AWS Public Sector Blog
Category: Defense
Building your Cybersecurity Maturity Model Certification (CMMC) strategy using cloud technologies
The U.S. Department of Defense (DoD) released an interim rule, the Defense Federal Acquisition Regulation Supplement: Assessing Contractor Implementation of Cybersecurity Requirements (DFARS Case 2019–D041), which includes NIST SP 800-171 and Cybersecurity Maturity Model Certification (CMMC) assessment methodology and requirements. Organizations have been planning for CMMC, and with the release of this interim rule, are now beginning to prepare and build strategy for CMMC compliance. Learn how you can build your CMMC strategy using cloud technologies.
Accelerate cloud compliance for sensitive and regulated workloads: Register for AWS Compliance Week
If you are a technology professional looking to understand how cloud security adheres to compliance requirements, attend our AWS Compliance Week webinar series on November 2-6. You will learn how to architect compliant, multi-region cloud environments, establish agile governance for regulated workloads, and use new AWS solutions to help accelerate compliance. Hear government and industry perspectives on achieving high compliance from the General Services Administration’s FedRAMP program management office, and customers Maxar, Salesforce, and Coalfire.
New IDC whitepaper released: How government agencies meet security and compliance requirements with the cloud
A new IDC whitepaper, sponsored by AWS, “How Government Agencies Meet Security and Compliance Requirements in the Cloud” examines why federal agencies are moving more systems and information to the cloud as a launching point for agency-wide IT modernization. The paper shares executive, legislative, and other government-wide initiatives influencing agencies to accelerate their cloud adoption plans, risks IT leaders face by delaying cloud migrations, and how secure, compliant cloud environments help agencies achieve compliance and security for their sensitive workloads.
JEDI: Why we will continue to protest this politically corrupted contract award
Earlier today, the DoD announced it had concluded its corrective action and affirmed its prior JEDI contract award to Microsoft. Taking corrective action should have provided the DoD an opportunity to address the numerous material evaluation errors outlined in our protest, ensure a fair and level playing field, and ultimately, expedite the conclusion of litigation. Unfortunately, the DoD rejected that opportunity.
Securing HAQM S3 Glacier with a customer-managed encryption key
Customer managed encryption keys are a common architecture requirement within highly regulated workloads. This post demonstrates how to satisfy this requirement within HAQM Simple Storage Service (HAQM S3), including HAQM S3 Glacier. We also clarify some common points of confusion and demonstrate how objects can be uploaded directly to HAQM S3 Glacier via HAQM S3, which can help meet regulatory requirements as well as potentially save budget.
How to plan for Cybersecurity Maturity Model Certification (CMMC)
Later this year, the Cybersecurity Maturity Model Certification (CMMC) accreditation framework will take effect, impacting U.S. DoD contractors, supply chain, solution providers, and systems integrators. The DoD estimates that more than 300,000 organizations will require certification. In addition, other U.S. federal agencies and international organizations may adopt a similar framework to protect their intellectual property (IP). No matter the size of your organization, cloud-based services can help you meet the requirements of CMMC.
Resources for military spouses on Military Spouse Appreciation Day
On Military Spouse Appreciation Day, we want to acknowledge the significant contributions, support, and sacrifices of military spouses worldwide. For military spouses, finding employment can be a challenge. To help prepare military spouses for roles in technology, HAQM offers no cost training for US military spouses, transitioning military, and veterans through its AWS Educate initiative.
Setting the record straight on JEDI
Since we filed our protest, we’ve been clear in our intent: we don’t think the JEDI award was adjudicated fairly, we think political interference blatantly impacted the award decision, and we’re committed to ensuring the evaluation receives a fair, objective, and impartial review. Recently, Microsoft has published multiple self-righteous and pontificating blog posts that amount to nothing more than misleading noise intended to distract those following the protest. To save you some space (and time), here are the facts.
Automating creation of a FedRAMP Integrated Inventory Workbook
Did you know AWS can help deliver an automated solution for creating the FedRAMP Integrated Inventory Workbook? This workbook needs to be updated and submitted to the FedRAMP Project Management Office (PMO) monthly for continuous monitoring. Automating this workbook saves manual work hours. Any customer going through the FedRAMP authorization process can leverage this workbook. Understand how to gather an inventory of AWS resources from AWS Config data to create the FedRAMP Integrated Inventory Workbook.
In case you missed it: January 2020 top blog posts round up
From readying the warfighter to how the cloud can improve your commute, check out what you missed in January 2020 on the AWS Public Sector Blog. And check out the new monthly video, “The Brief” covering the top stories from the month, too.