Tag: AWS Security Hub
Natural disasters are devastating, often resulting in loss of life, massive property damage, and damage to the critical infrastructure that powers emergency services. This can prompt public sector organizations to consider building more resilient infrastructure. Such was the case for the 911 system in Livingston Parish, Louisiana, an agency that dispatches for 21 public safety agencies including law enforcement, fire, and emergency medical services, and averages over 325 calls for service per day. After a major flood in 2016 knocked out their 911 system, they worked with AWS Partner TailorBuilt Solutions, LLC. to use AWS to become resilient against disaster, reducing service interruptions and improving response times.
The US Office of Management and Budget published M-21-31, a memorandum for federal government agencies to define event logging requirements related to cybersecurity incidents. These guidelines aim to support the detection, investigation, and remediation of cyber incidents on federal information systems. The memorandum defines various event logging (EL) tiers and the log data that must be captured for various log categories. Learn the services from AWS that have been called out explicitly in the memorandum for logging and retention requirements at the EL1 level, and the resources you can use to set up these services to capture the required log data.
It is essential for election campaigns and committees to have access to the latest security services so they can mitigate risks against security threats at minimal cost. To support this, AWS is collaborating with Defending Digital Campaigns (DDC) to offer more than 20 cybersecurity-related AWS services for low-to-no cost to all active and registered national party committees and federal candidate committees for the US House and US Senate midterm elections that are eligible in accordance with DDC and Federal Election Commission (FEC) criteria.
This post aims to provide a summary of all the currently disclosed Apache Log4j issues as well as important resources that Amazon Web Services (AWS) has released to help our customers and partners limit any risks posed by these issues.
As organizations mature in their cybersecurity capabilities, they are looking to try and leverage automation to reduce the operational burden of alerting, detecting, and responding to threats. This blog post walks through how to combine findings from disparate security systems into a single operational view to help analysts identify, respond, and remediate existing threats while maintaining a dynamic response platform that scales with their environment.
Learn how you can build a foundation of security objectives practices, including a business continuity and disaster recovery plan, that can be adapted to meet a dynamic policy environment and support the missions of national computer security incident response teams (CSIRT), operators of essential services (OES), digital service providers (DSP), and other identified sector organizations.
iCivics is the education nonprofit that US Supreme Court Justice Sandra Day O’Connor founded in 2009 to transform civic education and rebuild civic strength through digital games and lesson plans. It is the country’s largest provider of civic education content and is currently used by more than 120,500 educators and 7.6 million students annually. All of its games are free, nonpartisan, and available at www.icivics.org. Through their use of Amazon Aurora, Amazon ElastiCache, Amazon CloudFront, and AWS CodeDeploy—and AWS security automation tools including AWS Security Hub, Amazon Inspector, and Amazon GuardDuty—iCivics has been able to scale and increase student engagement.
Serverless applications are typically discreet pieces of code that customers can use to manage security-related processes or stitch together multiple AWS services to solve a larger problem. They allow customers to build and run applications and services without dealing with infrastructure management tasks such as server or cluster provisioning, patching, operating system maintenance, and capacity provisioning. In this blog, I explain the serverless computing model, the Serverless Application Repository (SAR), solution constructs and implementations, why they matter to our government customers, and how they can use them to solve common problems.
As government agencies and public sector organizations modernize their IT and migrate to the AWS Cloud, the ability to gain a full, clear view of the security of their environments is a primary challenge they experience. This lack of visibility leads to blind spots and gaps in their security posture, leaving opportunity for security issues to arise. As a result, AWS developed a new open source Self-Service Security Assessment (with ransomware analysis modules) tool that provides customers with a point-in-time assessment to quickly gain valuable insights into the security posture of their AWS account.
Until we can meet again, we’ve curated a collection of the top AWS re:Inforce 2019 sessions for security and compliance professionals in the public sector. These sessions answer the compliance questions you were afraid to ask, share ways to harness diversity in your security organization, explore how AWS security services can help encrypt data, manage security alerts, and automate compliance.