AWS Public Sector Blog

Category: Security, Identity, & Compliance

AWS branded background design with text overlay that says "How AWS can help mission-focused organizations comply with the White House National Security Memorandum on AI"

How AWS can help mission-focused organizations comply with the White House National Security Memorandum on AI

On October 24, 2024, the White House released a National Security Memorandum (NSM) on Artificial Intelligence (AI), which focuses on ensuring US leadership in developing advanced AI technologies. Amazon Web Services (AWS) is uniquely positioned to address the critical needs of the defense and national security customers in advancing their AI capabilities. Our comprehensive suite of AI and high performance computing (HPC) capabilities offers flexible and robust solutions to meet the NSM’s goals and empower national security missions.

AWS branded background design with text overlay that says "Using Login.gov as an OIDC IdP with Amazon Cognito user pools"

Using Login.gov as an OIDC IdP with Amazon Cognito user pools

As federal agencies strive to enhance digital services and create a seamless customer experience, integrating robust identity and access management (IAM) solutions has become paramount. Amazon Cognito, a robust user identity management service offered by Amazon Web Services (AWS), provides a secure and scalable solution for managing user authentication and authorization. When combined with Login.gov, a trusted identity platform developed by the U.S. General Services Administration (GSA), federal agencies can unlock a powerful combination that streamlines user access while maintaining the highest levels of security and compliance.

AWS branded background design with text overlay that says "Using AWS CDK to build an extensible file-scanning solution for Amazon S3 buckets"

Using AWS CDK to build an extensible file-scanning solution for Amazon S3 buckets

In today’s digital world, ensuring the security of information is essential. One common scenario where data security is crucial is when files from external sources are received by an organization. While Amazon Simple Storage Service (Amazon S3) provides robust security features like the default encryption of all uploaded files, there are scenarios where it’s important to ensure that the incoming files are free from any kind of malware, such as viruses, before they are processed or stored inside the organization. Read this post to learn more.

AWS branded background design with text overlay that says "The key components of CISA’s Malcolm on Amazon EKS"

The key components of CISA’s Malcolm on Amazon EKS

Malcolm is a powerful, open source network traffic analysis tool suite created by the Cybersecurity and Infrastructure Security Agency (CISA) to aid public and private sector customers in improving their network security monitoring and incident response. Malcolm is most commonly used for incident response, network monitoring, threat hunting, training, and research, but can be adapted for other use cases. In this post, we introduce you to the key components of Malcolm on Amazon Elastic Kubernetes Service (Amazon EKS).

AWS branded background design with text overly that says "UNSW Students build an all-electric race car with AWS"

UNSW students build an all-electric race car with AWS

In 2023, the students from Redback Racing at the University of New South Wales (UNSW) wove together their many disciplines of engineering prowess to create their latest cars: RB23 and RB21-D. After developing and going live with their real-time telemetry system on Amazon Web Services (AWS), the team has placed as the highest-ranking Australian squad in the electric vehicle (EV) division of the Australasia Formula SAE competition, placing second overall. Read this post to learn more.

AWS branded background design with text overlay that says "Simplify firewall deployments using centralized inspection architecture with Gateway Load Balancer"

Simplify firewall deployments using centralized inspection architecture with Gateway Load Balancer

As government organizations transition to Amazon Web Services (AWS), they often seek to maintain operational continuity by using their existing on-premises firewall solutions. Gateway Load Balancer (GWLB) enables seamless integration of these firewall appliances into the AWS architecture, ensuring consistent security policies and minimizing disruptions. This post explores best practices for implementing GWLB to facilitate centralized traffic inspection for both east-west and north-south traffic flows.

AWS branded background design with text overlay that says "Battling the food security crisis with Agents for Amazon Bedrock"

Battling the food security crisis with Agents for Amazon Bedrock

The 2024 version of the United Nations (UN) annual report “The State of Food Security and Nutrition in the World” found that about 29.6 percent of the global population, or about 2.4 billion people, were moderately or severely food insecure in 2022, meaning they did not have adequate access to food. Food security can be caused by a number of factors, including poverty, inflationary factors, violent conflict, and the effects of climate change. In this post, we demonstrate how generative artificial intelligence (AI) can help organizations better understand the food security crisis.

AWS branded background with text overlay that says "4 common IoT protocols and their security considerations"

4 common IoT protocols and their security considerations

With the Internet of Things (IoT), selecting the right communication protocol ensures efficient data exchange and seamless connectivity between devices and the cloud. With a multitude of IoT protocols available, choosing the one that best suits your specific use case can be challenging. In this blog, we explore four common protocols used to connect IoT devices to the cloud and shed light on when and where to deploy them for optimal results.

AWS branded background design with text overlay that says "AWS hosts inaugural Defense Industry Partner Forum"

AWS hosts inaugural Defense Industry Partner Forum

In August 2024, Amazon Web Services (AWS) convened more than 65 Defense Industrial Base (DIB) companies at Amazon’s HQ2 in Arlington, Virginia for the inaugural AWS Defense Industry Forum. The DIB consists of more than 100,000 companies and subcontractors, which support the U.S. Department of Defense (DoD), and AWS joins forces with DIB partners to provide global infrastructure and cutting-edge technology to outpace our adversaries. Read this post to learn more about the two-day event.

AWS branded background design with text overlay that says "Elevating internal customer support at Thorn with AWS: A generative AI use case"

Elevating internal customer support at Thorn with AWS: A generative AI use case

Efficiently addressing internal customer support tickets can profoundly impact an organization’s productivity and employee well-being, apart from their ability to focus on the mission at hand. To meet these demands, many nonprofits, such as Thorn, are turning to innovative technology solutions. In this post, we explore how Thorn used Amazon Web Services (AWS) in conjunction with generative artificial intelligence (AI) to revolutionize their internal customer support for organization-wide IT, security, and engineering.