article thumbnail

Hosting regulated U.S. State and Local Government Workloads in AWS

AWS Public Sector Blog

The following image illustrates the CJIS Security Policy baseline requirements, which include: Data isolation Encryption at rest using AWS Key Management Service (AWS KMS) Customer Managed Keys (CMK) Encryption in transit Media device sanitization Multi-factor authentication (MFA) Figure 3: Baseline requirement for CJIS.

article thumbnail

Overcoming the Digital Divide: Lessons State and Local Governments can Learn from the Hospitality Industry

Government Technology Insider

Not to mention, limited public budgets often limit solution procurement and the hiring of top-tier talent, making it difficult for CIOs to deliver on constituent and staff expectations. And, because the firewall and security features are built in, it eliminates the need for separate appliances, which reduces cost and administrative burden.

article thumbnail

Times Square Alliance Streetwatch program for reporting problems in the public space

Rebuilding Place in Urban Space

Problems such as graffiti, people in mental health crisis, sanitation, etc., In addition, BIDs like the Times Square Alliance also have some capacity to address issues through sanitation staff and other means. Many communities lack a clear process for reporting and addressing problems in the public space.