Tag: Identity and access management
Using AWS Verified Access and SD-WAN to streamline and secure remote application access for federal employees
Learn how traditional connectivity methods affect the agency employee experience while accessing applications. Then, discover how AWS Verified Access from AWS and software-defined wide-area network (SD-WAN) can improve the employee experience while accessing enterprise applications while maintaining reliability and security.
The National Association of State Chief Information Officers (NASCIO) recently released the 2023 report of the top 10 priorities of state chief information officers (CIOs) for strategies, management processes, and solutions. AWS works closely NASCIO and with state and local leaders across the US to develop solutions that address these top 10 needs. Explore these top 10 priorities and how state and local leaders can use AWS to support them.
Many organizations within state and local government (SLG) and education must build digital environments and services that meet a variety of dynamic security and compliance considerations, such as StateRAMP and Federal Information Security Management Act (FISMA). Learn key top-level best practices from AWS for how to use AWS Security Services to meet the unique needs of education and SLG organizations.
AWS IAM Identity Center (successor to AWS Single Sign-On) provides administrators with a simple way to manage identity and access (IAM) across numerous AWS accounts. IAM Identity Center is available in the AWS GovCloud (US) Regions, enabling customers to simply manage access to numerous AWS accounts in their AWS GovCloud (US) organizations. In this blog post, learn four different architecture patterns for providing an organization’s AWS users with access to both standard and AWS GovCloud (US) accounts using IAM Identity Center that can help minimize administrative overhead and simplify the user experience.
Security is priority number one at AWS. Data stored in Amazon Simple Storage Service (Amazon S3) is private by default. However, some datasets are made to be shared. In this blog post, we cover the no-cost mechanisms data providers can utilize to create access control policies for their highly distributed open datasets.
A key aspect of cloud adoption is determining how identities will be managed. Typically, federal government customers want to use the same identities managed by their Identity Management System (IDMS) to access cloud resources. Federal agencies have their own well-managed, NIST and HSPD-12 compliant IDMS for issuing, revoking, and entitlements management of their identities. These […]