AWS Public Sector Blog

Tag: security

Well Architected Framework

AWS Well Architected Framework: Best practices for building and deploying an optimized cloud environment

AWS has developed the Well-Architected Framework to help customers architect their mission-critical applications on AWS with secure, high-performing, resilient and efficient infrastructure. Well Architected can help you build and deploy faster, lower or mitigate risks, make informed decisions, and learn AWS best practices.

Defense Agencies Can Access AWS Secret Region for IL6 Workloads

In November, with the launch of the AWS Secret Region, we achieved a Provisional Authorization (PA) for Impact Level 6 (IL6) workloads from the U.S. Defense Information Systems Agency (DISA), the IT combat support organization of the U.S. Department of Defense (DoD). The PA was recently updated to add 11 new AWS services. A service catalog for the Region is available through your AWS Account Executive.

AWS Achieves Full Empanelment for the Delivery of Cloud services by India’s Ministry of Electronics and Information Technology

AWS announced that Amazon Internet Services Private Limited (AISPL), an Indian subsidiary of the Amazon Group, which undertakes the resale and marketing of AWS Cloud services in India, has achieved full Cloud Service Provider (CSP) empanelment, and successfully completed the STQC (Standardization Testing and Quality Certification) audit from the Indian Ministry of Electronics and Information Technology (MeitY) for cloud services delivered from the AWS Asia Pacific (Mumbai) Region.

Analytics Without Limits: FINRA’s Scalable and Secure Big Data Architecture – Part 2

A guest post by John Brady, CISSP, VP Cyber Security/CISO, Financial Industry Regulatory Authority The Financial Industry Regulatory Authority (FINRA) oversees more than 3,900 securities firms with approximately 640,000 brokers. Every day, we watch over nearly 6 billion shares traded in U.S. equities markets—using technology powerful enough to help detect fraud, abuse and insider trading. In […]

Analytics Without Limits: FINRA’s Scalable and Secure Big Data Architecture – Part 1

A guest post by John Brady, CISSP, VP Cyber Security/CISO, Financial Industry Regulatory Authority The Financial Industry Regulatory Authority (FINRA) oversees more than 3,900 securities firms with approximately 640,000 brokers. Every day, we watch over nearly 6 billion shares traded in U.S. equities markets—using technology powerful enough to help detect fraud, abuse, and insider trading. In […]

Automatically Discover, Classify, and Protect Your Data

In our post, Building a Cloud-Specific Incident Response Plan, we walked through a hypothetical incident response (IR) managed on AWS with the Johns Hopkins University Applied Physics Laboratory (APL). With the recent launch of Amazon Macie, a new data classification and security service, you have additional controls to understand the type of data stored in […]

Building a cloud-specific incident response plan

In order for your organization to be prepared before a security event occurs, there are unique security visibility, and automation controls that AWS provides. Incident response does not only have to be reactive. With the cloud, your ability to proactively detect, react, and recover can be easier, faster, cheaper, and more effective. What is an […]

Improving Security with Cloud Computing: Six Advantages of Cloud Security

Security is our number one priority, and at AWS, we have comprehensive security capabilities to protect virtually any workload. Through AWS Security services, we provide the opportunities to protect your data, monitor security-related activity, and receive automated responses. This gives our customers the ability to increase their security posture in the cloud, deliver more agile […]

Expanding cybersecurity education with the Commonwealth of Virginia and Virginia Tech

AWS has joined the Commonwealth of Virginia and Virginia Tech to support the Cyber Range initiative with scalable cloud infrastructure and to collaborate on cybersecurity educational efforts, enabling the Cyber Range with both content and a closed network for hands-on exercises, competitions, and other simulations. “We are thrilled to be a part of this important […]