<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>AWS Public Sector Blog</title>
	<atom:link href="https://aws.amazon.com/blogs/publicsector/feed/" rel="self" type="application/rss+xml"/>
	<link>https://aws.amazon.com/blogs/publicsector/</link>
	<description>Innovating in the Public Sector</description>
	<lastBuildDate>Mon, 27 Apr 2026 22:52:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Deep dive into FedRAMP 20x Key Security Indicators: Decoding the 63 KSIs</title>
		<link>https://aws.amazon.com/blogs/publicsector/deep-dive-into-fedramp-20x-key-security-indicators-decoding-the-63-ksis/</link>
		
		<dc:creator><![CDATA[Paul Keastead]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 15:15:32 +0000</pubDate>
				<category><![CDATA[Amazon EventBridge]]></category>
		<category><![CDATA[Amazon VPC]]></category>
		<category><![CDATA[AWS Certificate Manager]]></category>
		<category><![CDATA[AWS CloudTrail]]></category>
		<category><![CDATA[AWS Config]]></category>
		<category><![CDATA[AWS Network Firewall]]></category>
		<category><![CDATA[AWS Security Hub]]></category>
		<category><![CDATA[AWS Step Functions]]></category>
		<category><![CDATA[Public Sector]]></category>
		<guid isPermaLink="false">b65bc0063ac68806d5016872cf5e34f862711918</guid>

					<description>In this post, we break down every KSI theme, categorize each indicator by validation approach, and provide a practical gap analysis framework so you can begin preparing your cloud service offering (CSO) for FedRAMP 20x authorization on Amazon Web Services (AWS).</description>
										<content:encoded>&lt;p&gt;&lt;img class="size-full wp-image-30869 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/27/Deep-dive-into-FedRAMP-20x-Key-Security-Indicators.png" alt="Deep dive into FedRAMP 20x Key Security Indicators: Decoding the 63 KSIs" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;The &lt;a href="https://www.fedramp.gov/" target="_blank" rel="noopener"&gt;Federal Risk and Authorization Management Program (FedRAMP)&lt;/a&gt; 20x program replaces hundreds of narrative control descriptions with Key Security Indicators (KSIs) organized across 12 themes.&lt;/p&gt; 
&lt;p&gt;In this post, we break down every KSI theme, categorize each indicator by validation approach, and provide a practical gap analysis framework so you can begin preparing your cloud service offering (CSO) for FedRAMP 20x authorization on &lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt;.&lt;/p&gt; 
&lt;h3&gt;What are Key Security Indicators?&lt;/h3&gt; 
&lt;p&gt;In our &lt;a href="https://aws.amazon.com/blogs/publicsector/prepare-for-fedramp-20x-with-aws-automation-and-validation/" target="_blank" rel="noopener"&gt;first blog post&lt;/a&gt;, we introduced FedRAMP 20x and its shift from static documentation to automated evidence. KSIs are the building blocks of that shift. Each KSI represents a measurable, concrete security outcome, which cloud service providers (CSPs) must demonstrate through automated validation, documented processes, or both.&lt;/p&gt; 
&lt;p&gt;The &lt;a href="https://www.fedramp.gov/20x/phase-two/requirements/" target="_blank" rel="noopener"&gt;Phase 2 pilot completeness requirements&lt;/a&gt; set a clear bar: Automated validation must cover at least 70% of KSIs, every KSI must be addressed, and evidence must be available in both human-readable and machine-readable formats. Understanding what each KSI requires is the first step toward meeting that bar.&lt;/p&gt; 
&lt;h3&gt;The 12 KSI themes at a glance&lt;/h3&gt; 
&lt;p&gt;The following table summarizes all 12 KSI themes, their associated KSI counts, and primary focus areas to help you quickly assess where your organization stands:&lt;/p&gt; 
&lt;table border="2"&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;td&gt;&lt;strong&gt;Theme&lt;/strong&gt;&lt;/td&gt; 
   &lt;td&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/td&gt; 
   &lt;td&gt;&lt;strong&gt;KSI count&lt;/strong&gt;&lt;/td&gt; 
   &lt;td&gt;&lt;strong&gt;Focus area&lt;/strong&gt;&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;CSX&lt;/td&gt; 
   &lt;td&gt;Cross-Cutting&lt;/td&gt; 
   &lt;td&gt;3&lt;/td&gt; 
   &lt;td&gt;Implementation summaries, Minimum Assessment Standard (MAS) scope, priority ordering&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;AFR&lt;/td&gt; 
   &lt;td&gt;Authorization by FedRAMP&lt;/td&gt; 
   &lt;td&gt;10&lt;/td&gt; 
   &lt;td&gt;MAS, vulnerability disclosure, scanning/remediation, Plan of Action and Milestones (POA&amp;amp;M), significant change notification (SCN), authorization data, persistent validation, continuous monitoring&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;CNA&lt;/td&gt; 
   &lt;td&gt;Cloud Native Architecture&lt;/td&gt; 
   &lt;td&gt;8&lt;/td&gt; 
   &lt;td&gt;Network segmentation, attack surface minimization, distributed denial of service (DDoS) protection, API security, automated posture enforcement&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;CMT&lt;/td&gt; 
   &lt;td&gt;Change Management&lt;/td&gt; 
   &lt;td&gt;4&lt;/td&gt; 
   &lt;td&gt;Change control, immutable infrastructure, deployment validation&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;IAM&lt;/td&gt; 
   &lt;td&gt;Identity and Access Management&lt;/td&gt; 
   &lt;td&gt;7&lt;/td&gt; 
   &lt;td&gt;Phishing-resistant multi-factor authentication (MFA), authentication without passwords, least privilege, just-in-time (JIT) access&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;MLA&lt;/td&gt; 
   &lt;td&gt;Monitoring, Logging, and Auditing&lt;/td&gt; 
   &lt;td&gt;5&lt;/td&gt; 
   &lt;td&gt;Audit log generation, security information and event management (SIEM) integration, configuration evaluation&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;SVC&lt;/td&gt; 
   &lt;td&gt;Service Configuration&lt;/td&gt; 
   &lt;td&gt;8&lt;/td&gt; 
   &lt;td&gt;Encryption at rest and in transit, Federal Information Processing Standards (FIPS) cryptography, secrets management, secure defaults&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;RPL&lt;/td&gt; 
   &lt;td&gt;Recovery Planning&lt;/td&gt; 
   &lt;td&gt;4&lt;/td&gt; 
   &lt;td&gt;Recovery time objective (RTO), recovery point objective (RPO), backup procedures, recovery testing&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;PIY&lt;/td&gt; 
   &lt;td&gt;Policy and Inventory&lt;/td&gt; 
   &lt;td&gt;5&lt;/td&gt; 
   &lt;td&gt;Asset inventory, software inventory, executive support, software development lifecycle (SDLC) security&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;INR&lt;/td&gt; 
   &lt;td&gt;Incident Response&lt;/td&gt; 
   &lt;td&gt;3&lt;/td&gt; 
   &lt;td&gt;Incident response plan, procedures, post-incident review&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;CED&lt;/td&gt; 
   &lt;td&gt;Cybersecurity Education&lt;/td&gt; 
   &lt;td&gt;4&lt;/td&gt; 
   &lt;td&gt;General training, role-specific training, developer training, response/recovery training&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;SCR&lt;/td&gt; 
   &lt;td&gt;Supply Chain Risk&lt;/td&gt; 
   &lt;td&gt;2&lt;/td&gt; 
   &lt;td&gt;Supply chain risk assessment, third-party monitoring&lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;&lt;em&gt;Table 1: The 12 KSI themes at a glance&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Categorizing KSIs: Automate, document, or both&lt;/h3&gt; 
&lt;p&gt;Not every KSI can be validated by a machine. Some require documented processes, executive attestations, or human judgment. We categorize each KSI into one of three buckets to help you plan your implementation approach:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;Fully automatable KSIs can be validated entirely through automated tooling, such as &lt;a href="https://aws.amazon.com/config/" target="_blank" rel="noopener"&gt;AWS Config&lt;/a&gt; rules, &lt;a href="https://aws.amazon.com/security-hub/" target="_blank" rel="noopener"&gt;AWS Security Hub&lt;/a&gt; checks, or infrastructure as code (IaC) scanning. Examples include KSI-SVC-SNT (encrypt network traffic), KSI-CNA-RNT (restrict network traffic), and KSI-IAM-MFA (enforce phishing-resistant MFA).&lt;/li&gt; 
 &lt;li&gt;Process and documentation KSIs require written policies, procedures, or human review cycles. Examples include KSI-INR-AAR (after-action reports), KSI-PIY-RES (executive support review), and KSI-CED-RGT (general training review).&lt;/li&gt; 
 &lt;li&gt;Both KSIs have an automated component and a documented process component. For example, KSI-AFR-VDR (vulnerability detection and response) requires automated scanning tools and a documented methodology with defined service-level agreement (SLA) timelines.&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p&gt;The following figure illustrates how KSIs are distributed across these three categories and the validation lifecycle from preventive controls through runtime monitoring:&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/27/FedRAMP-20x-KSI-validation-lifecycle.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30865 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/27/FedRAMP-20x-KSI-validation-lifecycle.jpg" alt="Diagram showing the FedRAMP 20x validation lifecycle on AWS across four stages: preventive, pre-deploy, runtime, and threat detection." width="624" height="312"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 1: FedRAMP 20x KSI validation lifecycle showing the distribution of KSIs across automated, documented, and hybrid categories, with AWS services mapped to each validation stage&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Theme-by-theme breakdown&lt;/h3&gt; 
&lt;p&gt;In this section, we explore the areas relevant to each KSI theme and the AWS services related to that theme.&lt;/p&gt; 
&lt;h3&gt;Authorization by FedRAMP (AFR), 10 KSIs&lt;/h3&gt; 
&lt;p&gt;This is the most complex theme because each KSI ties to a FedRAMP-specific standard. KSI-AFR-MAS requires you to identify every information resource in scope, including people, budgets, and systems. KSI-AFR-VDR requires a complete vulnerability detection and response methodology with N1 through N5 severity ratings and defined remediation timelines. KSI-AFR-SCN requires classifying changes as routine, adaptive, or transformative, each with different notification timelines.&lt;/p&gt; 
&lt;p&gt;On AWS, services such as &lt;a href="https://aws.amazon.com/inspector/" target="_blank" rel="noopener"&gt;Amazon Inspector&lt;/a&gt; and AWS Security Hub can help address KSI-AFR-VDR. &lt;a href="https://aws.amazon.com/cloudtrail/" target="_blank" rel="noopener"&gt;AWS CloudTrail&lt;/a&gt; and &lt;a href="https://aws.amazon.com/eventbridge/" target="_blank" rel="noopener"&gt;Amazon EventBridge&lt;/a&gt; support KSI-AFR-SCN by detecting and classifying infrastructure changes.&lt;/p&gt; 
&lt;h3&gt;Cloud Native Architecture (CNA), 8 KSIs&lt;/h3&gt; 
&lt;p&gt;These KSIs focus on network segmentation, attack surface minimization, and automated posture enforcement. KSI-CNA-MAT (minimize attack surface) and KSI-CNA-RNT (restrict network traffic) are strong candidates for automated validation using&lt;a href="https://aws.amazon.com/vpc/" target="_blank" rel="noopener"&gt; Amazon Virtual Private Cloud (Amazon VPC)&lt;/a&gt; security groups, network access control lists (ACLs), and &lt;a href="https://aws.amazon.com/network-firewall/" target="_blank" rel="noopener"&gt;AWS Network Firewall&lt;/a&gt;. KSI-CNA-EIS (enforce intended state) maps directly to AWS Config rules that detect drift from your desired configuration.&lt;/p&gt; 
&lt;h3&gt;Identity and Access Management (IAM), 7 KSIs&lt;/h3&gt; 
&lt;p&gt;KSI-IAM-MFA (phishing-resistant MFA) and KSI-IAM-ELP (least privilege) are foundational. &lt;a href="https://aws.amazon.com/iam/identity-center/" target="_blank" rel="noopener"&gt;AWS IAM Identity Center&lt;/a&gt; supports phishing-resistant MFA with FIDO2 security keys.&lt;a href="https://aws.amazon.com/iam/access-analyzer/" target="_blank" rel="noopener"&gt; AWS IAM Access Analyzer&lt;/a&gt; helps validate least privilege by identifying unused permissions. KSI-IAM-JIT (just-in-time access) can be addressed through temporary role assumption with time-bounded sessions.&lt;/p&gt; 
&lt;h3&gt;Service Configuration (SVC), 8 KSIs&lt;/h3&gt; 
&lt;p&gt;Encryption is the main idea of this theme. KSI-SVC-SNT (secure network traffic) and KSI-SVC-VRI (validate resource integrity) require FIPS 140-2 validated cryptographic modules. &lt;a href="https://aws.amazon.com/kms/" target="_blank" rel="noopener"&gt;AWS Key Management Service (AWS KMS)&lt;/a&gt; provides FIPS-validated key management, and &lt;a href="https://aws.amazon.com/certificate-manager/" target="_blank" rel="noopener"&gt;AWS Certificate Manager (ACM)&lt;/a&gt; automates Transport Layer Security (TLS) certificate provisioning. KSI-SVC-ACM (automate configuration management) aligns with IaC practices using &lt;a href="https://aws.amazon.com/cloudformation/" target="_blank" rel="noopener"&gt;AWS CloudFormation&lt;/a&gt; or Terraform.&lt;/p&gt; 
&lt;h3&gt;Monitoring, Logging, and Auditing (MLA), 5 KSIs&lt;/h3&gt; 
&lt;p&gt;KSI-MLA-OSM (operate SIEM capability) requires centralized, tamper-resistant logging. AWS CloudTrail with organization-level trails, &lt;a href="https://aws.amazon.com/cloudwatch/" target="_blank" rel="noopener"&gt;Amazon CloudWatch&lt;/a&gt; logs, and AWS Security Hub provide the foundation. KSI-MLA-EVC (evaluate configurations) maps to AWS Config conformance packs that persistently evaluate resource configurations.&lt;/p&gt; 
&lt;h3&gt;Change Management (CMT) 4 KSIs, Recovery Planning (RPL) 4 KSIs, Incident Response (INR) 3 KSIs, and remaining themes&lt;/h3&gt; 
&lt;p&gt;The remaining themes align well with established cloud-based practices and are summarized here at a higher level. CMT KSIs favor immutable infrastructure patterns (KSI-CMT-RMV) where changes are deployed through redeployment rather than in-place modification, a natural fit for IaC workflows.&lt;/p&gt; 
&lt;p&gt;RPL KSIs require documented and tested recovery objectives. INR KSIs require both documented procedures and evidence of post-incident reviews. CED KSIs are entirely process-based, requiring evidence of training programs. SCR KSIs require supply chain risk assessments and automated monitoring of third-party dependencies.&lt;/p&gt; 
&lt;h3&gt;Understanding persistent validation&lt;/h3&gt; 
&lt;p&gt;A critical concept in FedRAMP 20x is the word &lt;em&gt;persistent&lt;/em&gt;. FedRAMP defines it as “occurring in a firm, steady way that is repeated over a long period of time.” For moderate impact systems, machine-based KSI validation must run at least every 3 days. Non-machine KSIs must be validated at least every 3 months.&lt;/p&gt; 
&lt;p&gt;This means your validation infrastructure must be always-on, not a point-in-time assessment. On AWS, this translates to Amazon EventBridge scheduled rules triggering &lt;a href="https://aws.amazon.com/step-functions/" target="_blank" rel="noopener"&gt;AWS Step Functions&lt;/a&gt; workflows that collect evidence from AWS Config, AWS Security Hub, Amazon Inspector, and other services on a recurring cadence.&lt;/p&gt; 
&lt;h3&gt;Conducting your KSI gap analysis&lt;/h3&gt; 
&lt;p&gt;Start your gap analysis with these steps:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;&lt;strong&gt;Assess your current state&lt;/strong&gt;. For each of the 63 KSIs, document whether you have full coverage, partial coverage, or no coverage today. If you’re running the &lt;a href="https://aws.amazon.com/solutions/implementations/landing-zone-accelerator-on-aws/" target="_blank" rel="noopener"&gt;Landing Zone Accelerator on AWS (LZA)&lt;/a&gt; with the Universal Configuration, many CNA, MLA, and IAM KSIs already have partial coverage through AWS Security Hub, &lt;a href="https://aws.amazon.com/guardduty/" target="_blank" rel="noopener"&gt;Amazon GuardDuty&lt;/a&gt;, AWS Config, and AWS CloudTrail.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Identify automation candidates&lt;/strong&gt;. Flag every KSI where AWS provides a service or feature that can produce machine-readable evidence. Target the 70% automated validation threshold.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Catalog documentation gaps&lt;/strong&gt;. For process-based KSIs, determine whether you have existing policies that can be adapted or whether new documentation is needed.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Prioritize by theme.&lt;/strong&gt; Follow the recommended priority order: AFR KSIs first (they define the framework), then CNA and IAM (foundational security posture), then SVC and MLA (operational security), and finally the remaining themes.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Plan your evidence pipeline.&lt;/strong&gt; Every KSI needs evidence in both human-readable clear summaries with context, timestamps, and plain-language explanations of what was verified, and machine-readable formats. Plan how each piece of evidence will be generated, stored, and published.&lt;/li&gt; 
&lt;/ol&gt; 
&lt;h3&gt;What comes next&lt;/h3&gt; 
&lt;p&gt;With your gap analysis complete, the next step is implementing preventive controls that prohibit noncompliant configurations before they reach your environment. In our next blog, we cover how &lt;a href="https://aws.amazon.com/organizations/" target="_blank" rel="noopener"&gt;AWS Organizations&lt;/a&gt; service control policies (SCPs) enforce KSIs at the organizational level, reducing both your compliance burden and your assessment surface.&lt;/p&gt; 
&lt;h3&gt;Next steps and resources&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/security-assurance-services/" target="_blank" rel="noopener"&gt;Contact AWS Security Assurance Services&lt;/a&gt; – Get help with your FedRAMP authorization journey&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.fedramp.gov/20x/" target="_blank" rel="noopener"&gt;FedRAMP 20x overview&lt;/a&gt; – Program overview, goals, and phased delivery timeline&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.fedramp.gov/20x/phase-two/requirements/" target="_blank" rel="noopener"&gt;FedRAMP 20x Phase 2 requirements&lt;/a&gt; – Completeness requirements and KSI-AFR discussion&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.fedramp.gov/20x/goals/" target="_blank" rel="noopener"&gt;FedRAMP 20x goals&lt;/a&gt; – The five key goals driving the 20x program&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/security-hub/" target="_blank" rel="noopener"&gt;AWS Security Hub&lt;/a&gt; – Centralized security findings aggregation&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/config/" target="_blank" rel="noopener"&gt;AWS Config&lt;/a&gt; – Persistent configuration evaluation and compliance&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/solutions/implementations/landing-zone-accelerator-on-aws/" target="_blank" rel="noopener"&gt;Landing Zone Accelerator on AWS&lt;/a&gt; – Multi-account environment with built-in security controls&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/prepare-for-fedramp-20x-with-aws-automation-and-validation/" target="_blank" rel="noopener"&gt;Prepare for FedRAMP 20x with AWS automation and validation&lt;/a&gt; – Series introduction and architecture overview&lt;/li&gt; 
&lt;/ul&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>Turning urgency into opportunity: NJIT’s 10-week cloud migration</title>
		<link>https://aws.amazon.com/blogs/publicsector/turning-urgency-into-opportunity-njits-10-week-cloud-migration/</link>
		
