AWS Public Sector Blog

Category: Security

Complying with updated NIH Genomic Data Sharing policies on AWS

The National Institutes of Health (NIH) has long maintained guidelines governing the responsible management of controlled access human genomic and phenotypic data maintained in NIH-designated data repositories. Recently, the NIH updated these guidelines to align with the NIST SP 800-171 security standard, which defines a comprehensive framework for securing Controlled Unclassified Information (CUI). In this blog post, we will explore the specifics of the updated NIH guidance and outline how Amazon Web Services (AWS) can help customers build a compliant environment to meet these requirements.

AWS branded background design with text overlay that says "AWS Verified Access in a TIC 3.0 architecture"

AWS Verified Access in a TIC 3.0 architecture

Federal agencies can use Amazon Web Services (AWS) to meet Trusted Internet Connections (TIC) 3.0 requirements. To facilitate this, AWS has published detailed architectural overlays that demonstrate how to effectively implement TIC 3.0 guidelines within AWS deployments. AWS Verified Access (AVA) is a cloud-based service that enables secure access to applications without requiring the use of a virtual private network (VPN). It evaluates each application request and gives users access to each application only when they meet the specified security requirements. AVA supports TIC 3.0 requirements in the areas of configuration management, centralized log management, strong authentication features, resilience, and policy enforcement. Read this post to learn more.

AWS branded background design with text overlay that says "Highlights from the AWS re:Invent 2024 Public Sector Innovation Session"

Highlights from the AWS re:Invent 2024 Public Sector Innovation Session

During AWS re:Invent 2024, an Innovation Session presented by Worldwide Public Sector Vice President Dave Levy illustrated how AWS empowers customers to innovate and tackle critical challenges faster and more efficiently using cloud technology and generative artificial intelligence (AI). Take a few minutes to read this post and learn more about the transformative initiatives, inspiring customer stories, and technological developments that help AWS public sector customers improve life on Earth.

Banner image with headline, "Preparing for CMMC 2.0 compliance: What contractors can do today"

Preparing for CMMC 2.0 compliance: What contractors can do today

CMMC compliance will soon be a must-have for federal contractors, so they need to plan now for how to achieve it. The path towards compliance differs according to the level needed and the assessments involved. Fortunately, there is no shortage of resources available to help—including from Amazon Web Services (AWS) and its partners.

AWS branded background design with text overlay that says "Deploying AWS Modular Data Center: From ordering to delivery and installation"

Deploying AWS Modular Data Center: From ordering to delivery and installation

The Amazon Web Services (AWS) Modular Data Center (MDC) is a service that enables rapid deployment of AWS managed data centers for running location- or latency-sensitive applications in locations with limited infrastructure. It reduces deployment time in remote areas and supports up to five racks of AWS Outposts or AWS Snow Family devices. In this post, we guide you through the end-to-end process of deploying the MDC at your site.

AWS branded background design with text overlay that says "The key components of CISA’s Malcolm on Amazon EKS"

The key components of CISA’s Malcolm on Amazon EKS

Malcolm is a powerful, open source network traffic analysis tool suite created by the Cybersecurity and Infrastructure Security Agency (CISA) to aid public and private sector customers in improving their network security monitoring and incident response. Malcolm is most commonly used for incident response, network monitoring, threat hunting, training, and research, but can be adapted for other use cases. In this post, we introduce you to the key components of Malcolm on Amazon Elastic Kubernetes Service (Amazon EKS).

Canadian Centre for Cybersecurity’s Assemblyline brings powerful malware analysis to AWS Marketplace

The Canadian Centre for Cyber Security (Cyber Centre) was established in 2018 under Canada’s National Cyber Security Strategy. The Cyber Centre is the nation’s centralized source for expert cybersecurity advice, services, and support. Its crucial mission involves protecting Canada’s critical cyber assets, including federal government systems. One of the Cyber Centre’s notable innovations is Assemblyline, an open source malware detection and analysis tool available to the cybersecurity community and now others on the Amazon Web Services (AWS) Marketplace.

AWS branded background design with text overlay that says "AWS Canada launches $5 million Provincial and Municipal Cyber Grant Program"

AWS Canada launches $5 million Provincial and Municipal Cyber Grant Program

On September 11, 2024, Amazon Web Services (AWS) announced the launch of the Provincial and Municipal Cyber Grant Program across Canada at the AWS Summit in Toronto. To help provincial and municipal governments implement cloud-based cybersecurity solutions, AWS is investing $5 million CAD in AWS credits to new and existing AWS customers.

AWS branded background design with text overlay that says "Generative AI as a force for good in facilitating cyber-resiliency in public sector organizations"

Generative AI as a force for good in facilitating cyber-resiliency in public sector organizations

The­ Digital Transformation Hub (DxHub) at California Polytechnic State University (Cal Poly) in San Luis Obispo – powered by Amazon Web Services (AWS) and part of the AWS Cloud Innovation Centers (CIC) program – collaborated with the City of San Diego and the San Diego Cyber Center of Excellence (CCOE) to create ‘My eCISO,’ a generative artificial intelligence (AI)-based application that propels public and private organizations on a path to cyber resiliency. This post explores the technology behind My eCISO and its implications for organizations looking to protect against attacks.

AWS branded background design with text overlay that says "Streamlining digital transformation in German healthcare with AWS"

Streamlining digital transformation in German healthcare with AWS

Healthcare organizations worldwide are leveraging Amazon Web Services (AWS) and partner solutions to modernize, transform, and innovate their businesses. Ensuring the availability and security of critical applications is paramount. For example, two renowned German medical facilities, Fachklinikum Mainschleife and Max Grundig Klinik, needed to modernize their IT infrastructure to comply with stringent regulatory requirements outlined in the country’s Law for Accelerating the Digitalization of Healthcare (DigiG). Reliable and compliant service offerings from AWS enabled the medical facilities to provide reliable access to essential systems.