article thumbnail

Hosting regulated U.S. State and Local Government Workloads in AWS

AWS Public Sector Blog

The following image illustrates the CJIS Security Policy baseline requirements, which include: Data isolation Encryption at rest using AWS Key Management Service (AWS KMS) Customer Managed Keys (CMK) Encryption in transit Media device sanitization Multi-factor authentication (MFA) Figure 3: Baseline requirement for CJIS.

article thumbnail

How public sector organizations use AWS to build sustainability solutions

AWS Public Sector Blog

According to the UN, access to water and sanitation is a human right. provides potable water and sanitation services throughout the country while minimizing environmental impact. This gives us flexibility to deal with climate issues in different regions,” shared Sergio Mafra, an ONS specialist on data architecture.

article thumbnail

Calming airport data turbulence with EASE

AWS Public Sector Blog

The sanitation team at CVG turned a tweet of spilled coffee into a quick solution by immediately responding with a team member to clear the safety hazard. Subscribe to the AWS Public Sector Blog newsletter to get the latest in AWS tools, solutions, and innovations from the public sector delivered to your inbox, or contact us.