AWS Public Sector Blog

Tag: cybersecurity

AWS branded background design with text overlay that says "NATO’s march to multi-domain operations: Transforming the alliance with hyperscale cloud"

NATO’s march to multi-domain operations: Transforming the alliance with hyperscale cloud

Across NATO’s 32 member states, today’s rapidly evolving threat landscape requires continuous modernization of advanced technology solutions, underscoring the strategic importance of the alliance’s digital transformation. This modernization effort demands speed, scale, security, and global innovation capabilities to stay ahead. Collaborating with technology leaders like Amazon Web Services (AWS) can accelerate innovation and NATO’s ability to deliver mission-ready solutions to counter known and emerging threats.

AWS branded background design with text overlay that says "Building zero trust for the Department of Defense: Insights from Les Call, Director of the DoD CIO ZT PfMO"

Building zero trust for the Department of Defense: Insights from Les Call, Director of the DoD CIO ZT PfMO

In today’s digital landscape, federal agencies face unprecedented challenges in securing their complex information technology (IT) infrastructure. Traditional security models require more capability, which is why departments like the Department of Defense (DoD) and the Cybersecurity and Infrastructure Security Agency (CISA) are mandating zero trust architectures across their agencies. Renzo Rodriguez, managing director of US Federal Solutions Architecture at Amazon Web Services (AWS), sat down with Les Call, director of the Department of Defense CIO Zero Trust Portfolio Management Office, in a recent episode of “Mission Innovation, powered by AWS,” to explore the challenges and strategies of implementing zero trust within the DoD. Read this post for a recap of their conversation.

AWS branded background design with text overlay that says "Allies can share data and technologies and remain compliant with international regulations using AWS"

Allies can share data and technologies and remain compliant with international regulations using AWS

National security and defense depend upon close collaboration between international allies. To protect sensitive data and promote robust cybersecurity frameworks, organizations must consider one another’s compliance requirements. One such requirement is the United States International Traffic in Arms Regulations (ITAR), which restricts and controls the export of defense and military-related technologies in order to safeguard US national security. Here, we set out how an innovation called Trusted Secure Enclaves (TSE) on Amazon Web Services (AWS) allows non-US national organizations who want to use the most modern and innovative technology to deliver defense and security missions using the cloud can do this and be compliant.

AWS branded background design with text overlay that says "Empowering zero trust in public sector with Cisco Umbrella for Government on AWS"

Empowering zero trust in public sector with Cisco Umbrella for Government on AWS

Zero trust in the US public sector has become critical, especially as cyber threats targeting government agencies grow more complex and sophisticated. In line with the federal mandate for zero trust architecture (ZTA) outlined in Executive Order M-22-09, government agencies are required to adopt a comprehensive security framework that continuously verifies trust for every access request. In this post, we demonstrate how Cisco Umbrella for Government, built on Amazon Web Services (AWS), plays a key role in ZTA by providing multi-layered security and granular visibility across on premises and AWS.

AWS branded background design with text overlay that says "Securing the future of healthcare in the age of generative AI and connected care"

Securing the future of healthcare in the age of generative AI and connected care

The healthcare industry is undergoing a profound transformation, driven by the adoption of generative artificial intelligence (AI), cloud computing, and connected care devices. This digital revolution promises to improve patient outcomes, reduce costs, and enhance the overall healthcare experience. However, it also introduces new challenges in terms of cybersecurity, privacy, and regulatory compliance. To navigate this complex landscape, healthcare organizations are turning to scalable, affordable, and highly available cloud infrastructures such as Amazon Web Services (AWS) to build resilient, secure, and innovative solutions.

AWS branded background design with text overlay that says "AWS launches £5 million cyber education grant to boost security in the UK"

AWS launches £5 million cyber education grant to boost security in the UK

Amazon Web Services (AWS) today announced the launch of its first AWS UK Cyber Education Grant Program, a £5 million initiative aimed at strengthening the cybersecurity capabilities of educational institutions across the United Kingdom. Read this post to learn more about the program.

AWS branded background design with text overlay that says "Continuous monitoring and governance: AWS best practices for keeping your data secure during the holidays and beyond"

Continuous monitoring and governance: AWS best practices for keeping your data secure during the holidays and beyond

As we look ahead to 2025, it’s crucial to maintain vigilance, especially during the holiday season, when cybersecurity risks tend to escalate. Many organizations use Amazon Web Services (AWS) to enhance their security posture and improve resilience. In this post, we discuss the AWS best practices for securing your data during the holiday season.

AWS branded background design with text overlay that says "AWS Verified Access in a TIC 3.0 architecture"

AWS Verified Access in a TIC 3.0 architecture

Federal agencies can use Amazon Web Services (AWS) to meet Trusted Internet Connections (TIC) 3.0 requirements. To facilitate this, AWS has published detailed architectural overlays that demonstrate how to effectively implement TIC 3.0 guidelines within AWS deployments. AWS Verified Access (AVA) is a cloud-based service that enables secure access to applications without requiring the use of a virtual private network (VPN). It evaluates each application request and gives users access to each application only when they meet the specified security requirements. AVA supports TIC 3.0 requirements in the areas of configuration management, centralized log management, strong authentication features, resilience, and policy enforcement. Read this post to learn more.

AWS branded background design with text overlay that says "The key components of CISA’s Malcolm on Amazon EKS"

The key components of CISA’s Malcolm on Amazon EKS

Malcolm is a powerful, open source network traffic analysis tool suite created by the Cybersecurity and Infrastructure Security Agency (CISA) to aid public and private sector customers in improving their network security monitoring and incident response. Malcolm is most commonly used for incident response, network monitoring, threat hunting, training, and research, but can be adapted for other use cases. In this post, we introduce you to the key components of Malcolm on Amazon Elastic Kubernetes Service (Amazon EKS).