		<dc:creator><![CDATA[Blake Haggerty]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 15:00:52 +0000</pubDate>
				<category><![CDATA[Amazon RDS]]></category>
		<category><![CDATA[Public Sector]]></category>
		<guid isPermaLink="false">28045453032fb312fffc423411b6a122077deaf8</guid>

					<description>Learn how NJIT worked with Amazon Web Services (AWS) and TEKsystems Global Services (TGS) to migrate more than 200 essential virtual servers to the AWS Cloud—70% faster than typical timelines.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30766 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/21/Turning-urgency-into-opportunity.png" alt="Turning urgency into opportunity: NJIT’s 10-week cloud migration" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.njit.edu/" target="_blank" rel="noopener"&gt;New Jersey Institute of Technology (NJIT)&lt;/a&gt; faced a decision when sudden licensing changes meant the university’s operating costs for its private virtual cloud environment would rise significantly. The university operates with a single, centralized IT team managing all technology infrastructure—from core services to discipline-specific academic platforms, high-performance research computing, grant-funded projects, data warehouses, and more—so the potential budget impact called for a fast, coordinated response.&lt;/p&gt; 
&lt;p&gt;With only 10 weeks before renewal, NJIT worked with &lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt; and &lt;a href="https://www.teksystems.com/en/it-and-business-services" target="_blank" rel="noopener"&gt;TEKsystems Global Services (TGS)&lt;/a&gt; to migrate more than 200 essential virtual servers to the &lt;a href="https://aws.amazon.com/products/" target="_blank" rel="noopener"&gt;AWS Cloud&lt;/a&gt;—70% faster than typical timelines. These workloads included enterprise applications, web servers, academic file and database servers, and infrastructure support servers. The swift transition avoided a costly licensing increase and positioned the university to operate more effectively at scale and shift investments from legacy technologies to student-facing services.&lt;/p&gt; 
&lt;h3&gt;Supporting enterprise, academic, and research technology from one IT team&lt;/h3&gt; 
&lt;p&gt;While many higher education institutions operate with decentralized IT departments across the organization, NJIT centralized its technology infrastructure years ago. “We have such a wide catalog of services,” said Matthew Hoskins, director of core systems and cloud services for NJIT. “Every technology is somewhere in the university. If we’re not using it in the enterprise, someone is trying to teach it in a classroom.”&lt;/p&gt; 
&lt;p&gt;The scope is immense: databases for academics and research, coding environments, web hosting, distributed file systems, storage, high-performance computing, and even infrastructure for the university’s makerspace. The team also manages cybersecurity, digital signage, and support for new buildings, facilitating campus growth.&lt;/p&gt; 
&lt;p&gt;NJIT’s centralized structure allowed the university to scale efficiently while maintaining consistency across all these environments. When licensing changes put pressure on its entire infrastructure, that same centralization became an advantage—enabling the school to rapidly evaluate all 500+ servers and coordinate decisions on which workloads to migrate first. For institutions with siloed IT departments, that kind of coordinated response would be nearly impossible.&lt;/p&gt; 
&lt;h3&gt;Navigating the complexity of a 10-week deadline&lt;/h3&gt; 
&lt;p&gt;NJIT was gradually moving workloads to the cloud, but the compressed timeline created by sudden licensing changes introduced new challenges. Working across multiple teams, NJIT needed to quickly identify which systems required immediate migration from its 500-plus server environment.&lt;/p&gt; 
&lt;p&gt;The selection process required coordination between the applications management group, academic research and computing, business and academic stakeholders, and core systems teams to determine what could realistically move to the cloud now and what needed to stay on premises until later phases. NJIT identified 200 servers as ideal candidates for cloud migration.&lt;/p&gt; 
&lt;p&gt;After this selection, the next challenge lay in migrating systems without complete visibility into application architectures. “We didn’t necessarily have an extensive understanding of all these applications and their dependencies,” said Hoskins. “We didn’t fully understand how they communicate with each other in some cases.” This lack of documentation would become one of the project’s biggest technical challenges, requiring the team to discover dependencies and connections in real time.&lt;/p&gt; 
&lt;p&gt;While migrations of this scale often take six to 12 months, the right combination of preparation, collaboration, and tools can significantly accelerate that timeline. For NJIT, success meant assembling a team ready to move fast and solve problems collaboratively as they emerged.&lt;/p&gt; 
&lt;h3&gt;Building the team, securing funding, and reskilling for the cloud&lt;/h3&gt; 
&lt;p&gt;With limited documentation, tight deadlines, and 200 servers to migrate, NJIT relied on existing relationships with TGS, an &lt;a href="https://teksystems.com/aws" target="_blank" rel="noopener"&gt;AWS Premier Tier Services Partner&lt;/a&gt;, and AWS. All three organizations established a collaborative approach from the start. “Not every consulting company would want to take on a project like that,” said Hoskins.&lt;/p&gt; 
&lt;p&gt;Adam Mendlik, principal cloud architect at TGS, described the approach: “We had conversations early on where we aligned on what NJIT wanted to accomplish, and the challenges they faced. Having that shared understanding was key to the collaboration and meeting the deadline together.”&lt;/p&gt; 
&lt;p&gt;AWS played a critical role in achieving the aggressive timeline. Beyond providing funding through the &lt;a href="https://aws.amazon.com/migration-acceleration-program/" target="_blank" rel="noopener"&gt;AWS Migration Acceleration Program (MAP)&lt;/a&gt;, AWS solutions architects worked closely with the team on weekly calls, troubleshooting issues, and providing architectural guidance. The engagement included two in-person workshops of intensive hands-on training sessions with labs and exercises that transferred essential cloud expertise to NJIT’s staff, so they could manage and continue modernizing its new environment long after the migration was completed.&lt;/p&gt; 
&lt;h3&gt;Managing technical challenges and modernization&lt;/h3&gt; 
&lt;p&gt;After migration began, the team navigated new technical hurdles. Adjusting processing power and memory for each application was built into the project timeline, allowing the team to refine configurations as real-world performance data replaced initial estimates. The biggest challenge proved to be complex re-IPing requirements that forced the applications team to hunt down hardcoded IP addresses buried in legacy applications. When those addresses were identified and fixed, many connectivity issues that had initially seemed daunting simply disappeared. Resolving this and other technical debt throughout the project has continued to pay dividends, making NJIT’s technology operations more efficient and effective.&lt;/p&gt; 
&lt;p&gt;The collaborative teamwork enabled NJIT to tackle broader improvements alongside immediate problems. Rather than simply replicating its existing environment, the TGS team implemented a scalable, secure, and governed&lt;a href="https://aws.amazon.com/solutions/implementations/landing-zone-accelerator-on-aws/" target="_blank" rel="noopener"&gt; Landing Zone Accelerator on AWS (LZA)&lt;/a&gt; that provides a holistic view of AWS accounts across the enterprise. This modernized account structure introduced role-based access controls, network architecture controls for inbound and outbound traffic, and improved security governance across all environments.&lt;/p&gt; 
&lt;p&gt;This landing zone environment also introduced account vending capabilities for NJIT’s research division, allowing rapid provisioning for specialized workloads. With department-level billing, resource tagging for cost visibility, and detailed governance controls in place, NJIT can now track spending by team or project and deploy advanced artificial intelligence (AI) workloads in &lt;a href="https://www.baioniq.com/" target="_blank" rel="noopener"&gt;Quantiphi baioniq&lt;/a&gt; with confidence. Additionally, TGS addressed AWS LZA limitations by implementing a custom solution for load balancer deployment, providing flexibility for future application architectures.&lt;/p&gt; 
&lt;h3&gt;Redirecting savings to student-focused programs&lt;/h3&gt; 
&lt;p&gt;“If we can deliver IT services more efficiently, there’s more money for programs that benefit students directly,” said Hoskins. “We don’t want to spend more on IT than we have to.” This philosophy drove the entire project, and the results delivered exactly what NJIT needed.&lt;/p&gt; 
&lt;p&gt;By migrating to AWS, NJIT achieved more than $100,000 in cost avoidance tied to the impending licensing increase. In addition to that one-time savings, the migration delivered substantial annual operational savings while transforming how the university funds technology infrastructure, shifting from large capital expenses to operational expenses and freeing budget managers from rigid hardware refresh cycles. NJIT also gained infrastructure that automatically scales with campus growth, along with an IT team focused on innovation rather than hardware maintenance.&lt;/p&gt; 
&lt;p&gt;Within a year of the announced increases in virtual server licensing, NJIT had completed the migration and built significant internal cloud expertise, positioning the university ahead of peer institutions still planning its moves. TGS delivered these outcomes on time and within budget, reinforcing the value of strategic collaboration during high-pressure projects. Most importantly, TGS and AWS helped NJIT move toward its long-term goal of spending less on infrastructure and more on educational programs and ongoing innovation.&lt;/p&gt; 
&lt;h3&gt;Moving toward database modernization and serverless computing&lt;/h3&gt; 
&lt;p&gt;The migration’s success gave NJIT confidence to accelerate its cloud journey. The team is now moving toward database modernization with &lt;a href="https://aws.amazon.com/rds/" target="_blank" rel="noopener"&gt;Amazon Relational Database Service (Amazon RDS)&lt;/a&gt; and exploring serverless computing and containerization—innovations that would have been much harder to pursue while managing aging on-premises infrastructure.&lt;/p&gt; 
&lt;p&gt;For universities facing similar pressures, the NJIT experience demonstrates that a crisis can become an opportunity when approached strategically. The key lessons are practical:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Plan six to 12 months ahead, when possible, but don’t let tight timelines prevent action&lt;/li&gt; 
 &lt;li&gt;Choose who to work with as carefully as technology—look for teams willing to collaborate and take some risks&lt;/li&gt; 
 &lt;li&gt;Invest in staff training during compressed projects, as the cloud expertise gained is invaluable&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;NJIT’s approach shows that with the right team and a willingness to move fast, infrastructure challenges don’t have to become crises. What could have been a major disruption ultimately became a strategic positioning for continued modernization.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://aws.amazon.com/government-education/contact/" target="_blank" rel="noopener"&gt;Learn how AWS helps institutions build resilient infrastructure that supports educational missions.&lt;/a&gt;&lt;/p&gt; 
&lt;h3&gt;Read related stories on the AWS Public Sector Blog&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/seven-lessons-learned-driving-aws-cloud-adoption-in-research-at-saint-louis-university/" target="_blank" rel="noopener"&gt;Seven lessons learned: Driving AWS Cloud adoption in research at Saint Louis University&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/cloud-cost-savings-10-tips-for-academic-institutions/" target="_blank" rel="noopener"&gt;Cloud cost savings: 10 tips for academic institutions&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/nrecas-cloud-transformation-driving-affordability-reliability-and-sustainability-in-the-public-sector-with-aws/" target="_blank" rel="noopener"&gt;NRECA’s cloud transformation: Driving affordability, reliability, and sustainability in the public sector with AWS&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>The transformative impact of generative AI on business workflows in a highly regulated industry</title>
		<link>https://aws.amazon.com/blogs/publicsector/the-transformative-impact-of-generative-ai-on-business-workflows-in-a-highly-regulated-industry/</link>
		
		<dc:creator><![CDATA[Yunjie Chen]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 19:41:00 +0000</pubDate>
				<category><![CDATA[Amazon Bedrock]]></category>
		<category><![CDATA[Amazon Elastic Kubernetes Service]]></category>
		<category><![CDATA[Amazon Nova]]></category>
		<category><![CDATA[Amazon OpenSearch Service]]></category>
		<category><![CDATA[Amazon RDS]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[Public Sector]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">5f5d9d9bc25c4e6daf4bed522eab20a7d989698f</guid>

