AWS Public Sector Blog

Tag: security

AWS branded background image with text overlay that says "Unlock the power of fine-grained access control with HAQM Verified Permissions"

Unlock the power of fine-grained access control with HAQM Verified Permissions

Public sector organizations face stringent compliance requirements, and any unauthorized access to protected health information (PHI) or personal identifiable information (PII) can result in legal penalties and reputational damage. This post aims to demonstrate how public sector customers can develop a fine-grained authorization module using HAQM Web Services (AWS) identity services, extending beyond the capabilities of traditional role-based access control (RBAC), so they can achieve compliance objectives.

AWS branded background design with text overlay that says "Establishing a robust cloud platform and operational model through the CCoE"

Establishing a robust cloud platform and operational model through the CCoE

This post is part three of a four-part series that addresses how a Cloud Center of Excellence (CCoE) can be a viable solution to address the challenges of digital transformation. In this post, we address the three technical perspectives of the HAQM Web Services Cloud Adoption Framework (AWS CAF). While the business, organizational, and governance perspectives of the AWS CAF are crucial, the CCoE must also focus on the technical capabilities required to build and operate a cloud environment that meets the organization’s needs.

AWS branded background design with text overlay that says "Building zero trust for the Department of Defense: Insights from Les Call, Director of the DoD CIO ZT PfMO"

Building zero trust for the Department of Defense: Insights from Les Call, Director of the DoD CIO ZT PfMO

In today’s digital landscape, federal agencies face unprecedented challenges in securing their complex information technology (IT) infrastructure. Traditional security models require more capability, which is why departments like the Department of Defense (DoD) and the Cybersecurity and Infrastructure Security Agency (CISA) are mandating zero trust architectures across their agencies. Renzo Rodriguez, managing director of US Federal Solutions Architecture at HAQM Web Services (AWS), sat down with Les Call, director of the Department of Defense CIO Zero Trust Portfolio Management Office, in a recent episode of “Mission Innovation, powered by AWS,” to explore the challenges and strategies of implementing zero trust within the DoD. Read this post for a recap of their conversation.

AWS branded background design with text overlay that says "Allies can share data and technologies and remain compliant with international regulations using AWS"

Allies can share data and technologies and remain compliant with international regulations using AWS

National security and defense depend upon close collaboration between international allies. To protect sensitive data and promote robust cybersecurity frameworks, organizations must consider one another’s compliance requirements. One such requirement is the United States International Traffic in Arms Regulations (ITAR), which restricts and controls the export of defense and military-related technologies in order to safeguard US national security. Here, we set out how an innovation called Trusted Secure Enclaves (TSE) on HAQM Web Services (AWS) allows non-US national organizations who want to use the most modern and innovative technology to deliver defense and security missions using the cloud can do this and be compliant.

AWS branded background design with text overlay that says "Transforming financial markets: How FIA Tech built the Trade Data Network on AWS"

Transforming financial markets: How FIA Tech built the Trade Data Network on AWS

This post discusses how FIA Tech, a leading technology provider for the exchange traded derivatives (ETD) industry, built the Trade Data Network (TDN) on HAQM Web Services (AWS). TDN is an industry initiative that provides a shared ledger of trading information to address the fragmentation and lack of transparency in ETD post-trade processing. The TDN initiative currently includes 17 banks/brokers and 40 investment managers and hedge funds with combined assets under management of more than $34 trillion.

Complying with updated NIH Genomic Data Sharing policies on AWS

The National Institutes of Health (NIH) has long maintained guidelines governing the responsible management of controlled access human genomic and phenotypic data maintained in NIH-designated data repositories. Recently, the NIH updated these guidelines to align with the NIST SP 800-171 security standard, which defines a comprehensive framework for securing Controlled Unclassified Information (CUI). In this blog post, we will explore the specifics of the updated NIH guidance and outline how HAQM Web Services (AWS) can help customers build a compliant environment to meet these requirements.

AWS branded background design with text overlay that says "¬¬¬Extracting insights from PubMed articles using HAQM Q Business"

Extracting insights from PubMed articles using HAQM Q Business

PubMed Central (PMC) is a leading resource for biomedical literature, offering a vast repository of full-text biomedical and life sciences journal articles. While PMC offers immense potential to accelerate scientific progress, inform evidence-based practice, and drive innovation in the biomedical and life sciences fields, the sheer volume of data presents a significant challenge. This is where HAQM Q Business comes in. It’s a powerful service designed to streamline the process of analyzing vast amounts of scientific literature and provide valuable insights efficiently. Read this post to learn more.

AWS branded background design with text overlay that says "AWS Verified Access in a TIC 3.0 architecture"

AWS Verified Access in a TIC 3.0 architecture

Federal agencies can use HAQM Web Services (AWS) to meet Trusted Internet Connections (TIC) 3.0 requirements. To facilitate this, AWS has published detailed architectural overlays that demonstrate how to effectively implement TIC 3.0 guidelines within AWS deployments. AWS Verified Access (AVA) is a cloud-based service that enables secure access to applications without requiring the use of a virtual private network (VPN). It evaluates each application request and gives users access to each application only when they meet the specified security requirements. AVA supports TIC 3.0 requirements in the areas of configuration management, centralized log management, strong authentication features, resilience, and policy enforcement. Read this post to learn more.

AWS branded background design with text overlay that says "Deploying AWS Modular Data Center: From ordering to delivery and installation"

Deploying AWS Modular Data Center: From ordering to delivery and installation

The HAQM Web Services (AWS) Modular Data Center (MDC) is a service that enables rapid deployment of AWS managed data centers for running location- or latency-sensitive applications in locations with limited infrastructure. It reduces deployment time in remote areas and supports up to five racks of AWS Outposts or AWS Snow Family devices. In this post, we guide you through the end-to-end process of deploying the MDC at your site.