AWS Public Sector Blog
Tag: security
Notre Dame sets new standard for higher education with enterprise AWS security implementation
The University of Notre Dame embarked on a journey to become the first US higher education institution to take a comprehensive, enterprise-wide approach to deploying AWS Web Application Firewall (WAF), AWS Shield Advanced, and AWS Firewall Manager across the entirety of their AWS infrastructure. This meticulous implementation also established a blueprint for other institutions to follow.
How to secure communications beyond encryption with AWS Wickr
Read this post to learn about AWS Wickr, a messaging and collaboration service that protects messaging, calling, file sharing, screen sharing, and location sharing with 256-bit end-to-end encryption (E2EE). Wickr combines advanced security for sensitive communications, administrative controls for user and policy management, and data retention for auditing and regulatory needs.
How Curtin University enhanced security compliance with AWS Managed Services Trusted Remediator
This post explores how Curtin University, Western Australia’s largest public research university, overcame challenges such as limited technical resourcing, complex security compliance requirements, and manual remediation processes using AWS Managed Services (AMS) Accelerate and the Trusted Remediator solution. The university achieved a 32% improvement in its AWS Security Improvement Program (SIP) score within the first six months of its AMS engagement.
MOSIP on AWS: Technical deep dive exploring architecture, implementation, and deployment models
Whether you’re a technical architect, systems integrator, or government technology leader, this post provides the technical insights needed to understand and implement MOSIP (Modular Open-Source Identity Platform) on AWS effectively.
How Fischer Identity rapidly built a natural-language tool for user permissions queries with AWS
Fischer Identity, a leader in identity and access management (IAM) and identity governance for higher education, partnered with the AWS Product Acceleration education technology (EdTech) team to build a generative AI tool that converts natural language into SQL queries—moving from proof of concept in 5 days and to beta readiness in only 6 months. This post explores how the collaboration produced a text-to-SQL solution that nontechnical security administrators can use to get instant answers.
Building Trusted Research Environments on AWS
Trusted Research Environments (TREs) provide secure access to sensitive data, enabling research while controlling data movement to meet governance requirements. In this post, we review core TRE concepts, examine TRE history and related initiatives, and explore key considerations for successfully deploying a TRE on AWS.
Unlocking research potential: How the University of Sheffield and RONIN accelerate secure research through Data Connect
This blog explores how the University of Sheffield uses AWS Partner RONIN Core and RONIN Isolate solutions to deliver a Trusted Research Environment (TRE) built on AWS infrastructure, enabling secure research and collaboration with sensitive data through the university’s Data Connect service. Secure and compliant infrastructure is essential for sensitive research. Many research institutions use a research Landing Zone to build Secure Research Environments (SRE) that provide the foundational compliance infrastructure—meeting standards like the National Institutes of Health (NIH) NIST 800-171, ISO 27001, HIPAA, and CMMC—upon which TREs like RONIN can build secure research workflows.
Wiz for Government achieves FedRAMP High authorization, strengthening security for AWS customers
Amazon Web Services (AWS) and Wiz are excited to share that Wiz for Government has achieved a FedRAMP High authorization. This milestone reinforces Wiz’s commitment to working with AWS and helping U.S. public sector organizations and partners securely manage their environments from code to cloud to runtime. Read this post to learn more.
Updated conformance packs for Australian government security frameworks
AWS has updated its conformance packs that validate security configurations against the Australian Government’s Information Security Manual (ISM) and Essential Eight cybersecurity strategies. Read this post to learn more.
Building a network traffic analysis system: Deploying Malcolm on Amazon EC2
In this post, we provide step-by-step guidance for deploying Malcolm—an open source network traffic analysis suite—natively on Amazon Elastic Compute Cloud (Amazon EC2), using the on-demand compute, elasticity, and scalability of AWS to eliminate traditional infrastructure overhead. This approach is particularly beneficial for cost-conscious public sector (federal, state, and local), utility, and industrial customers who require network and security monitoring to deliver on their missions.