					<description>The aerospace industry represents one of the most complex regulatory environments for software development, where system failures can result in catastrophic consequences including loss of human life and multibillion-dollar assets. In this blog post, learn how Blue Origin operates within this framework, in which software systems control every aspect of rocket propulsion, navigation, life support, and mission-critical operations.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30727 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/16/The-transformative-impact-of-generative-AI-on-business-workflows-in-a-highly-regulated-industry.png" alt="The transformative impact of generative AI on business workflows in a highly regulated industry" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;The aerospace industry represents one of the most complex regulatory environments for software development, where system failures can result in catastrophic consequences including loss of human life and multibillion-dollar assets. &lt;a href="https://www.blueorigin.com/" target="_blank" rel="noopener"&gt;Blue Origin&lt;/a&gt; operates within this framework, in which software systems control every aspect of rocket propulsion, navigation, life support, and mission-critical operations.&lt;/p&gt; 
&lt;p&gt;Unlike traditional software companies that can iterate rapidly, aerospace companies must adhere to safety and mission-critical standards such as &lt;a href="https://en.wikipedia.org/wiki/DO-178C" target="_blank" rel="noopener"&gt;DO-178C&lt;/a&gt; (Software Considerations in Airborne Systems and Equipment Certification) and &lt;a href="https://nodis3.gsfc.nasa.gov/displayDir.cfm?t=NPR&amp;amp;c=7150&amp;amp;s=2D" target="_blank" rel="noopener"&gt;NPR 7150.2D&lt;/a&gt; (NASA Software Engineering Requirements). These standards mandate extensive verification and validation processes, creating a unique environment where innovation must be balanced against rigorous safety protocols—making it an ideal case study for examining how &lt;a href="https://aws.amazon.com/generative-ai/" target="_blank" rel="noopener"&gt;generative AI&lt;/a&gt; can be integrated into highly regulated development workflows using &lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt;.&lt;/p&gt; 
&lt;h3&gt;The current state of aerospace software development&lt;/h3&gt; 
&lt;p&gt;Current aerospace software development operates under a safety-first methodology that prioritizes risk mitigation over time-to-market. Such development must adhere to the following principles:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Extensive documentation requirements&lt;/strong&gt; – Documentation often comprises 60–80% of total development effort, with requirements for configuration management, change control records, and verification matrices.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Formal verification processes&lt;/strong&gt; – Software must undergo extensive static analysis and testing that can include thousands of test cases. Hardware-in-the-loop simulations are standard practice.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Multilevel reviews and approvals&lt;/strong&gt; – Design reviews involve cross-functional teams that include systems engineers, safety engineers, and regulatory compliance specialists. Independent verification and validation (IV&amp;amp;V) teams provide objective assessment of software quality and compliance.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Long development cycles&lt;/strong&gt; – Aerospace software development cycles typically span 2–5 years for major systems, with minor updates requiring months of verification before deployment.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;These stringent requirements call for a strict software development lifecycle (SDLC) with many lengthy verification steps (Figure 1). This V-Model approach progresses from mission and stakeholder requirements through system design and software requirements on the descending left side, then validates through corresponding verification phases (from unit testing through integration and system verification to final mission validation) on the ascending right side.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/22/Figure11.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30787 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/22/Figure11.png" alt="Diagram of steps and relationship to software development lifecycle" width="3808" height="2684"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 1: Aerospace software development lifecycle (V-Model) showing the relationship between requirements definition phases on the left and corresponding verification phases on the right, from mission requirements through system validation&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Generative AI as a workflow catalyst&lt;/h3&gt; 
&lt;p&gt;Current aerospace SDLC workflows might not adequately meet the industry’s growing demands for speed, accuracy, and agility. Generative AI provides an opportunity to streamline these processes.&lt;/p&gt; 
&lt;p&gt;One powerful application lies in augmenting the requirements generation process. The following diagram shows a typical requirements workflow, where requirements gathering and analysis are thorough but time intensive. Engineers must collect and analyze stakeholder needs, then document them in comprehensive specifications focused on feasibility, correctness, completeness, and consistency. The workflow proceeds from change requests through requirements analysis and documentation, followed by formal review processes, and finally to version-controlled requirements storage. The AI requirement checker integrates into this flow between initial documentation and formal review, automatically validating requirements against quality standards.&lt;/p&gt; 
&lt;p&gt;Requirement defects become exponentially more expensive to fix as development progresses. Generative AI solutions, such as requirement checkers, address this by identifying issues before formal review begins, substantially reducing review time and costly downstream issues.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/22/Figure_21.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30783 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/22/Figure_21.png" alt="Figure 2 Typical aerospace software requirement generation process" width="4564" height="1444"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 2: Typical aerospace software requirement generation process, showing the workflow from change requests through version-controlled requirements, with AI requirement checker integration highlighted in green&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;High-quality, validated requirements enable more effective testing. Generative AI can help eliminate defects in requirements, and similarly it can automatically generate test plans from requirements. As illustrated in the following figure, AI can analyze requirements documentation and create corresponding test plans for complete requirements coverage, automatically populating test plan templates while maintaining full traceability throughout the verification process. The workflow begins with requirements and relevant standards as inputs to the AI system, which uses predefined templates to generate comprehensive test cases that directly trace back to specific requirements, ensuring complete coverage and regulatory compliance.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/22/Figure3-2.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30786 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/22/Figure3-2.png" alt="Diagram of ai augmentation" width="2856" height="1988"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 3: AI augmentation in the typical aerospace requirement-based test plan generation, showing how AI generates test cases from requirements, standards, and templates to produce requirement-based test plans with full traceability.&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Generative AI solutions for aerospace software development&lt;/h3&gt; 
&lt;p&gt;The ideal generative AI solution for aerospace software development requires automated documentation and traceability, integrated compliance into agentic AI operations processes, continuous risk assessment, and abilities to incorporate aerospace domain-specific knowledge.&lt;/p&gt; 
&lt;p&gt;Most existing commercial software solutions lack the comprehensive capabilities needed, making a custom-built solution using AWS not only preferable, but necessary. Agentic AI represents a fundamental shift from traditional automation to autonomous problem-solving, ushering in an era of AI-augmented SDLC management.&lt;/p&gt; 
&lt;p&gt;At its core, an AI agent functions as an intelligent entity that perceives its environment, processes complex information, and makes informed decisions. In software development, these agents understand intricate requirements while using contextual information to review requirements for accuracy and completeness. They can intelligently decompose complex requirements, generate comprehensive test plans, produce executable code and tests, and integrate seamlessly with the entire development ecosystem.&lt;/p&gt; 
&lt;h3&gt;Agentic AI in the aerospace industry&lt;/h3&gt; 
&lt;p&gt;The generative AI solutions built for Blue Origin incorporate these key agentic AI characteristics:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;&lt;strong&gt;Autonomy&lt;/strong&gt; – Agents operate independently, making decisions about requirement correctness and maturity or generating test plans with minimal human supervision, using AWS agentic capabilities that provide the appropriate level of context to support these autonomous workflows.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Reasoning and planning&lt;/strong&gt; – Agents analyze requirements, understand the environment in which they exist, and formulate strategic plans.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Tool use&lt;/strong&gt; – Agents using existing software tools, APIs, &lt;a href="https://modelcontextprotocol.io/docs/getting-started/intro" target="_blank" rel="noopener"&gt;Model Context Protocol (MCP)&lt;/a&gt;, and AI models.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Memory and learning&lt;/strong&gt; – Agents retain information from past interactions and learn from successes and failures.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Goal-oriented&lt;/strong&gt; – Agents work toward specific objectives, continuously refining their approach.&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p&gt;The following figure illustrates how aerospace software development workflow changes with the adoption of agentic AI. Traditional software development lifecycle includes six main steps from planning, requirement analysis, to defining requirements followed by design, development, testing, and finally deployment and maintenance. These rigorous and labor-intensive steps are required to ensure software robustness and reliability for highly regulated mission critical applications. With agentic AI, it augments the existing process and shortens the software development lifecycle by reducing labor-intensive task durations such as requirements discovery, code generation, and testing. Furthermore, AI agents are employed to streamline code release management, and post-release performance monitoring and debugging.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/22/Figure4-2.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30785 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/22/Figure4-2.png" alt="illustration of software development lifecycle and agentic ai workflow intersect" width="4564" height="1644"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 4: Software development lifecycle and agentic AI workflow intersect, showing traditional SDLC phases at the top and corresponding AI-augmented processes underneath, from requirements discovery through monitoring and evolution.&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;The AI orchestration platform in &lt;a href="https://aws.amazon.com/eks/" target="_blank" rel="noopener"&gt;Amazon Elastic Kubernetes Service (Amazon EKS)&lt;/a&gt; through &lt;a href="https://aws.amazon.com/bedrock/" target="_blank" rel="noopener"&gt;Amazon Bedrock&lt;/a&gt; operates as a centralized intelligent development assistant that integrates multiple data sources and knowledge repositories in &lt;a href="https://aws.amazon.com/rds/" target="_blank" rel="noopener"&gt;Amazon Relational Database Service (Amazon RDS)&lt;/a&gt;. The platform uses AI agents powered by &lt;a href="https://aws.amazon.com/what-is/large-language-model/" target="_blank" rel="noopener"&gt;large language models (LLMs)&lt;/a&gt; such as &lt;a href="https://aws.amazon.com/bedrock/anthropic/" target="_blank" rel="noopener"&gt;Claude Sonnet by Anthropic in Amazon Bedrock&lt;/a&gt; and &lt;a href="https://aws.amazon.com/nova/" target="_blank" rel="noopener"&gt;Amazon Nova&lt;/a&gt; to process developer requests through a unified interface such as an integrated developer environment (IDE) or command line interface (CLI). When users interact with the system, the platform dynamically routes &lt;a href="https://aws.amazon.com/opensearch-service/" target="_blank" rel="noopener"&gt;Amazon OpenSearch Service&lt;/a&gt; queries to specialized agents that access relevant Amazon Bedrock knowledge bases containing relevant project data. These agents employ reasoning capabilities to understand context, retrieve information, and generate responses such as requirement analysis. The following diagram shows this architecture.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/22/Figure5-2.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30784 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/22/Figure5-2.png" alt="Amazon OpenSearch Service architecture" width="3124" height="2044"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 5: Architecture showing the integration of Amazon OpenSearch Service, Amazon Bedrock knowledge bases and agents, Amazon EKS, Amazon RDS for PostgreSQL, and Amazon Simple Storage Service (Amazon S3) to create an AI-powered development assistance platform&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Summary&lt;/h3&gt; 
&lt;p&gt;At Blue Origin, generative AI has revolutionized software development by reducing the documentation burden 40-60% through automated generation of traceability matrices, specifications, and compliance reports while performing real-time safety assessments and requirement-based test plan creation. This AI-augmented approach maintains rigorous safety standards while dramatically reducing development timelines by 40%, accelerating innovation cycles without compromising the process assurance requirements of human spaceflight software development.&lt;/p&gt; 
&lt;p&gt;Beyond aerospace, this workflow transformation extends to other highly regulated industries such as healthcare, finance, and defense. Generative AI creates dynamic, intelligent systems capable of continuous learning, so human developers can focus on strategic thinking while autonomous agents handle repetitive tasks. AWS provides the robust platform for deploying these transformative solutions, creating a harmonious blend of human intelligence and AI capabilities for more efficient and innovative enterprises.&lt;/p&gt; 
&lt;p&gt;Organizations can capture the significant reduction in documentation burden and faster development timelines that AI-powered requirement checkers and automated test plan generation delivers with the comprehensive AWS AI services supporting the secure AI deployment with guardrails and observability. These will free engineering teams from repetitive tasks so they can focus on strategic innovation while maintaining the rigorous safety standards your industry demands, with applications extending to healthcare, finance, and defense sectors facing similar regulatory challenges. To learn more about how AWS helps public sector organizations deploy AI-driven solutions, &lt;a href="https://aws.amazon.com/government-education/contact/" target="_blank" rel="noopener"&gt;connect with the AWS Public Sector Team today&lt;/a&gt;.&lt;/p&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>Breaking Down Barriers: How AWS Democratizes Genomic Data for the World</title>
		<link>https://aws.amazon.com/blogs/publicsector/breaking-down-barriers-how-aws-democratizes-genomic-data-for-the-world/</link>
		
		<dc:creator><![CDATA[Dr. Dawn Heisey-Grove]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 22:00:48 +0000</pubDate>
				<category><![CDATA[Amazon EC2]]></category>
		<category><![CDATA[Amazon Neptune]]></category>
		<category><![CDATA[Amazon Simple Storage Service (S3)]]></category>
		<category><![CDATA[AWS HealthOmics]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Public Sector]]></category>
		<guid isPermaLink="false">c6aed26a0233644a942e4e4beeeed2dc5978e3be</guid>

					<description>This blog is the first in a three-part series that explores how AWS is transforming genomic research through democratized data access, sovereign-by-design outbreak intelligence platforms, and population-scale biobanks that enable global collaboration while maintaining data security and privacy.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30580 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/04/Breaking-Down-Barriers-How-AWS-Democratizes-Genomic-Data-for-the-World.png" alt="Breaking Down Barriers: How AWS Democratizes Genomic Data for the World" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;Part 1 of 3: Democratizing Access to Genomic Data and Analytics&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;Every human deserves access to innovations that could save their life. Yet for decades, groundbreaking genomic research remained locked behind institutional walls, accessible only to well-funded laboratories.&lt;/p&gt; 
&lt;p&gt;At Amazon Web Services (AWS), we believe global IT infrastructure and advanced analytical capabilities are necessary tools to address these challenges. We’re transforming how researchers discover treatments, how clinicians diagnose conditions, and, ultimately, how millions of people receive care.&lt;/p&gt; 
&lt;p&gt;This blog is the first in a three-part series that explores how AWS is transforming genomic research through democratized data access, sovereign-by-design outbreak intelligence platforms, and population-scale biobanks that enable global collaboration while maintaining data security and privacy.&lt;/p&gt; 
&lt;h3&gt;The Challenge: A World of Data, Islands of Access&lt;/h3&gt; 
&lt;p&gt;Genomics has become a big data industry, and researchers everywhere face multifaceted challenges:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Volume of storage.&lt;/strong&gt; A single Next-Generation Sequencing (NGS) instrument can produce over 1TB of data per day, with estimates predicting organizations will generate between two and 40 exabytes of genomic data within the next decade.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Computational barriers.&lt;/strong&gt; Analyzing genomic data requires massive computing power previously available only to major research institutions.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Geographic and sovereignty barriers.&lt;/strong&gt; Researchers in low- and middle-income countries often lack infrastructure, but countries prefer to maintain control over sensitive health data while still enabling collaborative research&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;When only wealthy institutions can analyze genomic data, medical breakthroughs apply only to smaller, wealthier populations, leaving billions underserved by the promise of precision medicine.&lt;/p&gt; 
&lt;h3&gt;Cloud Infrastructure for Global Health Equity&lt;/h3&gt; 
&lt;p&gt;AWS addresses these challenges through open data initiatives, purpose-built genomic services, and strategic credit programs that put powerful technology within reach of organizations supporting underserved populations.&lt;/p&gt; 
&lt;h3&gt;AWS Registry of Open Data: 95+ Genomic Datasets and Growing&lt;/h3&gt; 
&lt;p&gt;The &lt;a href="https://registry.opendata.aws/" target="_blank" rel="noopener"&gt;AWS Registry of Open Data&lt;/a&gt; democratizes data access. The registry hosts 95+ genomic data sources—including the &lt;a href="https://registry.opendata.aws/ncbi-sra/" target="_blank" rel="noopener"&gt;Sequence Read Archive (40PB+),&lt;/a&gt; &lt;a href="https://registry.opendata.aws/tcga/" target="_blank" rel="noopener"&gt;Cancer Genome Atlas (2.5PB+)&lt;/a&gt;, and &lt;a href="https://registry.opendata.aws/humancellatlas/" target="_blank" rel="noopener"&gt;Human Cell Atlas&lt;/a&gt; (300TB)—making them readily available in &lt;a href="https://aws.amazon.com/s3/" target="_blank" rel="noopener"&gt;Amazon Simple Storage Service&lt;/a&gt; (Amazon S3). Researchers can analyze data where it lives, dramatically reducing time-to-insight and costs.&lt;/p&gt; 
&lt;h3&gt;AWS Services for Genomic Workloads&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/healthomics/" target="_blank" rel="noopener"&gt;&lt;strong&gt;AWS HealthOmics&lt;/strong&gt;&lt;/a&gt; – A fully managed service for specialized genomic storage and managed workflow execution at scale.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;&lt;a href="https://aws.amazon.com/hpc/" target="_blank" rel="noopener"&gt;High-performance computing&lt;/a&gt;&lt;/strong&gt; – &lt;a href="https://aws.amazon.com/batch/" target="_blank" rel="noopener"&gt;AWS Batch,&lt;/a&gt; &lt;a href="https://aws.amazon.com/hpc/parallelcluster/" target="_blank" rel="noopener"&gt;AWS ParallelCluster&lt;/a&gt;, and &lt;a href="https://aws.amazon.com/ec2/instance-types/f2/" target="_blank" rel="noopener"&gt;GPU/FPGA-accelerated&lt;/a&gt; &lt;a href="https://aws.amazon.com/ec2/instance-types/" target="_blank" rel="noopener"&gt;Amazon Elastic Compute Cloud&lt;/a&gt; (Amazon EC2) instances for variant calling and gene expression analysis.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Secure, compliant storage&lt;/strong&gt; – Amazon S3 and &lt;a href="https://aws.amazon.com/s3/storage-classes/glacier/" target="_blank" rel="noopener"&gt;Amazon Glacier Deep Archive&lt;/a&gt; for cost-effective long-term storage.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;&lt;a href="https://aws.amazon.com/nova/forge/" target="_blank" rel="noopener"&gt;Amazon Nova Forge&lt;/a&gt;&lt;/strong&gt; – For developing specialized domain models, from drug discovery assistants to custom genomics models.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;Real-World Impact: Opening Doors for Researchers Worldwide&lt;/h3&gt; 
&lt;p&gt;At AWS, we believe our cloud and AI services are powerful tools to address the world’s urgent and complex health challenges.&lt;/p&gt; 
&lt;p&gt;The true measure of democratization isn’t in technology specifications, it’s in whose lives are changed. In 2021, we launched the &lt;a href="https://aws.amazon.com/government-education/nonprofits/global-social-impact/health-equity/" target="_blank" rel="noopener"&gt;AWS Health Equity Initiative&lt;/a&gt; (HEI), a three-year $60M commitment to advance global health equity.&lt;/p&gt; 
&lt;p&gt;Here are two examples of these investments:&lt;/p&gt; 
&lt;h3&gt;Korea University: Advancing Female Autism Research in East Asia&lt;/h3&gt; 
&lt;p&gt;Autism research historically focused on male subjects and Western populations, leaving critical gaps in our understanding of how the condition manifests in women and in East Asian populations. Dr. Joon-Yong An at Korea University set out to change this by &lt;a href="https://link.springer.com/article/10.1186/s13073-024-01385-6" target="_blank" rel="noopener"&gt;analyzing 1.4 petabytes of genomic data to identify sex-specific genetic factors&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Using &lt;a href="https://aws.amazon.com/about-aws/our-impact/" target="_blank" rel="noopener"&gt;AWS credits&lt;/a&gt;, Dr. An’s team processed whole-genome sequencing data from over 42,000 individuals across Korean and international autism cohorts, facilitating large-scale collaborative studies in East Asia where autism research is limited.&lt;/p&gt; 
&lt;p&gt;Using scalable AWS services like EC2 with GPU acceleration and S3, they conducted a &lt;a href="https://academic.oup.com/bib/article/25/4/bbae323/7706421" target="_blank" rel="noopener"&gt;Category-Wide Association Study framework to prioritize noncoding variants associated with autism&lt;/a&gt;. The team also trained high-performance deep learning models to predict sex-specific genetic factors.&lt;/p&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“By efficiently processing large-scale genomic datasets, our solution accelerates the discovery of female-specific risk factors, facilitating more accurate diagnoses and personalized interventions. Ultimately, our findings will contribute to reducing health disparities and improving health outcomes for autistic individuals,” reported Dr. An.&lt;/p&gt; 
 &lt;p&gt;“Our work opened new avenues for researchers to explore sex-related genetic factors in various neurodevelopmental and psychiatric conditions. By democratizing access to computationally intensive genomic research, AWS empowered us to bridge gender disparities in autism diagnosis and treatment, ensuring that overlooked populations receive the medical attention and resources they deserve.”&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;h3&gt;Imagenomix: Precision Cancer Diagnostics for All Backgrounds&lt;/h3&gt; 
&lt;p&gt;Approximately 98% of global cancer patients lack access to targeted genetic testing, largely due to the high cost (~$6,000 per patient) and slow turnaround (33+ days) of conventional NGS panels.&lt;/p&gt; 
&lt;p&gt;Using AWS infrastructure, &lt;a href="https://imagenomix.ai/" target="_blank" rel="noopener"&gt;Imagenomix&lt;/a&gt; developed IGX Predict&lt;img src="https://s.w.org/images/core/emoji/14.0.0/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;"&gt;, an AI-powered platform that analyzes standard pathology slides to predict gene mutations in as little as three minutes, at a fraction of the cost of traditional Next-Generation Sequencing (NGS). By training their models on diverse patient populations, Imagenomix ensures their diagnostic tools work accurately across all racial and ethnic backgrounds.&lt;/p&gt; 
&lt;p&gt;The social impact of this approach is profound. IGX Predict dramatically lowers barriers to patients’ access to NGS by achieving a 100% tissue success rate compared to a 26% failure rate with traditional methods. This enables clinicians to rapidly identify the right patients for clinical trials and targeted therapies, regardless of where they are in the world.&lt;/p&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“Finding the right patients is the biggest bottleneck in drug development, and that bottleneck disproportionately excludes patients from underrepresented populations,” said Travis Wold, CEO of Imagenomix. “Our mission is to make precision cancer diagnostics accessible to everyone — not just the few — by turning a standard pathology slide into genetic insight in minutes.”&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;p&gt;With a growing product pipeline spanning lung, breast, and brain cancers, Imagenomix is positioning itself as the new standard in precision access, ensuring that advances in genomic medicine reach every patient, everywhere.&lt;/p&gt; 
&lt;h3&gt;Bridging Data and Discovery: The AWS Open Data-NVIDIA Knowledge Graph Hackathon&lt;/h3&gt; 
&lt;p&gt;Dr. An’s autism research and Imagenomix’s AI driven precision diagnostics platform, showcase how AWS credit programs and scalable infrastructure democratize computational power for genomic discovery. The second pillar of democratization — open access to foundational genomic datasets hosted freely on AWS — creates opportunities for collaborative innovation at unprecedented scale, exemplified by a hackathon that united researchers globally to advance trustworthy AI in biomedicine.&lt;/p&gt; 
&lt;p&gt;In October 2025, AWS partnered with NVIDIA to host a transatlantic hackathon bringing together 53 researchers from the US and UK. Over three days, seven teams built prototype systems combining knowledge graphs with GraphRAG to make AI outputs more trustworthy in biomedical research, using &lt;a href="https://aws.amazon.com/neptune/" target="_blank" rel="noopener"&gt;Amazon Neptune&lt;/a&gt;, &lt;a href="https://registry.opendata.aws/" target="_blank" rel="noopener"&gt;Open Data on AWS&lt;/a&gt;, and NVIDIA’s PyTorch Geometric RAG resources.&lt;/p&gt; 
&lt;p&gt;Teams created solutions addressing critical challenges, from &lt;a href="https://github.com/collaborativebioinformatics/GeNETwork" target="_blank" rel="noopener"&gt;GeNETwork’s precision&lt;/a&gt;&lt;a href="https://github.com/collaborativebioinformatics/GeNETwork" target="_blank" rel="noopener"&gt; oncology knowledge graph&lt;/a&gt; integrating cancer genomics and pharmacological data, to BioGraphRAG’s citation-supported biomedical question answering system.&lt;/p&gt; 
&lt;h3&gt;The Path Forward: From Access to Action&lt;/h3&gt; 
&lt;p&gt;Democratizing access to genomic data is just the beginning. Part 2 of this blog series explores how AWS enables global pathogen surveillance and outbreak intelligence through sovereign-by-design platforms, which allow countries to collaborate on infectious disease tracking while maintaining control over their sensitive health data within national borders.&lt;/p&gt; 
&lt;p&gt;The future of global health depends on ensuring that genomic insights benefit everyone, not just those in wealthy nations or well-funded institutions. Through open data initiatives, purpose-built services, and strategic support for underserved researchers, AWS helps build that future one genome at a time.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Learn more about &lt;a href="https://aws.amazon.com/about-aws/our-impact/" target="_blank" rel="noopener"&gt;AWS Social Impact&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;Learn more about &lt;a href="https://registry.opendata.aws/" target="_blank" rel="noopener"&gt;Registry of Open Data on AWS&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;Learn more about &lt;a href="http://aws.amazon.com/health" target="_blank" rel="noopener"&gt;AWS for Healthcare &amp;amp; Life Sciences&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;&lt;strong&gt;About the Authors:&lt;/strong&gt;&lt;/h3&gt; 
&lt;p&gt;This blog series was developed by AWS Skilling and Social Impact (SSI) in collaboration with AWS Healthcare and Life Sciences specialists. AWS SSI exists to fuel, align, and amplify the good that AWS does in the world, helping organizations transform health outcomes through cloud and AI technology.&lt;/p&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>24 new or updated datasets available on the Registry of Open Data on AWS</title>
		<link>https://aws.amazon.com/blogs/publicsector/24-new-or-updated-datasets-available-on-the-registry-of-open-data-on-aws/</link>
		
