AWS Public Sector Blog
Category: Security
Updated conformance packs for Australian government security frameworks
AWS has updated its conformance packs that validate security configurations against the Australian Government’s Information Security Manual (ISM) and Essential Eight cybersecurity strategies. Read this post to learn more.
Building a network traffic analysis system: Deploying Malcolm on Amazon EC2
In this post, we provide step-by-step guidance for deploying Malcolm—an open source network traffic analysis suite—natively on Amazon Elastic Compute Cloud (Amazon EC2), using the on-demand compute, elasticity, and scalability of AWS to eliminate traditional infrastructure overhead. This approach is particularly beneficial for cost-conscious public sector (federal, state, and local), utility, and industrial customers who require network and security monitoring to deliver on their missions.
Macquarie University accelerates cloud transformation with AWS
Macquarie University today announced a significant advancement in its digital transformation journey, partnering with Amazon Web Services (AWS) to create a modern, cloud-first environment that will revolutionize its technology infrastructure and services delivery.
Accelerating government innovation: Amazon Bedrock models get FedRAMP High and DoD IL-4/5 approval in AWS GovCloud (US)
In today’s rapidly evolving security landscape, the technological edge isn’t just an advantage—it’s a necessity. We’re thrilled to share a milestone that will transform how our government customers harness the power of artificial intelligence (AI): AWS is the first cloud provider to achieve FedRAMP High and Department of Defense (DoD) Cloud Computing Security Requirements Guide Impact Level 4 and 5 authorizations for Anthropic’s Claude and Meta’s Llama AI foundation models.
Amazon to launch second Secret Cloud Region in 2025
Amazon today announced it will launch its second Secret Cloud Region in 2025. The new AWS Secret-West Region will be accredited to support workloads up to the U.S. Secret classification level. With two regions accredited at the Secret level, defense and national security customers and partners can deploy multi-Region architectures, achieving even higher levels of resiliency and availability essential to their critical missions and enabling AI innovation.
Four steps government agencies can take to achieve meaningful modernization
Drawing on the extensive experience AWS has in partnering with public sector organizations worldwide, here are four transformative steps agencies can take to drive meaningful modernization and shape the future of government service delivery.
ZTAG-I, a reference zero trust architecture for the US federal government
In this blog, we introduce AWS Zero Trust Accelerator for Government – Integrated (ZTAG-I), a reference architecture that aligns with federal zero trust guidance. ZTAG-I accelerates adoption of zero trust architecture by providing a tested example of a fully integrated technology stack that solves key challenges that arise when adopting zero trust.
AWS achieves U.S. Department of Defense’s CMMC Level 2 certification for Controlled Working Environment
AWS has achieved the U.S. Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC) Level 2 certification for the Controlled Working Environment (CWE). This certification enhances our DoD contract support capabilities and demonstrates our cybersecurity commitment.
University of British Columbia Cloud Innovation Centre: Prototyping generative AI solutions using AWS
The University of British Columbia (UBC) Cloud Innovation Centre (CIC) has become a hub for innovation by prototyping generative AI applications in collaboration with public sector sponsors. This post highlights how the UBC CIC uses AWS to accelerate generative AI development, sharing lessons learned, tools used, and actionable insights you can apply to your projects.
How public safety agencies can meet AI data security requirements
In this post, we discuss the crucial factors public safety agencies should consider when choosing a generative AI provider and explain how AWS can enable a secure, protected system.