The Infrastructure Investment and Jobs Act (IIJA), commonly referred to as the Infrastructure Bill, allocates over $350 billion in funding for major projects in the United States. As they consider where to allocate these funds, public infrastructure owners, especially Department of Transportation (DOT) and public works agencies, have to assess the condition of their assets, determine what to prioritize while rebuilding, and identify what needs maintenance. Learn about key benefits for agencies from using cloud-based asset management software.
In 2021, the U.S. Department of Defense (DoD) announced the creation of the Joint Warfighting Cloud Capability (JWCC) contract—a multi-vendor acquisition vehicle designed to make cloud services and capabilities available at all classiﬁcation levels and across all security domains, from the enterprise to the tactical edge. JWCC will enable the DoD to fully leverage the capabilities of the cloud to meet current and future mission initiatives. Further, JWCC is key to enabling critical warfighter capabilities, such as the Joint All-Domain Command and Control (JADC2), and the DoD Artificial Intelligence and Data Acceleration Initiative (ADA). As the DoD continues to modernize the way it supports the warfighter and defends our national security, AWS is committed to supporting its critical mission.
Public sector organizations around the world share a common concern: how can they make sure their digital transformation maintains data security? The question comes up often when I meet with government leaders around the world in my role as a government transformation digital advisor at AWS. During my time in the UK Government’s Digital Service (GDS), and now in my work with government leaders, I’ve learned important lessons about transforming services securely in the cloud. Read on for some key takeaways.
Cybersecurity analytics is a systematic methodology designed to collect, ingest, process, aggregate, and analyze security events. This methodology empowers organizations to proactively perform security investigations, powered by advanced analytics and machine learning (ML), which help mitigate cyber issues more effectively and efficiently at scale. Learn about the core components of a cybersecurity analytics framework and how organizations can use AWS to design a cybersecurity analytics platform with analytics and ML services.
AWS announced the availability of Wickr RAM (Recall, Alert and Messaging) to the U.S. Department of Defense (DOD) through Cloud One, which is a cloud hosting infrastructure and service. Wickr RAM is an end-to-end encrypted full suite collaboration application built for the warfighter. It is available on AWS GovCloud (US) and can support workloads up to Impact Level 5.
AWS is committed to supporting the mission of our Department of Defense (DoD) customers by providing innovative, efficient, and effective solutions. In support of this commitment, we are announcing the availability of DoD Cloud Infrastructure as Code (IaC) for AWS – a baseline that uses a collection of templates to enable defense mission owners to quickly build out secure, scalable cloud environments. DoD Cloud IaC for AWS is designed to help DoD organizations accelerate cloud adoption and support the rapid delivery of capabilities to the warfighter.
In this blog post, we explain how government agencies can accelerate their development workflows while maintaining strict application and operational security using the principles of continuous integration and continuous delivery (CI/CD) and DevSecOps. We provide a solution to walk you through how you can quickly set up your own DevSecOps pipeline that incorporates AWS and third-party security tools to give you a fast, flexible, and secure software delivery process.
How UK public sector customers can implement NCSC security principles to protect data transfers to AWS
To drive innovation and optimise operations in the Amazon Web Services (AWS) Cloud, UK public sector organizations need to transfer data quickly and safely, in accordance with the National Cyber Security Centre (NCSC)’s guidance on how to configure, deploy, and use cloud services securely. The NCSC provides security guidance for protecting government systems, planning for cyber incidents, and more. In this post, we cover how you can configure AWS services—like AWS DataSync, AWS Storage Gateway, and AWS Transfer Family—to align your data transfer solution with the NCSC’s cloud security principles, as understanding these configurations is important to protect data and meet requirements for local force accreditation.
Earlier this year, the Australian Bureau of Statistics (ABS) ran the Australian Census, the agency’s most significant workload, on Amazon Web Services (AWS). The Census is the most comprehensive snapshot of the country, and includes around 10 million households and over 25 million people. With the COVID-19 pandemic causing lockdowns across the country, ABS needed a digital option for the Census that was accessible and reliable for millions of people. They turned to the cloud.
Ten years ago, the federal government was only just beginning to adopt cloud computing services. In the early days, there were concerns about how much cloud services would cost and whether they’d be secure enough for sensitive government data. In listening to our government customers, we heard their concerns about cost and security. They also needed to innovate ahead of demand, and required a highly secure and compliant infrastructure to do it. That’s why we launched AWS GovCloud (US) in 2011.