		<dc:creator><![CDATA[Kyle Cook]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 21:37:58 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">f28aa6786b3bf1b49a250c218d07c692f2c56e69</guid>

					<description>Learn how the Amazon Web Services (AWS) Open Data Sponsorship Program makes high-value, cloud-optimized datasets publicly available on AWS.</description>
										<content:encoded>&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30776 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/21/24-new-or-updated-datasets-available-on-the-Registry-of-Open-Data-on-AWS.jpg" alt="24 new or updated datasets available on the Registry of Open Data on AWS" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;The &lt;a href="https://aws.amazon.com/opendata/open-data-sponsorship-program/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS) Open Data Sponsorship Program&lt;/a&gt; makes high-value, cloud-optimized datasets publicly available on AWS. AWS works with data providers to democratize access to data by making it available to the public.&lt;/p&gt; 
&lt;p&gt;People can use it for analyzing data on AWS or developing new cloud-based techniques, formats, and tools that lower the cost of working with data. This is to encourage the development of communities that benefit from access to shared datasets.&lt;/p&gt; 
&lt;p&gt;Through the AWS Open Data Sponsorship Program, customers are making over 300 petabytes of high-value, cloud-optimized data available for public use.&lt;/p&gt; 
&lt;p&gt;All publicly available datasets can be found in the &lt;a href="https://registry.opendata.aws/" target="_blank" rel="noopener"&gt;Registry of Open Data on AWS&lt;/a&gt; and are also discoverable on AWS Data Exchange. This quarter, AWS released 24 new or updated datasets.&lt;/p&gt; 
&lt;h3&gt;What are people doing with the Registry of Open Data on AWS?&lt;/h3&gt; 
&lt;p&gt;Organizations are using the Registry of Open Data on AWS in many different ways, including:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/purdue-university-democratizes-geospatial-data-through-aws-open-data-sponsorship-program/" target="_blank" rel="noopener"&gt;Purdue University democratizes geospatial data through the AWS Open Data Sponsorship Program&lt;/a&gt; with &lt;a href="https://ps2.d2s.org/" target="_blank" rel="noopener"&gt;Purdue University’s Data to Science Initiative (D2S)&lt;/a&gt;. With this program, researchers across disciplines can share and access a unified collection of geospatial datasets from around the world. AWS recently participated in and helped sponsor &lt;a href="https://lib.purdue.edu/gis/gisday/" target="_blank" rel="noopener"&gt;Purdue Geographic Information Systems (GIS) Day 2025: Unlocking GeoAI Data and Tools&lt;/a&gt;, where we presented to faculty, students, and researchers about the value of cloud technology in the geospatial space.&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://scitechdaily.com/scientists-map-aging-brain-in-unprecedented-detail-revealing-clues-to-alzheimers-and-more/" target="_blank" rel="noopener"&gt;Scientists Map Aging Brain in Unprecedented Detail, Revealing Clues to Alzheimer’s and More&lt;/a&gt; using the Registry of Open Data on AWS. &lt;a href="https://registry.opendata.aws/salk-aging-mouse-brain-epigeneti/" target="_blank" rel="noopener"&gt;Hosting the dataset on the Registry of Open Data on AWS&lt;/a&gt; makes it widely accessible while removing the heavy computational barriers typically required to handle large biological datasets. Having nearly 900,000 spatially mapped cells in the cloud means scientists around the world can explore the data without needing specialized infrastructure.&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://github.com/louis-e/arnis" target="_blank" rel="noopener"&gt;Arnis&lt;/a&gt;, an open source tool, &lt;a href="https://aws.amazon.com/blogs/publicsector/building-realistic-minecraft-worlds-with-open-data-on-aws-how-arnis-uses-elevation-datasets-at-scale/" target="_blank" rel="noopener"&gt;transforms real-world locations into playable Minecraft worlds by processing geospatial data&lt;/a&gt; hosted on AWS. By migrating to &lt;a href="https://registry.opendata.aws/terrain-tiles/" target="_blank" rel="noopener"&gt;Terrain Tiles&lt;/a&gt;—a global elevation dataset on the Registry of Open Data on AWS—Arnis eliminated data retrieval costs while serving nearly 300,000 users.&lt;/li&gt; 
 &lt;li&gt;Columbia University’s &lt;a href="https://leap.columbia.edu/" target="_blank" rel="noopener"&gt;Learning the Earth with Artificial Intelligence and Physics (LEAP)&lt;/a&gt; and the &lt;a href="https://www.nsf.gov/od/oia/ia/stc" target="_blank" rel="noopener"&gt;U.S. National Science Foundation (NSF) Science and Technology Center&lt;/a&gt; collaborated with AWS to build &lt;a href="https://sites.stat.columbia.edu/tzheng/publication/jaber-autoclimds-2025/" target="_blank" rel="noopener"&gt;AutoClimDS&lt;/a&gt;, an &lt;a href="https://aws.amazon.com/blogs/publicsector/democratizing-climate-data-science-how-columbia-universitys-leap-center-built-autoclimds-on-aws/" target="_blank" rel="noopener"&gt;agentic AI system that researchers with no specialized coding expertise can use&lt;/a&gt; to conduct climate data science workflows using natural language.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;OpenFold3 Training Data from OpenFold Consortium&lt;/h3&gt; 
&lt;p&gt;The &lt;a href="https://openfold.io/" target="_blank" rel="noopener"&gt;OpenFold Consortium&lt;/a&gt; announced a major &lt;a href="https://registry.opendata.aws/openfold3/" target="_blank" rel="noopener"&gt;OpenFold3&lt;/a&gt; update as well as the public release of training datasets and full-stack tooling for reproducible biomolecular AI. OpenFold3 is an open source deep learning system for cofolding that predicts the 3D structures of biomolecular complexes from sequence and molecular inputs, including proteins interacting with small molecules and nucleic acids. OpenFold3 enables structure prediction for biomolecular complexes relevant to drug discovery, protein engineering, and basic research, supporting both evaluation workflows and downstream method development.&lt;/p&gt; 
&lt;p&gt;With this update, OpenFold3 is available as an end-to-end open cofolding stack, including training datasets, model weights, training and inference code, and evaluation scripts released under permissive licenses. This full-stack release facilitates independent reproduction of reported results, rigorous benchmarking, and extension through fine-tuning and method development, which are difficult capabilities to achieve with closed or inference-only systems.&lt;/p&gt; 
&lt;p&gt;The OpenFold3 dataset joins 23 other new or updated datasets on the Registry of Open Data on AWS in the following categories:&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Climate and weather&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/wis2-global-cache-jma/" target="_blank" rel="noopener"&gt;Global Cache of Japan&lt;/a&gt; from &lt;a href="https://www.wis-jma.go.jp/cms/index.html" target="_blank" rel="noopener"&gt;Japan Meteorological Agency&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/met-office-uk-land-observations/" target="_blank" rel="noopener"&gt;Met Office UK Land Surface Observations&lt;/a&gt; from &lt;a href="https://www.metoffice.gov.uk/" target="_blank" rel="noopener"&gt;Met Office&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/dynamical-noaa-gefs/" target="_blank" rel="noopener"&gt;NOAA GEFS – dynamical.org Icechunk Zarr&lt;/a&gt; from &lt;a href="https://www.noaa.gov/" target="_blank" rel="noopener"&gt;National Oceanic Atmosphere Administration (NOAA)&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/dynamical-noaa-mrms/" target="_blank" rel="noopener"&gt;NOAA MRMS – dynamical.org Icechunk Zarr&lt;/a&gt; from &lt;a href="https://www.noaa.gov/" target="_blank" rel="noopener"&gt;NOAA&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/noaa-s104/" target="_blank" rel="noopener"&gt;NOAA S-104 Water Level Data&lt;/a&gt; from &lt;a href="https://www.noaa.gov/" target="_blank" rel="noopener"&gt;NOAA&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/met-office-uk-marine-observations/" target="_blank" rel="noopener"&gt;Met Office UK Marine Observations&lt;/a&gt; from &lt;a href="https://www.metoffice.gov.uk/" target="_blank" rel="noopener"&gt;Met Office&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/noaa-nexrad/" target="_blank" rel="noopener"&gt;NEXRAD on AWS&lt;/a&gt; from &lt;a href="https://www.unidata.ucar.edu/" target="_blank" rel="noopener"&gt;Unidata&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/nexrad-arco/" target="_blank" rel="noopener"&gt;NEXRAD ARCO – Analysis-Ready Cloud-Optimized Weather Radar&lt;/a&gt; from &lt;a href="https://atmoscale.ai/" target="_blank" rel="noopener"&gt;Atmoscale&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/dynamical-ecmwf-aifs-single/" target="_blank" rel="noopener"&gt;ECMWF AIFS Single – dynamical.org Icechunk Zarr&lt;/a&gt; from &lt;a href="https://dynamical.org/" target="_blank" rel="noopener"&gt;dynamical.org&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;Geospatial&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/data-to-science/" target="_blank" rel="noopener"&gt;Data to Science Catalog&lt;/a&gt; from &lt;a href="https://registry.opendata.aws/?search=managedBy:geospatial%20data%20science%20lab%20at%20purdue%20university" target="_blank" rel="noopener"&gt;Geospatial Data Science Lab at Purdue University&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/lgnd-clay-v1-5-sentinel2/" target="_blank" rel="noopener"&gt;LGND Clay v1.5 Sentinel-2&lt;/a&gt; from &lt;a href="https://source.coop/" target="_blank" rel="noopener"&gt;Source Cooperative&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/dataforgood-fb-forestsv2/" target="_blank" rel="noopener"&gt;Version 2 High Resolution Canopy Height Maps&lt;/a&gt; from &lt;a href="http://www.meta.com/" target="_blank" rel="noopener"&gt;Meta&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/canoe/" target="_blank" rel="noopener"&gt;CANOE (Canadian Aquatic Navigation for Observation of the Environment) Dataset&lt;/a&gt; from &lt;a href="http://asrl.utias.utoronto.ca/" target="_blank" rel="noopener"&gt;Autonomous Space Robotics Laboratory (ASRL)&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/fomo-norlab/" target="_blank" rel="noopener"&gt;FoMo – A Multi-Season Dataset for Robot Navigation in Forêt Montmorency&lt;/a&gt; from &lt;a href="https://norlab.ulaval.ca/" target="_blank" rel="noopener"&gt;Norlab, Université Laval&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/mast-kepler/" target="_blank" rel="noopener"&gt;Kepler Mission Data&lt;/a&gt; from &lt;a href="https://registry.opendata.aws/?search=managedBy:space%20telescope%20science%20institute" target="_blank" rel="noopener"&gt;Space Telescope Science Institute&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/noaa-jscope/" target="_blank" rel="noopener"&gt;NOAA JISAO’s Seasonal Coastal Ocean Prediction of the Ecosystem (J-SCOPE)&lt;/a&gt; from &lt;a href="https://www.noaa.gov/" target="_blank" rel="noopener"&gt;NOAA&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;Life sciences&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/anvilproject/" target="_blank" rel="noopener"&gt;NHGRI AnVIL Project&lt;/a&gt; from &lt;a href="https://anvilproject.org/" target="_blank" rel="noopener"&gt;the AnVIL project&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/openfold3/" target="_blank" rel="noopener"&gt;OpenFold3 Training Data&lt;/a&gt; from &lt;a href="https://portal.openfold.omsf.io/datasets" target="_blank" rel="noopener"&gt;OpenFold Consortium&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/run_dbcan/" target="_blank" rel="noopener"&gt;run_dbcan CAZyme and CGC annotation database&lt;/a&gt; on AWS from &lt;a href="https://run-dbcan.readthedocs.io/en/latest/" target="_blank" rel="noopener"&gt;run_dbCAN&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/smaht/" target="_blank" rel="noopener"&gt;Somatic Mosaicism across Human Tissues (SMaHT)&lt;/a&gt; from &lt;a href="https://data.smaht.org/" target="_blank" rel="noopener"&gt;SMaHT Data Analysis Center (DAC)&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/epilepsy-science/" target="_blank" rel="noopener"&gt;Epilepsy.Science&lt;/a&gt; from &lt;a href="https://www.upenn.edu/" target="_blank" rel="noopener"&gt;University of Pennsylvania&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/opentargets/" target="_blank" rel="noopener"&gt;OpenTargets&lt;/a&gt; from &lt;a href="https://www.opentargets.org/" target="_blank" rel="noopener"&gt;OpenTargets platform&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/frag-struc/" target="_blank" rel="noopener"&gt;RNA structure by fragmentation frequency&lt;/a&gt; from &lt;a href="https://www.a-star.edu.sg/gis" target="_blank" rel="noopener"&gt;The Genome Institute of Singapore&lt;/a&gt; and &lt;a href="https://www.umassmed.edu/rti/" target="_blank" rel="noopener"&gt;UMass Chan Medical School’s RNA Therapeutics Institute&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;AI/ML&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://registry.opendata.aws/vesuvius-challenge-herculaneum-scrolls/" target="_blank" rel="noopener"&gt;Vesuvius Challenge – CT Scans of Herculaneum Papyri&lt;/a&gt; from &lt;a href="https://scrollprize.org/" target="_blank" rel="noopener"&gt;Vesuvius Challenge&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;How can you make your data available?&lt;/h3&gt; 
&lt;p&gt;The AWS Open Data Sponsorship Program covers the cost of storage for publicly available high-value, cloud-optimized datasets. We work with data providers who seek to:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Democratize access to data by making it available for analysis on AWS&lt;/li&gt; 
 &lt;li&gt;Develop new cloud-based techniques, formats, and tools that lower the cost of working with data&lt;/li&gt; 
 &lt;li&gt;Encourage the development of communities that benefit from access to shared datasets&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;a href="https://aws.amazon.com/opendata/open-data-sponsorship-program/" target="_blank" rel="noopener"&gt;Learn how to propose your dataset to the AWS Open Data Sponsorship Program.&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://aws.amazon.com/opendata/" target="_blank" rel="noopener"&gt;Learn more about open data on AWS.&lt;/a&gt;&lt;/p&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>The four questions every government leader should be asking about AI</title>
		<link>https://aws.amazon.com/blogs/publicsector/the-four-questions-every-government-leader-should-be-asking-about-ai/</link>
		
