Tag: AWS KMS
The recent Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Security Policy update contains important cloud computing language that aligns with the AWS approach to building CJIS compliant solutions. Learn more about the CJIS Security Policy changes and how AWS supports these new policies.
The Japan Digital Agency (DA) has selected Amazon Web Services (AWS) as one of the cloud service providers that support Government Cloud, which delivers common cloud infrastructure that central government agencies, local governments, and other government organisations can use. As a cloud services provider directly contracted with the DA, AWS will help the Japanese government modernize IT by directly offering advanced technologies and global best practices to help customers innovate securely at pace.
After a multi-year journey working with the mission critical application technology providers and Criminal Justice Information Services (CJIS) officials across the US, Amazon Web Services (AWS) implemented a simple and technically robust approach to CJIS compliance. Now, agencies and organizations in all 50 states in the US can host criminal justice information (CJI) on AWS.
Students’ educational achievements—including academic transcripts, work history, and skill credentialing—are often scattered across multiple institutions and disparate IT systems. EdTechs are adopting blockchain technology to simplify this process, with credential portability, data privacy, simplified workflows, and added data security.
To protect citizens and save lives, justice and public safety agencies rely on timely access to critical information, such as criminal histories, arrest warrants, stolen vehicles, and 911 call data. Providing this mission critical criminal justice information with five nines (99.999%) availability and protecting it according to the rigorous security requirements prescribed in the Criminal Justice Information Services Security Policy are top priorities for criminal justice agencies (CJA). AWS’s innovative features and security controls can help customers achieve CJIS compliance in a simplified way.
Removing the barriers to rehousing, especially for those chronically homeless, is a critical part of a community’s efforts to combat homelessness. This month, the City of Baltimore is launching My Digital Data Locker, an innovative cloud-based platform that gives people who are experiencing homelessness a secure place to manage digital copies of vital documents. This service reduces one of the key barriers to housing for people experiencing homelessness: vital document storage and access. The solution uses the cloud.
Modern data engineering covers several key components of building a modern data lake. Most databases and data warehouses, to an extent, do not lend themselves well to a DevOps model. DataOps grew out of frustrations trying to build a scalable, reusable data pipeline in an automated fashion. DataOps was founded on applying DevOps principles on top of data lakes to help build automated solutions in a more agile manner. With DataOps, users apply principles of data processing on the data lake to curate and collect the transformed data for downstream processing. One reason that DevOps was hard on databases was because testing was hard to automate on such systems. At California State University Chancellors Office (CSUCO), we took a different approach by residing most of our logic with a programming framework that allows us to build a testable platform. Learn how to apply DataOps in ten steps.
Customer managed encryption keys are a common architecture requirement within highly regulated workloads. This post demonstrates how to satisfy this requirement within Amazon Simple Storage Service (Amazon S3), including Amazon S3 Glacier. We also clarify some common points of confusion and demonstrate how objects can be uploaded directly to Amazon S3 Glacier via Amazon S3, which can help meet regulatory requirements as well as potentially save budget.
Customers with stringent regulatory or risk-averse considerations may look to Zero Trust architectures to refactor legacy applications or deploy new ones. This blog will help you evaluate your application architecture against Zero Trust principles and use AWS to build secure and scalable architectures.
A guest post by John Brady, CISSP, VP Cyber Security/CISO, Financial Industry Regulatory Authority The Financial Industry Regulatory Authority (FINRA) oversees more than 3,900 securities firms with approximately 640,000 brokers. Every day, we watch over nearly 6 billion shares traded in U.S. equities markets—using technology powerful enough to help detect fraud, abuse and insider trading. In […]