AWS Public Sector Blog
Tag: security
MOSIP on AWS: Technical deep dive exploring architecture, implementation, and deployment models
Whether you’re a technical architect, systems integrator, or government technology leader, this post provides the technical insights needed to understand and implement MOSIP (Modular Open-Source Identity Platform) on AWS effectively.
How Fischer Identity rapidly built a natural-language tool for user permissions queries with AWS
Fischer Identity, a leader in identity and access management (IAM) and identity governance for higher education, partnered with the AWS Product Acceleration education technology (EdTech) team to build a generative AI tool that converts natural language into SQL queries—moving from proof of concept in 5 days and to beta readiness in only 6 months. This post explores how the collaboration produced a text-to-SQL solution that nontechnical security administrators can use to get instant answers.
Building Trusted Research Environments on AWS
Trusted Research Environments (TREs) provide secure access to sensitive data, enabling research while controlling data movement to meet governance requirements. In this post, we review core TRE concepts, examine TRE history and related initiatives, and explore key considerations for successfully deploying a TRE on AWS.
Unlocking research potential: How the University of Sheffield and RONIN accelerate secure research through Data Connect
This blog explores how the University of Sheffield uses AWS Partner RONIN Core and RONIN Isolate solutions to deliver a Trusted Research Environment (TRE) built on AWS infrastructure, enabling secure research and collaboration with sensitive data through the university’s Data Connect service. Secure and compliant infrastructure is essential for sensitive research. Many research institutions use a research Landing Zone to build Secure Research Environments (SRE) that provide the foundational compliance infrastructure—meeting standards like the National Institutes of Health (NIH) NIST 800-171, ISO 27001, HIPAA, and CMMC—upon which TREs like RONIN can build secure research workflows.
Wiz for Government achieves FedRAMP High authorization, strengthening security for AWS customers
Amazon Web Services (AWS) and Wiz are excited to share that Wiz for Government has achieved a FedRAMP High authorization. This milestone reinforces Wiz’s commitment to working with AWS and helping U.S. public sector organizations and partners securely manage their environments from code to cloud to runtime. Read this post to learn more.
Updated conformance packs for Australian government security frameworks
AWS has updated its conformance packs that validate security configurations against the Australian Government’s Information Security Manual (ISM) and Essential Eight cybersecurity strategies. Read this post to learn more.
Building a network traffic analysis system: Deploying Malcolm on Amazon EC2
In this post, we provide step-by-step guidance for deploying Malcolm—an open source network traffic analysis suite—natively on Amazon Elastic Compute Cloud (Amazon EC2), using the on-demand compute, elasticity, and scalability of AWS to eliminate traditional infrastructure overhead. This approach is particularly beneficial for cost-conscious public sector (federal, state, and local), utility, and industrial customers who require network and security monitoring to deliver on their missions.
Secure your cloud journey with Tenable Cloud Security: Now FedRAMP authorized
We’re excited to announce a significant milestone in our commitment to securing your cloud environments with a new Federal Risk and Authorization Management Program (FedRAMP) authorization at the Moderate impact level for Tenable Cloud Security—hosted on AWS GovCloud (US). This achievement extends from the existing FedRAMP authorized service of Tenable Government Solutions (also known as Tenable One). Both authorizations underscores Tenable’s dedication to providing best-in-class cloud security for even the most demanding cloud environments.
Web filtering for education using AWS Network Firewall with egress TLS inspection
This post demonstrates how TLS inspection in Network Firewall provides visibility into encrypted traffic, even when browsers implement Encrypted Client Hello (ECH) or when SNI fields contain modified information.
Proactive strategies for cyber resilience and business continuity on AWS
AWS recommends that organizations prepare to recover workloads in case of cybersecurity incidents or business continuity events such as technical or natural disasters. In this post, we offer guidance and strategies for public sector organizations to use AWS infrastructure to operate resilient systems in the cloud.