		<dc:creator><![CDATA[David Appel]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 20:34:56 +0000</pubDate>
				<category><![CDATA[Amazon Bedrock]]></category>
		<category><![CDATA[Public Sector]]></category>
		<category><![CDATA[Regions]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">b512086dd1f520801ea0f9f26eb13d47cb5529c6</guid>

					<description>Learn how the pace of change in AI is reshaping how governments approach national security, economic progress, scientific discovery, and critical infrastructure.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30743 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/19/The-four-questions-every-government-leader-should-be-asking-about-AI.png" alt="The four questions every government leader should be asking about AI" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;The pace of change in &lt;a href="https://aws.amazon.com/ai/" target="_blank" rel="noopener"&gt;AI&lt;/a&gt; is reshaping how governments approach &lt;a href="https://aws.amazon.com/solutions/defense-national-security/" target="_blank" rel="noopener"&gt;national security&lt;/a&gt;, economic progress, scientific discovery, and critical infrastructure. Over the past several months, I’ve sat across the table from cabinet officials, combatant commanders, intelligence leaders, and their counterparts worldwide. The conversations are urgent, the stakes are real, and the questions keep coming back to four themes.&lt;/p&gt; 
&lt;h3&gt;1. GPUs alone are not an AI strategy&lt;/h3&gt; 
&lt;p&gt;Many believe that AI success requires rooms full of GPUs. Procure the hardware, secure power agreements, stand up the clusters, and mission outcomes will follow. I understand the instinct—it feels tangible, controllable, sovereign. But hardware alone has never been the bottleneck.&lt;/p&gt; 
&lt;p&gt;A room full of GPUs isn’t a capability. Organizations often underestimate the cost and complexity to deliver at scale with monitoring, governance, and security. The real challenge is the time it takes to get from raw hardware and data to mission insight and capability, a problem that requires integrated services working together seamlessly.&lt;/p&gt; 
&lt;p&gt;On-premises AI infrastructure requires building or leasing specialized facilities, months of procurement lead time, and teams of engineers to manage GPU clusters. By the time you’ve stood up the environment, you’re already a generation behind your adversaries.&lt;/p&gt; 
&lt;p&gt;Security at scale matters. Cyber threats are industrialized, automated, and accelerating. &lt;a href="https://www.crowdstrike.com/en-us/global-threat-report/" target="_blank" rel="noopener"&gt;CrowdStrike’s 2025 Global Threat Report&lt;/a&gt; documented a 150% surge in state-sponsored espionage in 2024, with 300% spikes in critical industries. Attacks on healthcare, energy, and government infrastructure are relentless. Protecting critical assets against this threat landscape means building and automating security operations from scratch.&lt;/p&gt; 
&lt;p&gt;In the cloud, that protection comes at scale. &lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt; monitors &lt;a href="https://www.youtube.com/watch?v=pbFLIYPsjqY" target="_blank" rel="noopener"&gt;4.8 billion flows of network traffic per second and 1 billion host telemetry events per second&lt;/a&gt;. Our active defense systems, from global honeypot intelligence to automated takedown of malicious infrastructure, operate at a scale only possible in the cloud.&lt;/p&gt; 
&lt;p&gt;We’re already seeing this at &lt;a href="https://inl.gov/news-release/idaho-national-laboratory-accelerates-nuclear-energy-projects-with-amazon-web-services-cloud-and-ai-technologies/" target="_blank" rel="noopener"&gt;Idaho National Laboratory&lt;/a&gt;, where agentic AI tools compress nuclear energy design cycles from years to months. The scientists aren’t managing infrastructure or defending perimeters—they’re focused on breakthrough research.&lt;/p&gt; 
&lt;p&gt;The question government leaders should be asking isn’t “where do I put my GPUs?” It’s “how can I move my people from data to decision faster?” The answer lives in the cloud.&lt;/p&gt; 
&lt;h3&gt;2. Mission-critical requires resilience&lt;/h3&gt; 
&lt;p&gt;Recent events worldwide have reminded us that physical infrastructure, no matter where it sits, is not immune to disruption. Data centers can be impacted by conflict, natural disasters, and cascading failures. These sobering realities deserve serious architectural thinking, not slogans.&lt;/p&gt; 
&lt;p&gt;The instinct to spread workloads as a hedge against disruption is understandable. But it conflates two different concepts: multi-cloud and multi-region. Multi-cloud is about choice, and choice is valuable. The question is how to exercise options in ways that strengthen resilience rather than fragment your workload’s security and operational posture. There are scenarios where multi-cloud makes sense: different mission areas with distinct requirements, workload-specific optimizations, or regulatory mandates requiring provider diversity.&lt;/p&gt; 
&lt;p&gt;Multi-region is an architecture discipline of isolated regions, each with independent power, cooling, and networking, designed to fail over. Not all cloud regions are created equal. AWS is intentionally architected for resilience through &lt;a href="https://aws.amazon.com/about-aws/global-infrastructure/" target="_blank" rel="noopener"&gt;AWS Regions and Availability Zones&lt;/a&gt;. Each &lt;a href="https://docs.aws.amazon.com/glossary/latest/reference/glos-chap.html#region" target="_blank" rel="noopener"&gt;AWS Region&lt;/a&gt; is physically isolated from other Regions, and each contains multiple Availability Zones with independent power, cooling, and networking. This is a fundamental architectural difference that directly influences mission continuity decisions.&lt;/p&gt; 
&lt;p&gt;Multi-cloud introduces operational complexity. Maintaining full workload portability between providers means duplicating security models, replicating data pipelines, training teams on multiple platforms, and managing the overhead of fundamentally different architectures. In a threat environment where nation-state actors run years-long campaigns against critical infrastructure, fragmented security postures and complexity are what adversaries exploit.&lt;/p&gt; 
&lt;p&gt;The biggest cost reductions and strongest security outcomes result from the depth of a well-architected and optimized environment with a provider that has earned the right to run your most sensitive workloads.&lt;/p&gt; 
&lt;h3&gt;3. No government should bet its mission on a single foundation model&lt;/h3&gt; 
&lt;p&gt;The &lt;a href="https://aws.amazon.com/what-is/foundation-models/" target="_blank" rel="noopener"&gt;foundation model (FM)&lt;/a&gt; landscape is moving faster than any technology cycle I’ve seen in my career. Models that lead today might be unavailable or surpassed tomorrow. Licensing terms shift. Geopolitical considerations emerge. New capabilities appear from unexpected places. In this environment, locking your mission to a single model provider isn’t a strategy.&lt;/p&gt; 
&lt;p&gt;This is why &lt;a href="https://aws.amazon.com/bedrock/" target="_blank" rel="noopener"&gt;Amazon Bedrock&lt;/a&gt; provides access to multiple FMs with consistent security controls, governance guardrails, and compliance frameworks. You choose the model that fits the mission. When the landscape shifts, as it inevitably will, you switch without re-architecting your application and security posture.&lt;/p&gt; 
&lt;p&gt;Model choice is only the beginning. AWS helps customers build systems that can plan, reason, and execute multistep tasks on behalf of mission operators. &lt;a href="https://aws.amazon.com/bedrock/agentcore/" target="_blank" rel="noopener"&gt;Amazon Bedrock AgentCore&lt;/a&gt; simplifies how to build, deploy, and scale these agentic capabilities on top of an increasing choice of models. When your agent framework is model-agnostic, you can swap or tailor the underlying FMs without rebuilding the workflow, giving government teams the ability to adopt the best available model for each mission as the landscape evolves.&lt;/p&gt; 
&lt;p&gt;Your data, together with model choice, unlocks differentiation. Government organizations gain the most when they combine open-source and commercial models with domain-specific data such as geospatial intelligence, medical records, logistics patterns, and threat assessments. This requires capabilities for fine-tuning, continued pre-training, agents, knowledge bases, and guardrails.&lt;/p&gt; 
&lt;p&gt;The model landscape will shift. The only question is whether your architecture lets you shift with it.&lt;/p&gt; 
&lt;h3&gt;4. What AWS is doing about it&lt;/h3&gt; 
&lt;p&gt;Government leaders consistently ask, “What are you actually doing?”&lt;/p&gt; 
&lt;p&gt;We’re investing at scale: AWS announced an &lt;a href="https://www.aboutamazon.com/news/company-news/amazon-ai-investment-us-federal-agencies" target="_blank" rel="noopener"&gt;investment of up to $50 billion&lt;/a&gt; in AI and supercomputing infrastructure for US government agencies, adding nearly 1.3 gigawatts of capacity across &lt;a href="https://aws.amazon.com/federal/top-secret-cloud/" target="_blank" rel="noopener"&gt;Top Secret&lt;/a&gt;, &lt;a href="https://aws.amazon.com/federal/secret-cloud/" target="_blank" rel="noopener"&gt;Secret&lt;/a&gt;, and &lt;a href="https://aws.amazon.com/govcloud-us/" target="_blank" rel="noopener"&gt;AWS GovCloud (US)&lt;/a&gt; Regions.&lt;/p&gt; 
&lt;p&gt;We’re removing financial barriers with up to $100 million in federal credits: $50 million through the &lt;a href="https://aws.amazon.com/federal/government-accelerator-initiatives/" target="_blank" rel="noopener"&gt;Warfighter Capability Accelerator for DoD&lt;/a&gt; and the defense industrial base, and $50 million through the Genesis Accelerator for DOE, national labs, and research organizations. Through &lt;a href="https://www.gsa.gov/about-us/newsroom/news-releases/gsa-announces-onegov-agreement-with-aws-08072025" target="_blank" rel="noopener"&gt;OneGov&lt;/a&gt;, we’re simplifying the path for government builders to modernize to cloud services with $1B in savings to accelerate their cloud journeys.&lt;/p&gt; 
&lt;p&gt;We’re also continuing to increase the availability of new services, features, and models across our government Regions, expanding our partner network to help commercial cloud innovation reach the mission as fast as possible.&lt;/p&gt; 
&lt;p&gt;And we’re protecting the broader internet, not only our own infrastructure. In the past year, we’ve dismantled criminal botnets, disrupted nation-state cyber campaigns, and shared threat intelligence with governments and partners worldwide. We process 1 billion honeypot interactions per day and have &lt;a href="https://www.crn.com/news/security/2024/amazon-security-chief-on-stopping-2-7-trillion-ec2-attacks-28-billion-s3-storage-attempts" target="_blank" rel="noopener"&gt;prevented 2.7 trillion scanning attempts in the last twelve months.&lt;/a&gt; Security isn’t a feature we bolt on—it’s foundational to everything we build.&lt;/p&gt; 
&lt;p&gt;We’ve been doing this for more than 15 years. First to build purpose-built government infrastructure. First to achieve accreditation across all classification levels. First to bring generative AI to the most sensitive government environments. That’s not a talking point—it’s a commitment.&lt;/p&gt; 
&lt;h3&gt;What government leaders should do next&lt;/h3&gt; 
&lt;p&gt;The technology is proven and available. What’s needed now is action:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Stress-test your resilience architecture&lt;/strong&gt; – Ask your team: if your data center goes down tomorrow, what’s your recovery time? If the answer involves rebuilding across a different provider, you don’t have resilience—you have a plan to rebuild. Architect for multi-Region failover within a proven provider and exercise it. Use our &lt;a href="https://aws.amazon.com/blogs/publicsector/introducing-a-custom-mission-resilience-lens-for-the-aws-well-architected-tool/" target="_blank" rel="noopener"&gt;Mission Resilience lens&lt;/a&gt; to implement best practices.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Adopt a multi-model strategy now&lt;/strong&gt; – Don’t wait for a model to be restricted or deprecated. Stand up a multi-model environment through Amazon Bedrock today, fine-tune on your domain data, and build the muscle to switch to new models and versions as the landscape shifts.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Pick a real mission problem and see what agentic AI can do now&lt;/strong&gt; – Compress a timeline. Automate a workflow. Show your organization what’s possible when the infrastructure gets out of the way.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Engage us&lt;/strong&gt; – The credits are available. The infrastructure is built for government. Our partners are ready. Reach out to your AWS account team or visit &lt;a href="https://aws.amazon.com/federal/" target="_blank" rel="noopener"&gt;AWS Cloud Computing for Federal Government&lt;/a&gt; to connect with an expert on your mission.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The convergence of AI, cloud computing, and national security is creating an inflection point that will define the next decade of government capability. The path forward isn’t through rooms full of GPUs and fragmented architectures. It’s through decisive action on a secure, scalable, multi-model cloud—backed by a team with the deepest government cloud experience in the world.&lt;/p&gt; 
&lt;p&gt;We’re ready. Let’s build together.&lt;/p&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>A Decade of Innovation: Celebrating 10 Years of Impact at AWS Imagine for Nonprofits</title>
		<link>https://aws.amazon.com/blogs/publicsector/a-decade-of-innovation-celebrating-10-years-of-impact-at-aws-imagine-for-nonprofits/</link>
		
		<dc:creator><![CDATA[Rick Buettner]]></dc:creator>
		<pubDate>Sun, 19 Apr 2026 13:43:31 +0000</pubDate>
				<category><![CDATA[Amazon Bedrock]]></category>
		<category><![CDATA[Industries]]></category>
		<category><![CDATA[Public Sector]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">59a585f4eba3b0733404a510d61e83dec3c8a604</guid>

