AWS Public Sector Blog

Tag: security

city skylines looking up

Helping more than 100 partners achieve FedRAMP Authority to Operate (ATO)

Government agencies have accelerated their transition to the cloud over the last few years, and COVID-19 has accelerated the urgency and pace of that move. A benefit of moving to the cloud is increased security. But to realize this, new infrastructure must be implemented and managed correctly, using best practices and the right technologies. Working with our partners, AWS has helped dozens of solutions accelerate their FedRAMP authorizations. There are more than 100 FedRAMP-authorized solutions running on AWS.

CMMC compliance

How to plan for Cybersecurity Maturity Model Certification (CMMC)

Later this year, the Cybersecurity Maturity Model Certification (CMMC) accreditation framework will take effect, impacting U.S. DoD contractors, supply chain, solution providers, and systems integrators. The DoD estimates that more than 300,000 organizations will require certification. In addition, other U.S. federal agencies and international organizations may adopt a similar framework to protect their intellectual property (IP). No matter the size of your organization, cloud-based services can help you meet the requirements of CMMC.

student with backpack; Photo by Scott Webb on Unsplash

Shifting mindsets: K12 education in the cloud

K12 educational organizations are modernizing their institutions by providing secure anywhere, anytime access to learning for students. Whether a district or school is a cloud veteran or forging new ground, the cloud is helping break down barriers to opportunity, like the ability to access applications through any device. By using the cloud, many K12 institutions—including schools, districts, educational service agencies, and state education agencies—are having breakthroughs in educational models and student engagement.

Voting booth

Supporting elections through voter education and information access, security and scalability, and absentee voting

Even in uncertain times, election officials and political stakeholders are committed to serving a dynamic electorate in a secure, scalable, and cost-effective way. Cloud-based technologies from Amazon Web Services (AWS) and the AWS Partner Network (APN) can help elections administrators, campaigns, and civic engagement organizations with access to information, security and scalability, and absentee voting workflow solutions.

Security

Top sessions on security for the public sector from AWS re:Inforce 2019

Until we can meet again, we’ve curated a collection of the top AWS re:Inforce 2019 sessions for security and compliance professionals in the public sector. These sessions answer the compliance questions you were afraid to ask, share ways to harness diversity in your security organization, explore how AWS security services can help encrypt data, manage security alerts, and automate compliance.

AWS Raise the Bar on ransomware

Raising the bar on storage: How to improve your disaster recovery, ransomware prevention, and backup strategy

Data is an organization’s critical asset, which is why safeguarding it against ransomware attacks, natural disasters, emergencies, or technical failures is a top priority. Legacy data storage, such as tape, makes sharing and protecting data costly and time consuming. AWS released a series of educational webinars and whiteboarding videos that discuss how to raise the bar on data protection in the AWS Cloud.

Securing your AWS Cloud environments from ransomware

Securing your AWS Cloud environment from ransomware: New eBook available

Organizations around the world are making headlines after falling victim to ransomware attacks. Ransomware is malicious code designed to gain unauthorized access to systems and data and encrypt that data to block access by legitimate users. A newly released eBook, “Securing your AWS environments from ransomware,” shares who is at risk and why ransomware is effective, whether to pay or not pay the ransom, and how customers can automatically inherit certain security controls by building on AWS.

Cloud computing courses for government employees: Register at no cost

Are you a U.S. government employee or contractor who is interested in learning about cloud computing? AWS is now offering the AWS Cloud Practitioner Essentials Day and AWS Technical Essentials Day courses virtually to government workers interested in learning about the cloud. These instructor-led courses will be offered online starting Monday, March 23.

lock over computer chip

Delegated authentication using OAuth: A case study using Spotify and AWS

Cloud-based technologies allow organizations like governments to build a new application on existing services on the internet that offers open and documented APIs to deliver reliable data. These services have an authentication model so that new users verify their identity before accessing, even if it’s offered at no cost. There are three components in this scenario: a service provider, an end user, and an application that needs to access user data. The key technology here is OAuth. OAuth is a standard that enables access delegation.

zero trust architecture

How to think about Zero Trust architectures on AWS

Customers with stringent regulatory or risk-averse considerations may look to Zero Trust architectures to refactor legacy applications or deploy new ones. This blog will help you evaluate your application architecture against Zero Trust principles and use AWS to build secure and scalable architectures.