AWS Public Sector Blog

Category: Public Sector

AWS branded background design with text overlay that says "Orange County United Way uses Amazon Connect to optimize 2-1-1 community service"

Orange County United Way uses Amazon Connect to optimize 2-1-1 community service

Serving hundreds of thousands of residents in all 34 cities of the region, Orange County United Way provides a wide range of vital community services throughout Orange County, California. After working with Amazon Web Services (AWS) Partner SoftwareONE to migrate its crisis hotline to Amazon Connect in the AWS Cloud, United Way now boasts enhanced call routing, data collection, and supervisory tools. Read this post to learn more.

AWS branded background image with text overlay that says "Unlock the power of fine-grained access control with Amazon Verified Permissions"

Unlock the power of fine-grained access control with Amazon Verified Permissions

Public sector organizations face stringent compliance requirements, and any unauthorized access to protected health information (PHI) or personal identifiable information (PII) can result in legal penalties and reputational damage. This post aims to demonstrate how public sector customers can develop a fine-grained authorization module using Amazon Web Services (AWS) identity services, extending beyond the capabilities of traditional role-based access control (RBAC), so they can achieve compliance objectives.

AWS branded background design with text overlay that says "Establishing a robust cloud platform and operational model through the CCoE"

Establishing a robust cloud platform and operational model through the CCoE

This post is part three of a four-part series that addresses how a Cloud Center of Excellence (CCoE) can be a viable solution to address the challenges of digital transformation. In this post, we address the three technical perspectives of the Amazon Web Services Cloud Adoption Framework (AWS CAF). While the business, organizational, and governance perspectives of the AWS CAF are crucial, the CCoE must also focus on the technical capabilities required to build and operate a cloud environment that meets the organization’s needs.

AWS branded background design with text overlay that says "Data ingress and egress through Trusted Research Environments and other secure enclaves"

Data ingress and egress through Trusted Research Environments and other secure enclaves

Data Review & Transfer Component (DRTC) on Amazon Web Services (AWS) provides a seamless solution to review, approve, and automate sensitive data transfer requests into and out of secure enclaves. In this post, we take you through the benefits of using DRTC to review data and other research artifacts for sensitivity prior to transfer into and out of these secure environments, in particular Trusted Research Environments (TREs).

AWS branded background design with text overlay that says "Building zero trust for the Department of Defense: Insights from Les Call, Director of the DoD CIO ZT PfMO"

Building zero trust for the Department of Defense: Insights from Les Call, Director of the DoD CIO ZT PfMO

In today’s digital landscape, federal agencies face unprecedented challenges in securing their complex information technology (IT) infrastructure. Traditional security models require more capability, which is why departments like the Department of Defense (DoD) and the Cybersecurity and Infrastructure Security Agency (CISA) are mandating zero trust architectures across their agencies. Renzo Rodriguez, managing director of US Federal Solutions Architecture at Amazon Web Services (AWS), sat down with Les Call, director of the Department of Defense CIO Zero Trust Portfolio Management Office, in a recent episode of “Mission Innovation, powered by AWS,” to explore the challenges and strategies of implementing zero trust within the DoD. Read this post for a recap of their conversation.

AWS branded background design with text overlay that says "Allies can share data and technologies and remain compliant with international regulations using AWS"

Allies can share data and technologies and remain compliant with international regulations using AWS

National security and defense depend upon close collaboration between international allies. To protect sensitive data and promote robust cybersecurity frameworks, organizations must consider one another’s compliance requirements. One such requirement is the United States International Traffic in Arms Regulations (ITAR), which restricts and controls the export of defense and military-related technologies in order to safeguard US national security. Here, we set out how an innovation called Trusted Secure Enclaves (TSE) on Amazon Web Services (AWS) allows non-US national organizations who want to use the most modern and innovative technology to deliver defense and security missions using the cloud can do this and be compliant.

AWS branded background design with text overlay that says "New AWS ebook explores cloud technology's impact on sustainability goals in higher education"

New AWS ebook explores cloud technology’s impact on sustainability goals in higher education

A new publication from Amazon Web Service (AWS) provides insights and case studies on using cloud technology to accelerate sustainability initiatives in the higher education sector. It showcases how AWS works closely with institutions to help them reach their sustainability goals.

AWS branded background design with text overlay that says "Higher Education Community Vendor Assessment Toolkit now available on AWS Artifact"

Higher Education Community Vendor Assessment Toolkit now available on AWS Artifact

EDUCAUSE and the Shared Assessments working group collaborated with Internet2 and REN-ISAC, to create the Higher Education Community Vendor Assessment Toolkit (HECVAT). EDUCAUSE is a non-profit association committed to advancing the use of technology and data in higher education. The HECVAT is a third-party, vendor questionnaire framework designed for higher education institutions to evaluate the security and privacy posture of cloud and technology providers. It is intended to centralize vendor security and compliance information for ease of use. Amazon Web Services (AWS) now offers both the HECVAT Lite version and Full version to customers on-demand.

AWS branded background design with text overlay that says "Empowering zero trust in public sector with Cisco Umbrella for Government on AWS"

Empowering zero trust in public sector with Cisco Umbrella for Government on AWS

Zero trust in the US public sector has become critical, especially as cyber threats targeting government agencies grow more complex and sophisticated. In line with the federal mandate for zero trust architecture (ZTA) outlined in Executive Order M-22-09, government agencies are required to adopt a comprehensive security framework that continuously verifies trust for every access request. In this post, we demonstrate how Cisco Umbrella for Government, built on Amazon Web Services (AWS), plays a key role in ZTA by providing multi-layered security and granular visibility across on premises and AWS.

AWS branded background design with text overlay that says "Using AWS for EHDS: A technical guide to building a secure health data platform"

Using AWS for EHDS: A technical guide to building a secure health data platform

In an earlier post, Build secure and scalable data platforms for the European Health Data Space (EHDS) with AWS, we discussed a reference architecture for building secure and scalable data platforms for secondary usage of health data in alignment with the European Health Data Space (EHDS) using Amazon Web Services (AWS). This follow-up post walks you through the technical implementation details for building such federated data governance and analysis platforms using AWS. Whether you are a healthcare organization, technology provider, or systems integrator, this post aims to equip you with the technical knowledge to build a secure data platform for secondary usage of health data in alignment with the EHDS Regulation.