					<description>Learn more AWS Imagine for Nonprofits conference that recently marked a milestone: 10 years of bringing together nonprofit leaders, technologists, and mission-driven innovators to explore how technology can accelerate social and environmental impact.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30731 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/16/12608_BK-04794-scaled.jpg" alt="event photo of crowd and stage with two speakers" width="2560" height="1707"&gt;&lt;br&gt; &lt;em&gt;How the nonprofit sector is leading the way on responsible AI, data equity, and mission-driven technology — and what’s next.&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;This year’s AWS Imagine for Nonprofits conference marked a milestone: 10 years of bringing together nonprofit leaders, technologists, and mission-driven innovators to explore how technology can accelerate social and environmental impact.&lt;/p&gt; 
&lt;p&gt;Held at MGM National Harbor in Oxon Hill, Maryland, the event was equal parts anniversary celebration of all nonprofits have achieved in the last decade and forward-looking summit on the opportunity ahead.&lt;/p&gt; 
&lt;p&gt;As Rick Buettner, Managing Director of Global Nonprofits at AWS, reminded the packed room, “At Amazon, it’s always day one. What that means is that we’re just getting started.”&lt;/p&gt; 
&lt;p&gt;This year also coincides with the 20th anniversary of Amazon Web Services (AWS), adding extra weight to the reflection on how far cloud and AI technology have advanced with the sector. Over the course of the day, attendees heard from nonprofit leaders, AWS executives, and a Grammy and Oscar-winning artist and philanthropist about the power of data, responsible AI, and cross-sector collaboration. Here are the key highlights and announcements from this year’s conference.&lt;/p&gt; 
&lt;h3&gt;10 Years of nonprofit innovation&lt;/h3&gt; 
&lt;p&gt;Lauren Stovall, Global Head of Nonprofit Programs at AWS and the creator of the Imagine Nonprofit Conference, opened her keynote remarks by capturing the spirit that has defined the event since its founding: “This event has always been designed with the acknowledgement that you all are innovators — because you have to be. When society falls short, you all are the ones that provide hope. When people are in need, you’re the ones that rush in to help. And when traditional systems fail, you build new ones.”&lt;/p&gt; 
&lt;p&gt;Looking back at a decade of sustained partnership, Stovall highlighted how nonprofit technology has evolved from early cloud experiments to sophisticated, AI-powered solutions that are transforming billions of lives. “The purposeful application of technology has transformed billions of lives and created pathways to serve billions more,” she said. “I think we can all agree: time well spent.”&lt;/p&gt; 
&lt;p&gt;Three organizations exemplify what a decade of innovation looks like in practice:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://www.thorn.org/" target="_blank" rel="noopener"&gt;THORN’s&lt;/a&gt; Safer platform has helped detect more than 12 million suspected child sexual abuse material (CSAM) files and content on online platforms — an enterprise-grade tool protecting children in the digital age at scale.&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.globalcitizen.org/en/" target="_blank" rel="noopener"&gt;Global Citizen’s&lt;/a&gt; AWS-powered app has activated 43 million actions, unlocked $49 billion in funding, and positively impacted 1.3 billion people — roughly one in six people on the planet.&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://alleninstitute.org/" target="_blank" rel="noopener"&gt;The Allen Institute&lt;/a&gt; has mapped the complete adult mouse brain, simulating 10 million neurons and 26 billion synapses, paving the way for the first map of the human brain and enabling AI-powered inferences about diseases like Alzheimer’s and Parkinson’s.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“That refusal to accept the status quo, paired with innovative thinking, is what makes nonprofits so special.”&lt;/p&gt; 
 &lt;p&gt;— Lauren Stovall, Global Head of Nonprofit Programs, AWS&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;h3&gt;Amplifying voices with AI: Fair Trade USA&lt;/h3&gt; 
&lt;p&gt;Felipe Arango, CEO of Fair Trade USA, delivered one of the keynote’s most compelling addresses — a challenge to technologists and nonprofits alike to ensure that the AI benefits the people who need it most.&lt;/p&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“AI can predict what you’ll buy before you even know you want it,” Arango told the audience. “But the person that grew that product still doesn’t have access to clean water or to health and educational opportunities for their kids. Consumers don’t choose what they don’t see. And today, too many people at the beginning of our supply chains are still invisible. That’s not a technology gap. That is a design gap.”&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;p&gt;The numbers underscore the urgency: 75% of the world’s poor still live in rural areas; by 2050, half of the suitable land for growing coffee could disappear in some regions while 125 million people depend on that crop worldwide.&lt;/p&gt; 
&lt;p&gt;Over nearly three decades, &lt;a href="https://www.fairtradecertified.org/" target="_blank" rel="noopener"&gt;Fair Trade USA&lt;/a&gt; has built a model grounded in one belief: “The people closest to the problems are also the closest ones to the solution.” The results are tangible: $1.3 billion mobilized supporting over 1.6 million farmers, fishers, and workers across operations spanning 50+ countries, with more than 1,500 brands participating in the fair trade movement and 30+ years of producer community data now being unlocked with AI.&lt;/p&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“Data is becoming the new land, and power is shifting with it. Who owns it, who understands it, and who benefits from it — if producers don’t own their data, they will be ridden out of the future.”&lt;/p&gt; 
 &lt;p&gt;— Felipe Arango, CEO, Fair Trade USA&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;p&gt;To address this, Fair Trade USA is leveraging &lt;a href="https://aws.amazon.com/bedrock/?trk=7ecf60df-6136-414c-a7c3-6aa4d2d6019f&amp;amp;sc_channel=ps&amp;amp;ef_id=CjwKCAjwvqjOBhAGEiwAngeQnbbbGud8dPf8F-pSOiF2mTUczZW44puu8dmBgM-Rywiz6SsnICiGYBoCwEAQAvD_BwE:G:s&amp;amp;s_kwcid=AL!4422!3!795877020842!e!!g!!amazon%20bedrock!23532472972!194311072004&amp;amp;gad_campaignid=23532472972&amp;amp;gbraid=0AAAAADjHtp9PK9xzxJXDiWZXCSyfcRHQN&amp;amp;gclid=CjwKCAjwvqjOBhAGEiwAngeQnbbbGud8dPf8F-pSOiF2mTUczZW44puu8dmBgM-Rywiz6SsnICiGYBoCwEAQAvD_BwE" target="_blank" rel="noopener"&gt;Amazon Bedrock&lt;/a&gt; to amplify producer voices at scale. Their vision is to move “from labels to lived outcomes, from claims to evidence” — building a system where every product carries a living story owned and told by producers, visible at the moment of discovery, at the moment of purchase, and long after.&lt;/p&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“Imagine buying coffee and instantly seeing the people and the solutions that your purchase supported — not as marketing, but as truth,” Arango said. “We have the tools. We have the moment. The question is what we choose to build, and for whom.”&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;p&gt;Arango framed the AWS partnership as critical infrastructure for this vision: “You are building infrastructure that can help shape how people make informed decisions. We are building systems to ensure those decisions include everyone. Together we can make fairness the default — not a filter, not a feature, the foundation of trade.”&lt;/p&gt; 
&lt;h3&gt;Protecting the natural world: Jane Goodall Institute&lt;/h3&gt; 
&lt;p&gt;Dr. Lilian Pintea, Vice President of Conservation Science at the Jane Goodall Institute, took the audience back 25 years to a candlelit table at Jane’s house in Gombe National Park — the moment he and Dr. Goodall first reviewed satellite imagery showing all the trees of Gombe from space.&lt;/p&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“Jane looked at me and said, ‘This is magic,'” Pintea recalled. “And I felt that we were at the beginning of a special journey.”&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;p&gt;That journey has led to one of the most ambitious digital preservation efforts in science. JGI’s Gombe Stream Research Center holds the world’s longest ongoing study of chimpanzees — 66 years of continuous observation. The scale of the archive is extraordinary: 500,000+ pages of handwritten research notes in local Kiswahili and Kiga languages with unique JGI notation, decades of video and audio recordings including soundscapes from Gombe, and the only location in the world tracking five generations of chimpanzees and their individual life histories.&lt;/p&gt; 
&lt;p&gt;The challenge: digitizing even the last third of the chimpanzee archive at the current manual pace would take 13 years. &lt;a href="https://aws.amazon.com/ai/generative-ai/innovation-center/" target="_blank" rel="noopener"&gt;The AWS Generative AI Innovation Center&lt;/a&gt; visited Gombe last August to understand data workflow gaps — and the collaboration that followed has been transformative.&lt;/p&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“With AWS, we’re making sure the next generation of researchers and conservationists doesn’t just inherit that knowledge — they build on it.”&lt;/p&gt; 
 &lt;p&gt;— Dr. Lilian Pintea, VP of Conservation Science, Jane Goodall Institute&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;p&gt;In one of her last videos, Dr. Jane Goodall herself articulated the vision: “AI technologies should be considered as tools used to address the needs of local communities and support them in the stewardship of the land so that it will improve the lives of people, animals, and the environment. All of which is interconnected.”&lt;/p&gt; 
&lt;h3&gt;Responsible AI: AWS’s framework for the nonprofit sector&lt;/h3&gt; 
&lt;p&gt;A key theme throughout the day was a focus on building a strong data strategy. Without a data foundation, AI has the potential to become ineffective and inaccurate. AWS is helping nonprofits build the data foundation first, then layer responsible AI on top. The approach includes:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Automatically identifying sensitive data and securing it&lt;/li&gt; 
 &lt;li&gt;Centralizing data across siloed systems and governing it responsibly&lt;/li&gt; 
 &lt;li&gt;Automatically evaluating foundational models against organizational AI policies&lt;/li&gt; 
 &lt;li&gt;Keeping the human in the loop — “AI is serving us. We are not serving AI. We always have to remember that.”&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;a href="https://finca.org/about-finca" target="_blank" rel="noopener"&gt;FINCA International’s&lt;/a&gt; Aura platform offers a compelling proof point. Previously siloed across multiple poverty alleviation systems, FINCA centralized its data and then built Aura using Amazon Bedrock and Anthropic’s Claude. The result: researchers can now quickly identify which interventions work best for which communities, map new solutions, and give feedback to ensure the AI stays aligned with organizational goals.&lt;/p&gt; 
&lt;h3&gt;National Geographic Society and AWS&lt;/h3&gt; 
&lt;p&gt;Dave Levy, Vice President of Worldwide Public Sector at AWS, took the stage to bridge two themes that ran throughout the day: the power of legacy data and the transformative potential of AI-driven storytelling.&lt;/p&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“One of the most powerful things technology can do is help us preserve information and learn from the past while we build for the future,” Levy said.&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;p&gt;With that, he &lt;a href="https://www.prnewswire.com/news-releases/national-geographic-society-partners-with-amazon-web-services-to-bring-the-societys-historic-assets-into-the-future-302718222.html" target="_blank" rel="noopener"&gt;announced a landmark new partnership&lt;/a&gt; between the &lt;a href="https://www.nationalgeographic.org/society/" target="_blank" rel="noopener"&gt;National Geographic Society&lt;/a&gt; and AWS. The National Geographic Society has spent 138 years documenting the world — ocean floors, ancient civilizations, vanishing ecosystems — amassing billions of assets. The partnership will digitize billions of assets from the National Geographic archive, use AI to make the archive searchable and accessible in entirely new ways, and increase the speed and scale of the Society’s storytelling for researchers, educators, and explorers worldwide.&lt;/p&gt; 
&lt;p&gt;Levy also reflected on his conversation with Dr. Goodall at last year’s Imagine conference: “That conversation has stayed with me nearly every day and it will always stay with me. I share her belief that we all have the power to make a difference every single day.”&lt;/p&gt; 
&lt;h3&gt;A conversation with John Legend&lt;/h3&gt; 
&lt;p&gt;In a fireside chat, Dave Levy sat down with Grammy and Oscar-winning artist, producer, and philanthropist, John Legend for a wide-ranging conversation about technology, storytelling, and systemic social change.&lt;/p&gt; 
&lt;p&gt;Their discussion explored Legend’s work in criminal justice reform, racial equity, and education — and how sustained cross-sector partnerships and committed advocacy can drive change at the systems level. Legend shared his perspective on the unique role nonprofits and technology play in building communities where dignity, safety, and opportunity are accessible to all.&lt;/p&gt; 
&lt;h3&gt;AWS Imagine Grant: 2026–2027 cycle now open&lt;/h3&gt; 
&lt;p&gt;AWS announced that the 2026–2027 funding cycle for the AWS Imagine Grant is now open. Since the program launched in 2018, AWS has awarded more than $21 million in unrestricted grants to more than 180 nonprofit organizations worldwide. The program is operational for eligible nonprofits based in five countries across the globe – the United States, Canada, United Kingdom, Australia, and New Zealand.&lt;/p&gt; 
&lt;p&gt;Stovall emphasized that the grant is designed to do more than fund technology projects — it’s meant to spark strategic thinking: “We really truly hope that the application process itself helps codify thinking, bring together stakeholders, and really start looking at how data, advanced cloud capabilities, and AI can be brought into your organizational strategy to amplify your work while also supercharging impact reporting and storytelling.”&lt;/p&gt; 
&lt;p&gt;Organizations interested in applying are encouraged to visit the &lt;a href="https://aws.amazon.com/government-education/nonprofits/aws-imagine-grant-program/" target="_blank" rel="noopener"&gt;AWS Imagine Grant website&lt;/a&gt; to learn more about eligibility and the application process. The deadline for the 2026-2027 grant cycle is June 5, 2026.&lt;/p&gt; 
&lt;h3&gt;Building connections that drive impact&lt;/h3&gt; 
&lt;p&gt;Beyond the keynote stage, AWS Imagine for Nonprofits 2026 offered attendees immersive opportunities to explore technology solutions, connect with experts, and experience the power of AWS tools firsthand.&lt;/p&gt; 
&lt;p&gt;At the AWS Builder’s Lounge, nonprofit technologists and mission leaders could engage directly with AWS solutions through hands-on workshops and 1:1 Solutions Architect consultations. Attendees explored practical implementations of cloud infrastructure, data analytics, and AI-powered tools designed specifically for nonprofit use cases. A diverse community of AWS partners were there, offering specialized expertise in areas ranging from data migration and security to custom application development and AI implementation. And, in the Impact Lounge, attendees had the opportunity to talk with the AWS for Nonprofits team, as well as discover resources and programs to help them accomplish their goals. Here, nonprofit leaders shared their journeys – the challenges they faced, the solutions they built, and the communities they serve.&lt;/p&gt; 
&lt;h3&gt;&lt;img loading="lazy" class="alignleft size-full wp-image-30733" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/16/AP_1684.jpg" alt="photo of crowd" width="2000" height="1333"&gt;&lt;/h3&gt; 
&lt;h3&gt;Looking ahead: Day one for the next decade&lt;/h3&gt; 
&lt;p&gt;The 2026 AWS Imagine for Nonprofits conference made one thing clear: the nonprofit sector is not just adopting AI — it is helping define what responsible, mission-driven AI looks like. From amplifying the voices of farmers and workers across the global supply chain to preserving 66 years of primate research before it is lost forever, nonprofits are proving that technology is most powerful when it is in service of something larger than efficiency.&lt;/p&gt; 
&lt;p&gt;If you couldn’t attend this year’s conference or would like to revisit your favorite sessions, check out &lt;a href="https://aws.amazon.com/government-education/nonprofits/imagine-nonprofit/" target="_blank" rel="noopener"&gt;the on-demand session library&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;To learn more about how AWS supports nonprofits, visit the &lt;a href="https://aws.amazon.com/government-education/nonprofits/" target="_blank" rel="noopener"&gt;AWS for Nonprofits homepage&lt;/a&gt;. And if your organization is ready to accelerate its technology strategy, start a &lt;a href="https://aws.amazon.com/government-education/contact/?refid=7ecf60df-6136-414c-a7c3-6aa4d2d6019f" target="_blank" rel="noopener"&gt;conversation with our team today.&lt;/a&gt;&lt;/p&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>Building an AI-ready university campus with AWS</title>
		<link>https://aws.amazon.com/blogs/publicsector/building-an-ai-ready-university-campus-with-aws/</link>
		
		<dc:creator><![CDATA[Shashank Tanksali]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 14:26:29 +0000</pubDate>
				<category><![CDATA[Amazon Bedrock]]></category>
		<category><![CDATA[Amazon Machine Learning]]></category>
		<category><![CDATA[Public Sector]]></category>
		<guid isPermaLink="false">cc92465e9c9cd9d3ba777c78972df19b62109ce7</guid>

