operate in the AWS Top Secret Cloud, Amazon Bedrock is providing U.S. Government customers with secure access to foundation models (FMs) and generative artificial intelligence (AI) capabilities within AWS’s classified environment.
Complying with updated NIH Genomic Data Sharing policies on AWS
The National Institutes of Health (NIH) has long maintained guidelines governing the responsible management of controlled access human genomic and phenotypic data maintained in NIH-designated data repositories. Recently, the NIH updated these guidelines to align with the NIST SP 800-171 security standard, which defines a comprehensive framework for securing Controlled Unclassified Information (CUI). In this blog post, we will explore the specifics of the updated NIH guidance and outline how Amazon Web Services (AWS) can help customers build a compliant environment to meet these requirements.
AWS Verified Access in a TIC 3.0 architecture
Federal agencies can use Amazon Web Services (AWS) to meet Trusted Internet Connections (TIC) 3.0 requirements. To facilitate this, AWS has published detailed architectural overlays that demonstrate how to effectively implement TIC 3.0 guidelines within AWS deployments. AWS Verified Access (AVA) is a cloud-based service that enables secure access to applications without requiring the use of a virtual private network (VPN). It evaluates each application request and gives users access to each application only when they meet the specified security requirements. AVA supports TIC 3.0 requirements in the areas of configuration management, centralized log management, strong authentication features, resilience, and policy enforcement. Read this post to learn more.