AWS Public Sector Blog

Tag: security

AWS Branded Background with text "AWS re:Invent 2024 recap for government agencies"

AWS re:Invent 2024 recap for government agencies

At AWS re:Invent 2024, which took place last December in Las Vegas, Amazon Web Services (AWS) unveiled an array of cutting-edge innovations during a week of keynotes, innovation talks, breakout sessions, product launches, interactive demos, and networking opportunities. In this post, we highlight the key takeaways from AWS re:Invent 2024 for government agencies.

AWS branded background design with text overlay that says "AWS Marketplace assessed ‘Awardable’ for DoD work in the P1 Solutions Marketplace"

AWS Marketplace assessed ‘Awardable’ for DoD work in the P1 Solutions Marketplace

Amazon Web Services (AWS) is pleased to announce that AWS Marketplace has received “Awardable” status in the Department of Defense (DoD) Platform One (P1) Solutions Marketplace. This designation enables DoD organizations to readily access and procure solutions through AWS Marketplace using established acquisition pathways.

AWS branded background design with text overlay that says "Self-hosting source code of the Landing Zone Accelerator on AWS "

Self-hosting source code of the Landing Zone Accelerator on AWS

Some customers using Amazon Web Services (AWS) prohibit users from installing software from public sources. Recently, the Landing Zone Accelerator on AWS (LZA) solution added optional capabilities to support this use case. Instead of installing directly from the public LZA GitHub repository, which is the default installation path for most customers, LZA can be self-hosted from your own Amazon Simple Storage Service (Amazon S3) bucket. This post shows the technical steps necessary to install LZA using Amazon S3.

AWS branded background design with text overlay that says "Securely onboarding countries to the AWS Cloud"

Securely onboarding countries to the AWS Cloud

In an increasingly digital world, governments and public sector entities are seeking secure and efficient ways to use cloud technologies. As we’ve innovated and expanded the Amazon Web Services (AWS) Cloud, we continue to prioritize making sure customers are in control and able to meet their national regulatory requirements. In this post, we share how AWS is collaborating with national cyber regulators and other public sector entities to enable secure adoption of the AWS Cloud across countries’ public sectors.

AWS branded background design with text overlay that says "Securely running AI algorithms for 100,000 users on private data"

Securely running AI algorithms for 100,000 users on private data

This post explores the architectural design and security concepts employed by Radboud University Medical Center Nijmegen (Radboudumc) to build a secure artificial intelligence (AI) runtime environment on Amazon Web Services (AWS). Business leaders dealing with sensitive or regulated data will find this post invaluable because it demonstrates a proven approach to using the power of AI while maintaining strict data privacy and security standards.

AWS branded background design with text overlay that says "NATO’s march to multi-domain operations: Transforming the alliance with hyperscale cloud"

NATO’s march to multi-domain operations: Transforming the alliance with hyperscale cloud

Across NATO’s 32 member states, today’s rapidly evolving threat landscape requires continuous modernization of advanced technology solutions, underscoring the strategic importance of the alliance’s digital transformation. This modernization effort demands speed, scale, security, and global innovation capabilities to stay ahead. Collaborating with technology leaders like Amazon Web Services (AWS) can accelerate innovation and NATO’s ability to deliver mission-ready solutions to counter known and emerging threats.

AWS branded background design with text overlay that says "Enabling AI leadership in the age of government efficiency"

Enabling AI leadership in the age of government efficiency

Global leaders are convening in Germany this week at the annual Munich Security Conference (MSC) to discuss key foreign policy and security challenges. Amid these discussions, one thing is clear: global leadership increasingly hinges on technological progress. In particular, the rapid progress of artificial intelligence (AI) presents an extraordinary opportunity for transformative innovation. For the U.S. government, this moment marks a crucial inflection point: embrace bold modernization of digital infrastructure and AI investment or risk being outpaced by global competitors.

AWS branded background image with text overlay that says "Unlock the power of fine-grained access control with Amazon Verified Permissions"

Unlock the power of fine-grained access control with Amazon Verified Permissions

Public sector organizations face stringent compliance requirements, and any unauthorized access to protected health information (PHI) or personal identifiable information (PII) can result in legal penalties and reputational damage. This post aims to demonstrate how public sector customers can develop a fine-grained authorization module using Amazon Web Services (AWS) identity services, extending beyond the capabilities of traditional role-based access control (RBAC), so they can achieve compliance objectives.

AWS branded background design with text overlay that says "Establishing a robust cloud platform and operational model through the CCoE"

Establishing a robust cloud platform and operational model through the CCoE

This post is part three of a four-part series that addresses how a Cloud Center of Excellence (CCoE) can be a viable solution to address the challenges of digital transformation. In this post, we address the three technical perspectives of the Amazon Web Services Cloud Adoption Framework (AWS CAF). While the business, organizational, and governance perspectives of the AWS CAF are crucial, the CCoE must also focus on the technical capabilities required to build and operate a cloud environment that meets the organization’s needs.

AWS branded background design with text overlay that says "Building zero trust for the Department of Defense: Insights from Les Call, Director of the DoD CIO ZT PfMO"

Building zero trust for the Department of Defense: Insights from Les Call, Director of the DoD CIO ZT PfMO

In today’s digital landscape, federal agencies face unprecedented challenges in securing their complex information technology (IT) infrastructure. Traditional security models require more capability, which is why departments like the Department of Defense (DoD) and the Cybersecurity and Infrastructure Security Agency (CISA) are mandating zero trust architectures across their agencies. Renzo Rodriguez, managing director of US Federal Solutions Architecture at Amazon Web Services (AWS), sat down with Les Call, director of the Department of Defense CIO Zero Trust Portfolio Management Office, in a recent episode of “Mission Innovation, powered by AWS,” to explore the challenges and strategies of implementing zero trust within the DoD. Read this post for a recap of their conversation.