					<description>This post outlines an AI-ready framework for use by higher education institutions worldwide. The framework takes a holistic approach to integrating AI across campuses while addressing the critical challenges of data governance, security, academic integrity, workforce readiness, and equity.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30696 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/14/Building-an-AI-ready-university-campus-with-AWS.png" alt="Building an AI-ready university campus with AWS" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;AI adoption is accelerating across university campuses, but most institutions approach it through disconnected pilots and departmental silos. When universities treat AI as a collection of tools rather than an institutional capability, the result is fragmented investments, duplicated efforts, inconsistent policies, and moving too slow to address student and faculty needs, which leads to missed opportunities to transform teaching, research, and operations at scale.&lt;/p&gt; 
&lt;p&gt;Universities need to figure out how to adopt AI strategically. Based on insights from the &lt;a href="https://er.educause.edu/articles/2025/12/establishing-roi-for-evaluating-edtech-tools" target="_blank" rel="noopener"&gt;2025 EDUCAUSE&lt;/a&gt; research on AI in higher education, only 23% of universities measure AI return on investment (ROI), yet those that do scale their initiatives twice as fast. The difference lies in treating AI as an institutional capability requiring coordinated strategy, not as isolated tools or IT projects.&lt;/p&gt; 
&lt;p&gt;Institutions that build coordinated AI capabilities today will accelerate discovery, personalize learning at scale, and operate more efficiently. Those that don’t risk falling behind in serving students, advancing research, and fulfilling their public mission. AI readiness needs to focus on more than technology. To be successful progressing through the stages of AI adoption, universities need to align strategy, governance, people, and culture to transform how your institution serves its mission in the age of artificial intelligence.&lt;/p&gt; 
&lt;p&gt;AI has moved from emerging technology to foundational capability in higher education. But without coordinated strategy, universities risk creating new forms of inequality while leaving transformative potential unrealized. Students in the same lecture hall have radically different AI access. Researchers waste time navigating bureaucracy instead of advancing discovery. Administrative systems remain siloed while AI could connect them. Without a clearly defined AI adoption pathway, shadow IT use of AI is almost certain.&lt;/p&gt; 
&lt;p&gt;This post outlines an AI-ready framework for use by higher education institutions worldwide. The framework takes a holistic approach to integrating AI across campuses while addressing the critical challenges of data governance, security, academic integrity, workforce readiness, and equity.&lt;/p&gt; 
&lt;h3&gt;A framework for institutional AI readiness&lt;/h3&gt; 
&lt;p&gt;To become AI-ready, universities need to do more than deploy a single system or run isolated pilots. AI readiness requires a coordinated framework that aligns strategy, technology, governance, people, and culture with your core mission of teaching, research, and public service.&lt;/p&gt; 
&lt;p&gt;The framework consists of six interconnected pillars that transform AI from fragmented experiments into an institutional capability:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;&lt;strong&gt;Data and digital foundations –&lt;/strong&gt; Treating data as a strategic asset with scalable infrastructure&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Responsible AI governance&lt;/strong&gt; – Establishing ethical, transparent, and compliant systems with human oversight&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;People, skills, and talent enablement&lt;/strong&gt; – Empowering your entire community through education and development&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Culture and change readiness&lt;/strong&gt; – Fostering experimentation while addressing resistance&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Scalable use cases&lt;/strong&gt; – Implementing high-impact applications across teaching, research, and operations&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Measurement and adaptability&lt;/strong&gt; – Continuously measuring impact and refining strategies&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p&gt;Universities that approach AI as only another IT project will struggle. Those that treat it as institutional transformation—requiring executive leadership, cross-functional collaboration, and cultural change—will lead.&lt;/p&gt; 
&lt;p&gt;These pillars represent an interconnected system where progress in one area enables advancement in others rather than a checklist to complete sequentially. Instead of thinking of the process of becoming AI ready as linear, think of these six pillars as the foundation of institutional transformation.&lt;/p&gt; 
&lt;h3&gt;Data and digital foundations&lt;/h3&gt; 
&lt;p&gt;Start with strategy, not servers. Before investing in infrastructure, your organization needs to answer the fundamental question of how to use AI to advance your mission of teaching, research, and public service.&lt;/p&gt; 
&lt;p&gt;This clarity drives everything else. Establish an AI committee with executive sponsorship and appoint an institutional AI champion—someone who can bridge academic, administrative, and technical perspectives. Position AI as a long-term institutional capability and build the foundation AI needs to thrive. Don’t limit your efforts by making it an IT project that lives in one department.&lt;/p&gt; 
&lt;p&gt;AI depends on high-quality, accessible data. Treat your data as a strategic asset with scalable infrastructure, data quality standards for reliable model training, and sharing mechanisms while protecting privacy. Your infrastructure should grow with your ambitions. Amazon Web Services (AWS) provides the elasticity to scale from pilot projects to campus-wide deployments without massive upfront investment.&lt;/p&gt; 
&lt;h3&gt;Responsible AI governance&lt;/h3&gt; 
&lt;p&gt;Trust is your most valuable asset, so you must protect it. In higher education, trust isn’t optional. Students, faculty, parents, and the public expect you to use AI ethically, transparently, and in compliance with academic norms.&lt;/p&gt; 
&lt;p&gt;Create an AI governance body with diverse representation that includes academic affairs (provost’s office), faculty from multiple disciplines, legal and compliance, IT and security, and student representatives. This body should establish clear policies that answer:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;When is AI use appropriate and when isn’t it?&lt;/li&gt; 
 &lt;li&gt;How do we drive transparency in AI-assisted decisions?&lt;/li&gt; 
 &lt;li&gt;What human oversight is required for sensitive applications?&lt;/li&gt; 
 &lt;li&gt;How do we handle bias, errors, and appeals?&lt;/li&gt; 
 &lt;li&gt;What are our data privacy and security standards?&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Stakeholders sometimes worry that governance efforts will slow innovation. In reality, effective governance enables it by giving your community confidence to experiment within clear guardrails. By using AWS &lt;a href="https://responsible-ai.ai.demo.aws/" target="_blank" rel="noopener"&gt;responsible AI&lt;/a&gt;, you can accelerate trusted AI innovation with effective governance.&lt;/p&gt; 
&lt;h3&gt;People, skills, and talent enablement&lt;/h3&gt; 
&lt;p&gt;A $2 million AI infrastructure investment delivers zero ROI if faculty don’t know how to use it. AI readiness depends on empowering your entire community—faculty, researchers, staff, and students—to understand and use AI effectively.&lt;/p&gt; 
&lt;p&gt;For faculty and researchers:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Provide hands-on AI workshops and create communities of practice&lt;/li&gt; 
 &lt;li&gt;Offer research computing and course development support for AI integration&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;For staff:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Create pathways for staff to develop technical skills&lt;/li&gt; 
 &lt;li&gt;Develop AI literacy programs that demystify the technology&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;For students:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Provide AI tool access to support learning and research&lt;/li&gt; 
 &lt;li&gt;Teach responsible AI use and critical evaluation of AI outputs to prepare for an AI-augmented workforce&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Setting the goal to make everyone an AI expert isn’t realistic. Instead, ensure everyone can use AI appropriately in their role. The state of the art in AI is evolving rapidly and evolving your training and enablement to keep up to date with it is important.&lt;/p&gt; 
&lt;h3&gt;Culture and change readiness&lt;/h3&gt; 
&lt;p&gt;Address the human side of transformation. Technology adoption fails without cultural readiness. Faculty worry about academic integrity. Staff fear job displacement. Administrators struggle with risk management. Students navigate unclear expectations.&lt;/p&gt; 
&lt;p&gt;Build a culture that embraces AI by:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Addressing concerns directly&lt;/strong&gt; – Host open forums where community members can voice fears and ask questions. Acknowledge legitimate concerns about job impacts, bias, and academic integrity rather than dismissing them.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Fostering experimentation&lt;/strong&gt; – Adopt the Amazon “two-way door decision” framework—make reversible decisions quickly to test ideas. With modern AI tools, you can prove or disprove concepts in weeks, not years. Encourage rapid experimentation within your governance guardrails.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Celebrating innovation&lt;/strong&gt; – Recognize and reward faculty, staff, and students who pioneer responsible AI use. Share success stories across campus to build momentum.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Enabling cross-functional collaboration&lt;/strong&gt; – Break down silos between academic affairs, IT, research computing, and administration. AI initiatives succeed when diverse perspectives shape implementation.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Reinforcing academic values&lt;/strong&gt; – Frame AI as amplifying rather than replacing human judgment, creativity, and critical thinking. Position AI as a tool that frees people for higher-value work.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Cultural change takes time. Start with early adopters, demonstrate value, and let success create momentum.&lt;/p&gt; 
&lt;h3&gt;Scalable use cases across teaching, research, and operations&lt;/h3&gt; 
&lt;p&gt;Move from pilots to impact. AI readiness becomes tangible through high-impact use cases that scale beyond isolated experiments. Start with applications that solve real problems and demonstrate clear value.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/how-the-wharton-school-built-a-virtual-ta-chat-assistant-with-generative-ai-on-aws/" target="_blank" rel="noopener"&gt;Wharton Schoo&lt;/a&gt;l developed an innovative virtual teaching assistant (TA) chat assistant using &lt;a href="https://aws.amazon.com/generative-ai/" target="_blank" rel="noopener"&gt;generative AI&lt;/a&gt; on AWS, specifically using &lt;a href="https://aws.amazon.com/bedrock/" target="_blank" rel="noopener"&gt;Amazon Bedrock&lt;/a&gt; and &lt;a href="https://aws.amazon.com/bedrock/anthropic/" target="_blank" rel="noopener"&gt;Claude by Anthropic in Amazon Bedrock&lt;/a&gt;. The assistant offered:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Personalized learning support&lt;/strong&gt; – AI tutors provide around-the-clock assistance, adapting to individual student needs and learning pace.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;AI-assisted course design&lt;/strong&gt; – Faculty use AI to generate practice problems, create assessments, and develop course materials, which frees time for direct student interaction and curriculum innovation.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Virtual labs and simulations&lt;/strong&gt; – AI-powered simulations enable hands-on learning in disciplines where physical labs are expensive, dangerous, or impractical.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Examples in research:&lt;/p&gt; 
&lt;p&gt;Accelerated data analysis – Researchers use AI to process datasets that would take months manually, identifying patterns and insights that advance discovery.&lt;br&gt; Literature review and synthesis – AI tools help researchers stay current with exponentially growing academic literature, identifying relevant papers and synthesizing findings.&lt;/p&gt; 
&lt;p&gt;Examples in operations:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Student success analytics&lt;/strong&gt; – Predictive models identify students at risk of dropping out, enabling proactive intervention and support.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Enrollment and financial forecasting&lt;/strong&gt; – AI improves planning accuracy, helping institutions optimize resources and manage budgets effectively.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Administrative efficiency&lt;/strong&gt; – AI-assisted case management streamlines processes in financial aid, human resources (HR), facilities, and other administrative functions such as procurement, which reduces wait times and improves service quality. &lt;a href="https://aws.amazon.com/blogs/publicsector/cal-poly-seeks-to-transform-procurement-process-with-generative-ai-powered-scope-of-work-generation/" target="_blank" rel="noopener"&gt;California Polytechnic State University&lt;/a&gt;, with total procurement spend exceeding $190 million in 2023–2024, pioneered the use of generative AI to revolutionize its procurement process by using Amazon Bedrock and Claude AI models to generate more efficient and accurate scopes of work (SOWs).&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The key to scaling is to start with use cases that have clear success metrics, engaged stakeholders, and potential for campus-wide adoption. Learn from each implementation and apply lessons to the next.&lt;/p&gt; 
&lt;h3&gt;Measurement and adaptability&lt;/h3&gt; 
&lt;p&gt;Because AI readiness is an ongoing journey of learning and adaptation, measuring progress is essential. Without measurement, you can’t demonstrate value, justify investment, or guide future decisions.&lt;/p&gt; 
&lt;p&gt;Define success criteria tied to outcomes:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Teaching&lt;/strong&gt; – Student learning gains, engagement metrics, completion rates&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Research&lt;/strong&gt; – Time to discovery, publication output, grant success rates&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Operations&lt;/strong&gt; – Cost savings, service quality improvements, staff productivity&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Establish feedback loops:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Regularly survey faculty, staff, and students about AI tool effectiveness&lt;/li&gt; 
 &lt;li&gt;Monitor AI system performance and accuracy&lt;/li&gt; 
 &lt;li&gt;Track adoption rates and identify barriers to use&lt;/li&gt; 
 &lt;li&gt;Assess whether AI initiatives advance your strategic priorities&lt;/li&gt; 
 &lt;li&gt;Share AI successes broadly to inspire others&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Adapt as you learn:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Refine policies based on real-world experience&lt;/li&gt; 
 &lt;li&gt;Adjust investments toward highest-impact applications&lt;/li&gt; 
 &lt;li&gt;Update governance as technologies and regulations evolve&lt;/li&gt; 
 &lt;li&gt;Reassess your AI strategy annually as capabilities mature&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The universities that lead in AI won’t be those with the most advanced technology—they’ll be those that learn fastest and adapt most effectively.&lt;/p&gt; 
&lt;p&gt;The following graphic illustrates these six pillars.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/14/Figure-1-AI-readiness-framework-for-a-university.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30694 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/14/Figure-1-AI-readiness-framework-for-a-university.jpg" alt="Graphic illustrating the six-pillar framework described in the post. " width="624" height="351"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 1: AI-readiness framework for a university&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;AI-readiness maturity model&lt;/h3&gt; 
&lt;p&gt;Understanding the six pillars is one thing but knowing where your institution stands is another. The AI-readiness maturity model provides a practical framework to evaluate your current capabilities and chart your path forward.&lt;/p&gt; 
&lt;p&gt;Most universities fall into one of five maturity stages, from experimental (isolated pilots) to transformational (AI as core institutional capability). Success in AI adoption requires executive commitment, cross-functional collaboration, investment in people alongside technology, and governance that enables rather than blocks innovation.&lt;/p&gt; 
&lt;p&gt;Importantly, you might be at different levels across different pillars—advanced in research computing but early-stage in teaching applications, for example. This is normal and helps you prioritize investments strategically while enabling a shared communication model across all stakeholders on AI maturity.&lt;/p&gt; 
&lt;h3&gt;Experimental&lt;/h3&gt; 
&lt;p&gt;The experimental stage is marked by the following characteristics:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Individual faculty and researchers experiment with AI tools in isolation&lt;/li&gt; 
 &lt;li&gt;No coordinated strategy or institutional policies&lt;/li&gt; 
 &lt;li&gt;Data exists in departmental silos with no integration or governance&lt;/li&gt; 
 &lt;li&gt;Ad-hoc technology purchases without central oversight&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;What this looks like in practice:&lt;/strong&gt; A computer science professor uses a chatbot for course prep. A biology lab runs &lt;a href="https://aws.amazon.com/ai/machine-learning/" target="_blank" rel="noopener"&gt;machine learning (ML)&lt;/a&gt; models on local servers. The admissions office pilots a chatbot. None of these groups know about the others’ work, and there’s no institutional guidance on appropriate use.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Key challenge:&lt;/strong&gt; Fragmentation leads to duplicated efforts, inconsistent policies, and missed opportunities for collaboration.&lt;/p&gt; 
&lt;h3&gt;Opportunistic&lt;/h3&gt; 
&lt;p&gt;The opportunistic stage is marked by the following characteristics:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Departmental AI initiatives emerge, often grant-funded&lt;/li&gt; 
 &lt;li&gt;Basic coordination within departments but silos remain between them&lt;/li&gt; 
 &lt;li&gt;Partial data integration within specific domains&lt;/li&gt; 
 &lt;li&gt;Departmental-level governance and policies&lt;/li&gt; 
 &lt;li&gt;Growing awareness of AI potential but no campus-wide strategy&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;What this looks like in practice:&lt;/strong&gt; The college of engineering establishes an AI research center. The medical school launches a health analytics initiative. IT provides GPU resources for research. Each operates independently with its own policies and priorities.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Key challenge:&lt;/strong&gt; Departments compete for resources and duplicate investments. Inconsistent policies create confusion about acceptable AI use.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Progression pathway:&lt;/strong&gt; Establish an executive-sponsored AI committee with cross-functional representation to begin coordinating efforts.&lt;/p&gt; 
&lt;h3&gt;Coordinated&lt;/h3&gt; 
&lt;p&gt;The coordinated stage is marked by the following characteristics:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;University-wide AI strategy defined and communicated&lt;/li&gt; 
 &lt;li&gt;Formal AI governance committee with diverse representation&lt;/li&gt; 
 &lt;li&gt;Executive AI champion appointed (often at vice president or provost level)&lt;/li&gt; 
 &lt;li&gt;Institutional AI policies, governance standards, and guidelines published&lt;/li&gt; 
 &lt;li&gt;Systematic skill-building programs launched&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;What this looks like in practice:&lt;/strong&gt; The university publishes AI principles and acceptable use policies, and an AI steering committee meets monthly to coordinate initiatives across departments.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Key challenge:&lt;/strong&gt; Moving from coordination to actual integration requires sustained investment and cultural change.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Progression pathway:&lt;/strong&gt; Pilot high-impact use cases that demonstrate value across teaching, research, and operations. Use success stories to build momentum and justify expanded investment.&lt;/p&gt; 
&lt;h3&gt;Integrated&lt;/h3&gt; 
&lt;p&gt;The integrated stage is marked by the following characteristics:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;AI embedded across teaching, research, and operations&lt;/li&gt; 
 &lt;li&gt;Mature governance processes with clear escalation paths&lt;/li&gt; 
 &lt;li&gt;Centralized AI tools, shared data repositories, and continuous improvement processes&lt;/li&gt; 
 &lt;li&gt;AI literacy among faculty, staff, and students&lt;/li&gt; 
 &lt;li&gt;Cross-functional teams routinely collaborate on AI initiatives&lt;/li&gt; 
 &lt;li&gt;Measurement systems track impact and ROI&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;What this looks like in practice:&lt;/strong&gt; Personalized learning platforms serve thousands of students. Research teams routinely use AI for data analysis and discovery. Administrative systems use AI for forecasting and decision support. The institution measures AI impact on learning outcomes, research productivity, and operational efficiency. New faculty receive AI training during onboarding.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Key challenge:&lt;/strong&gt; Maintaining momentum and avoiding complacency. Ensuring equity of access across all student populations.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Progression pathway:&lt;/strong&gt; Expand successful use cases. Invest in advanced capabilities like custom model development. Share learnings externally to establish thought leadership.&lt;/p&gt; 
&lt;h3&gt;Transformational&lt;/h3&gt; 
&lt;p&gt;The transformational stage is marked by the following characteristics:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;AI as core institutional capability, not merely a tool&lt;/li&gt; 
 &lt;li&gt;AI informs strategic decision-making and institutional governance&lt;/li&gt; 
 &lt;li&gt;Continuous innovation cycles with rapid experimentation&lt;/li&gt; 
 &lt;li&gt;Global leadership in AI-enabled teaching, research, or operations&lt;/li&gt; 
 &lt;li&gt;AI capabilities attract top faculty, researchers, and students&lt;/li&gt; 
 &lt;li&gt;Institution shapes broader higher education AI practices&lt;/li&gt; 
 &lt;li&gt;Sophisticated measurement of AI’s mission impact&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;What this looks like in practice:&lt;/strong&gt; The university is recognized nationally for AI innovation. Research breakthroughs are accelerated by AI capabilities. Graduates are sought after for their AI literacy. The institution contributes to AI policy discussions and shares frameworks with peers. AI enables new models of education and discovery that weren’t previously possible.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Key challenge:&lt;/strong&gt; Staying ahead while technology evolves rapidly. Balancing innovation with responsible governance.&lt;/p&gt; 
&lt;p&gt;The following graphic illustrates the maturity model.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/14/Figure-2-AI-readiness-maturity-model-for-a-university.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30693 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/14/Figure-2-AI-readiness-maturity-model-for-a-university.jpg" alt="Graphic illustrating the five stages of the AI-readiness maturity model, which is described in the text." width="624" height="351"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 2: AI-readiness maturity model for a university&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Key insights from the maturity model&lt;/h3&gt; 
&lt;p&gt;You don’t need to be at stage 5 to create value. Even at stages 2 and 3, institutions can achieve significant impact through coordinated efforts.&lt;/p&gt; 
&lt;p&gt;Progress isn’t linear. You might advance quickly in some pillars while others lag. This is normal—use it to inform investment priorities.&lt;/p&gt; 
&lt;p&gt;Culture matters as much as technology. Institutions that invest only in infrastructure without addressing governance, skills, and culture struggle to advance beyond stage 2.&lt;/p&gt; 
&lt;p&gt;Leadership commitment is essential. Universities that progress to stage 4 and beyond have sustained executive sponsorship and dedicated resources.&lt;/p&gt; 
&lt;p&gt;Learn from others. Connect with peer institutions at similar maturity levels to share lessons learned and avoid common pitfalls.&lt;/p&gt; 
&lt;p&gt;The maturity model is a guide to intentional progress aligned with your mission and resources. Start where you are, be honest about gaps, and advance systematically.&lt;/p&gt; 
&lt;h3&gt;Take your next step&lt;/h3&gt; 
&lt;p&gt;Begin by assessing your readiness. Use the maturity model to evaluate your institution. EDUCAUSE offers a complimentary &lt;a href="https://library.educause.edu/resources/2024/4/higher-education-generative-ai-readiness-assessment" target="_blank" rel="noopener"&gt;Higher Education AI Readiness Assessment&lt;/a&gt;, created with AWS, that is designed specifically for higher education institutions to benchmark capabilities and identify priority areas for investment.&lt;/p&gt; 
&lt;p&gt;You also need to learn from peers. Explore how universities worldwide are building AI capabilities through &lt;a href="https://aws.amazon.com/solutions/case-studies/" target="_blank" rel="noopener"&gt;AWS customer stories&lt;/a&gt; and see real-world implementations across teaching, research, and operations.&lt;/p&gt; 
&lt;p&gt;Finally, build capabilities. AWS education programs provide resources for every stage of your AI readiness journey:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/training/awsacademy/" target="_blank" rel="noopener"&gt;AWS Academy&lt;/a&gt; – Ready-to-teach cloud computing and AI/ML curriculum for faculty&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/education/awseducate/" target="_blank" rel="noopener"&gt;AWS Educate&lt;/a&gt; – No-cost cloud learning resources for students and educators&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/government-education/research-and-technical-computing/research-cloud-program/" target="_blank" rel="noopener"&gt;AWS research credits&lt;/a&gt; – Support for AI-intensive research projects and computational workloads&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/training/" target="_blank" rel="noopener"&gt;AWS Training and Certification&lt;/a&gt; – Professional development pathways for IT staff and administrators&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Connect with the &lt;a href="https://aws.amazon.com/education/" target="_blank" rel="noopener"&gt;AWS Education team&lt;/a&gt; to discuss your specific challenges and explore how we can support your AI readiness journey. Our higher education specialists work with institutions at every maturity level—from establishing initial strategy to scaling campus-wide implementations.&lt;/p&gt; 
&lt;p&gt;Join the community by attending &lt;a href="https://reinvent.awsevents.com/" target="_blank" rel="noopener"&gt;AWS re:Invent&lt;/a&gt; and &lt;a href="https://aws.amazon.com/government-education/events/" target="_blank" rel="noopener"&gt;AWS Public Sector Summit&lt;/a&gt; events to connect with peers, learn from customer presentations, and discover the latest AI innovations for higher education.&lt;/p&gt; 
&lt;p&gt;The institutions that invest in AI readiness today—building foundations, empowering their people, and learning as they scale—will define the future of higher education. Your students, faculty, and researchers are counting on you to lead.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Ready to begin?&lt;/strong&gt; Start with an honest assessment, identify your highest-impact opportunities, and take the first step toward transforming your campus for the AI era.&lt;/p&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>Why graduates aren’t AI-ready: Six frictions revealed in new AWS-Pearson study on education to workforce gaps</title>
		<link>https://aws.amazon.com/blogs/publicsector/why-graduates-arent-ai-ready-six-frictions-revealed-in-new-aws-pearson-study-on-education-to-workforce-gaps/</link>
		
