AWS Public Sector Blog
Category: Security, Identity, & Compliance
Proactive strategies for cyber resilience and business continuity on AWS
AWS recommends that organizations prepare to recover workloads in case of cybersecurity incidents or business continuity events such as technical or natural disasters. In this post, we offer guidance and strategies for public sector organizations to use AWS infrastructure to operate resilient systems in the cloud.
Macquarie University accelerates cloud transformation with AWS
Macquarie University today announced a significant advancement in its digital transformation journey, partnering with Amazon Web Services (AWS) to create a modern, cloud-first environment that will revolutionize its technology infrastructure and services delivery.
How the University of Minnesota Athletics built a unified data layer to drive fan engagement with AWS
The University of Minnesota Athletics Department had access to a lot of data, but lacked a way to bring it together. Even answering simple questions, like how many tickets were sold and who received them, required hours of cross-platform data wrangling. In less than a year, the department replaced that complexity with a scalable data lake built on AWS. The new data architecture—which gives the department full visibility into ticketing transactions and digital behavior—was built by a small internal team, without requiring a complete overhaul of their existing systems.
New AWS WickrGov offerings to enable secure, compliant communication on multiple devices
Today, Amazon Web Services (AWS) is announcing two new AWS WickrGov offerings designed to help customers rapidly deploy secure communications capabilities across their organizations.
Accelerating government innovation: Amazon Bedrock models get FedRAMP High and DoD IL-4/5 approval in AWS GovCloud (US)
In today’s rapidly evolving security landscape, the technological edge isn’t just an advantage—it’s a necessity. We’re thrilled to share a milestone that will transform how our government customers harness the power of artificial intelligence (AI): AWS is the first cloud provider to achieve FedRAMP High and Department of Defense (DoD) Cloud Computing Security Requirements Guide Impact Level 4 and 5 authorizations for Anthropic’s Claude and Meta’s Llama AI foundation models.
Amazon to launch second Secret Cloud Region in 2025
Amazon today announced it will launch its second Secret Cloud Region in 2025. The new AWS Secret-West Region will be accredited to support workloads up to the U.S. Secret classification level. With two regions accredited at the Secret level, defense and national security customers and partners can deploy multi-Region architectures, achieving even higher levels of resiliency and availability essential to their critical missions and enabling AI innovation.
Four steps government agencies can take to achieve meaningful modernization
Drawing on the extensive experience AWS has in partnering with public sector organizations worldwide, here are four transformative steps agencies can take to drive meaningful modernization and shape the future of government service delivery.
ZTAG-I, a reference zero trust architecture for the US federal government
In this blog, we introduce AWS Zero Trust Accelerator for Government – Integrated (ZTAG-I), a reference architecture that aligns with federal zero trust guidance. ZTAG-I accelerates adoption of zero trust architecture by providing a tested example of a fully integrated technology stack that solves key challenges that arise when adopting zero trust.
Detect and investigate Amazon EC2 malware with Amazon GuardDuty and Amazon Detective
In this post, we demonstrate how to use the advanced malware detection features of Amazon GuardDuty to uncover malicious and suspicious files compromising your Amazon Elastic Compute Cloud (Amazon EC2) instances. We use the investigative capabilities of Amazon Detective to gain deeper insights into the security event. After the key questions about the security event are addressed, we outline steps to remediate the potentially compromised EC2 instance.
Build a secure AWS foundation in under 60 minutes: A guide for public sector organizations
In this blog, we will guide you through the process of setting up a secure multi-account AWS environment using AWS Control Tower, AWS IAM Identity Center, AWS Organizations and will show you how to secure your environment using AWS Config, AWS Security Hub, and Amazon GuardDuty.