		<dc:creator><![CDATA[Maryclaire Abowd]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 16:08:33 +0000</pubDate>
				<category><![CDATA[Partner solutions]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[announcement]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[aws for education]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[higher education]]></category>
		<category><![CDATA[Pearson]]></category>
		<guid isPermaLink="false">734c0bbe319b41e374cd9943eaa0e68281b4bfe1</guid>

					<description>A joint research report from Pearson and Amazon Web Services (AWS) finds that AI readiness is not a single skills gap waiting to be filled. It is a systemic breakdown in the transition from learning to work, driven by six frictions that compound on one another.</description>
										<content:encoded>&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/08/pearson-blog-040826.png"&gt;&lt;img loading="lazy" class="aligncenter size-full wp-image-30608" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/08/pearson-blog-040826.png" alt="" width="2048" height="1024"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;The workplace is changing faster than higher education can keep up, putting student success at risk. As artificial intelligence (AI) redefines what employers expect from new hires, graduates are entering the workforce with a widening gap between what they learned within their higher education curriculum and what their new jobs require.&lt;/p&gt; 
&lt;p&gt;A new joint research report from&lt;a href="https://www.pearson.com/en-us.html"&gt; Pearson&lt;/a&gt; and &lt;a href="https://aws.amazon.com/education/"&gt;Amazon Web Services (AWS)&lt;/a&gt; examines this challenge. As a lifelong learning company, Pearson brings expertise in learning science and curriculum design. AWS brings insight into how AI is deployed across industries and institutions. Together, the two organizations developed the &lt;em&gt;AI Readiness: Building the Bridge from Higher Education to Work&lt;/em&gt; report to understand where the transition from higher education to work breaks down and what institutions and both public- and private-sector employers can do about it.&lt;/p&gt; 
&lt;p&gt;Conducted in collaboration with independent research firm &lt;a href="https://www.psbinsights.com/"&gt;PSB Insights&lt;/a&gt;, the study draws on survey data from over 2,700 learners, higher education leaders, and employers, and qualitative interviews with higher education leaders across six countries: the United States, the United Kingdom, the Kingdom of Saudi Arabia, Brazil, Malaysia, and Vietnam.&lt;/p&gt; 
&lt;p&gt;The findings reveal that AI readiness is not a single skills gap waiting to be filled. It is a systemic breakdown in the transition from learning to work, driven by six frictions that compound on one another.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;Six frictions stalling the learning-to-work transition&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Dr. Vincent Liardi, global marketing lead for thought leadership in higher education at Pearson, noted that the six frictions were not assumed at the outset. They surfaced from the data itself.&lt;/p&gt; 
&lt;p&gt;“We really let the data lead us to where the friction points were,” said Liardi. “We truly have an evidence-based friction framework.”&lt;/p&gt; 
&lt;p&gt;The research identifies six structural barriers that reinforce each other across the education-to-workforce pipeline: &lt;strong&gt;pace&lt;/strong&gt;, &lt;strong&gt;connection&lt;/strong&gt;, &lt;strong&gt;capability&lt;/strong&gt;, &lt;strong&gt;governance&lt;/strong&gt;, &lt;strong&gt;experience&lt;/strong&gt;, and &lt;strong&gt;skills&lt;/strong&gt;. Institutions have made real progress in giving students access to AI tools, but the study found that access alone does not close the gap. The depth of AI learning has not kept pace with the breadth of tools available, and faculty readiness remains one of the most significant barriers to student preparedness. Higher education leaders and students also view AI readiness differently; a perception gap explored further in the full findings.&lt;/p&gt; 
&lt;p&gt;Additionally, more than half of employers surveyed said they cannot find graduates with the right AI skills. The full study explores how each friction contributes to this gap and what it takes to close it, including a portrait of the research’s “&lt;strong&gt;Optimal AI-Ready Graduate&lt;/strong&gt;,” defined not by tool proficiency alone but by an integrated set of capabilities spanning applied judgment, ethical reasoning, and collaboration.&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;A diagnostic framework to help leaders act&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Liardi described one of the key messages of the research this way: “AI-ready graduates don’t emerge by chance,” he said. “Readiness is built where learning and work connect.”&lt;/p&gt; 
&lt;p&gt;To help institutions strengthen that connection, the study provides a friction framework designed as a practical tool for leaders to identify which of the six frictions are most acute in their own context and then prioritize interventions. That framework inverts each friction into a desired outcome.&lt;/p&gt; 
&lt;p&gt;A well-positioned institution, according to the research, is agile in its curriculum, connected to industry, equipped with AI-capable faculty, governed by clear and enabling policy, structured to deliver applied experience, and producing graduates with the compound skills employers require.&lt;/p&gt; 
&lt;p&gt;Employers have a role to play in reaching that outcome, too. The report encourages organizations to move beyond thinking of themselves as passive consumers of talent and instead co-produce AI-ready graduates through shared governance, co-designed curricula, structured feedback loops, and clearer job posting language about AI-readiness expectations.&lt;/p&gt; 
&lt;p&gt;Students can also take ownership of their readiness. The report recommends building a digital portfolio of AI-integrated projects rather than relying solely on a resume, cover letter, or degree to demonstrate competency. One finding from the study underscores why that matters. When employers were given a forced choice between two hypothetical candidates—one with strong AI skills but no degree and one with a degree but limited AI experience—the degree’s advantage was just four percentage points.&lt;/p&gt; 
&lt;p&gt;The report closes with the &lt;strong&gt;Friction Framework Self-Assessment&lt;/strong&gt;, which provides higher education leaders a set of questions as a starting point for evaluating where their institution stands today.&lt;/p&gt; 
&lt;p&gt;Maryclaire Abowd, senior business development manager for education and research at AWS, said higher education leaders have been looking for exactly this kind of evidence-based support. “Leaders have been asking for guidance on how to actually move forward,” said Abowd. “This research is designed to give them that.”&lt;/p&gt; 
&lt;h2&gt;&lt;strong&gt;From global findings to localized action plans&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;This global report is the first phase of a broader research initiative. Pearson and AWS will release six country-specific reports in the coming months, offering localized findings and recommendations tailored to each market examined. These reports will give institutional leaders a more granular view of the frictions shaping AI readiness in their own region.&lt;/p&gt; 
&lt;p&gt;The data, the diagnostic framework, and the full set of recommendations are available now. Read the complete &lt;a href="https://www.pearson.com/power-of-learning/ai-readiness.html?utm_source=blog&amp;amp;utm_medium=aws&amp;amp;utm_campaign=ai-readiness"&gt;&lt;em&gt;AI Readiness: Building the Bridge from Higher Education to Work&lt;/em&gt;&lt;/a&gt; report to assess where your institution or organization stands and identify where to act first.&lt;/p&gt; 
&lt;p&gt;Learn more about Amazon’s &lt;a href="https://www.aboutamazon.com/impact/amazon-future-ready"&gt;Future Ready 2030 initiative&lt;/a&gt; and how AWS Training and Certification are &lt;a href="https://aws.amazon.com/blogs/training-and-certification/reimagining-entry-level-tech-careers-in-the-ai-era/"&gt;equipping early-career professionals with essential skills&lt;/a&gt; in the AI era. To learn how AWS supports researchers and educators, &lt;a href="https://aws.amazon.com/education/"&gt;connect with an AWS for Education expert.&lt;/a&gt;&lt;/p&gt; 
&lt;h2&gt;Read more on the AWS Public Sector Blog&lt;/h2&gt; 
&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;a href="https://aws.amazon.com/blogs/publicsector/how-pearson-clinical-assessments-transform-school-mental-health-services-with-aws/"&gt;How Pearson Clinical Assessments transform school mental health services with AWS&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;a href="https://aws.amazon.com/blogs/publicsector/pearson-at-aws-dc-summit-2025-transforming-education-through-ai-powered-learning-solutions/"&gt;Pearson at AWS DC Summit 2025: Transforming education through AI-powered learning solutions&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;a href="https://aws.amazon.com/blogs/publicsector/pearson-delivers-anywhere-anytime-learning-opportunities-for-students-around-the-world-with-the-cloud/"&gt;Pearson delivers “anywhere, anytime” learning opportunities around the world with the cloud&lt;/a&gt;&lt;/p&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>How universities can collaborate with AWS to design technology experiences that deliver student success</title>
		<link>https://aws.amazon.com/blogs/publicsector/how-universities-can-collaborate-with-aws-to-design-technology-experiences-that-deliver-student-success/</link>
		
		<dc:creator><![CDATA[Brigette Bucke]]></dc:creator>
		<pubDate>Sun, 12 Apr 2026 17:53:42 +0000</pubDate>
				<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[Public Sector]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">afd0ce6b054dd01906d1c73fe7331ba55db70bea</guid>

					<description>In this post, we present a framework for universities to maximize educational outcomes from industry engagements.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30599 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/05/How-universities-can-collaborate-with-AWS-to-design-technology-experiences-that-deliver-student-success.png" alt="How universities can collaborate with AWS to design technology experiences that deliver student success" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;Last year, 75 students at a science, technology, engineering, and mathematics (STEM) mentorship organization serving first-generation and low-income college students spent 4 hours building &lt;a href="https://aws.amazon.com/generative-ai/" target="_blank" rel="noopener"&gt;generative AI&lt;/a&gt; applications from scratch. They didn’t merely learn AI fundamentals, they developed business cases, presented functional prototypes, and left with portfolio projects ready for job interviews. That outcome didn’t happen by accident. It happened because we asked one question before designing a single slide: What do these students actually need?&lt;/p&gt; 
&lt;p&gt;That question is the foundation of how &lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt; approaches university collaborations. Technology companies visit campuses every week with standard presentations and product demos. Students sit through information sessions that don’t connect to their coursework, career goals, or lived experiences. Faculty miss opportunities to blend current industry practices with academic exploration. Universities miss the chance to direct student creativity toward real-world challenges where there are no predetermined answers.&lt;/p&gt; 
&lt;p&gt;AWS takes a different approach. Instead of presenting what we want to show, we start by understanding what your students need to succeed—and then we build the experience around that. In this post, we present a framework for universities to maximize educational outcomes from industry engagements.&lt;/p&gt; 
&lt;h3&gt;Working backwards from student needs&lt;/h3&gt; 
&lt;p&gt;The AWS Working Backwards methodology starts with the customer. In a university context, the customer is the student. When you tell us what your students need, we design the experience to deliver it:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;When computer science students need portfolio projects for job interviews, we design hands-on workshops where they build real applications.&lt;/li&gt; 
 &lt;li&gt;When business students are studying digital transformation, we bring customer case studies and strategic frameworks they can analyze.&lt;/li&gt; 
 &lt;li&gt;When engineering students need capstone project ideas, we provide real-world technical challenges they can solve.&lt;/li&gt; 
 &lt;li&gt;When graduate business students are learning strategic planning, we share our Working Backwards methodology they can apply to their own ventures.&lt;/li&gt; 
 &lt;li&gt;When community college students need industry certifications for immediate employment, we create certification preparation workshops.&lt;/li&gt; 
 &lt;li&gt;When graduate students are conducting research, we connect them with our technical teams for collaboration opportunities.&lt;/li&gt; 
 &lt;li&gt;When liberal arts students want to understand technology’s business impact, we design case studies that blend humanities perspectives with technical innovation.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The key principle is that students leave with something tangible, such as a working application, a certification, a portfolio project, or a strategic framework they can apply immediately. We can host these experiences at AWS offices for industry exposure or on your campus as faculty-sponsored learning events that align with your university’s mission and academic culture.&lt;/p&gt; 
&lt;h3&gt;What we need from you&lt;/h3&gt; 
&lt;p&gt;To design the most valuable experience for your students, we need to understand your specific context. The more you can share with us up front, the better we can tailor the content, format, and delivery.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Student demographics and academic focus:&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Are we working with first-year students who need foundational concepts or advanced students ready for complex technical challenges?&lt;/li&gt; 
 &lt;li&gt;Which departments and majors would benefit most, and what is their technical background?&lt;/li&gt; 
 &lt;li&gt;Are students primarily focused on technical careers, business roles, or interdisciplinary opportunities?&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;Curriculum integration:&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Can our event align with existing coursework requirements, giving students practical application opportunities for concepts they are learning in class?&lt;/li&gt; 
 &lt;li&gt;Are there specific skills gaps or learning objectives we can address that would strengthen your program outcomes?&lt;/li&gt; 
 &lt;li&gt;Can students earn academic credit or create portfolio pieces from their participation?&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;Institutional culture and values:&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;What matters most to your university community, and how can we align our presentation style, examples, and interaction with your educational philosophy?&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;If serving underrepresented students is a priority, we want our content and speakers to reflect those values and create meaningful opportunities for all students&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Your definition of success:&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;What outcomes would make this collaboration valuable for your students, faculty, and institution?&lt;/li&gt; 
 &lt;li&gt;How can we measure and demonstrate the educational impact of our work together?&lt;/li&gt; 
 &lt;li&gt;What would make you want to engage with us again?&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;Equity and accessibility&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;Designing for student success means designing for all students. When we plan together, we address equity and accessibility from the start:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;How do we create experiences that all students can participate in, regardless of technical background, financial resources, or prior experience?&lt;/li&gt; 
 &lt;li&gt;What accommodations might be needed for students with disabilities?&lt;/li&gt; 
 &lt;li&gt;What technology access do students have, and do we need to provide equipment or accounts?&lt;/li&gt; 
 &lt;li&gt;How do we create examples and speakers that reflect the diversity of your student population?&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;These aren’t afterthoughts—they’re design requirements. AWS is committed to creating experiences that serve every student in the room.&lt;/p&gt; 
&lt;h3&gt;Sustaining value beyond the event&lt;/h3&gt; 
&lt;p&gt;A single workshop is a starting point, not an endpoint. When we plan together, we think through what comes next:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Will students retain access to the tools, platforms, or resources we introduce?&lt;/li&gt; 
 &lt;li&gt;What continued access do they need to learning materials, documentation, or mentorship opportunities?&lt;/li&gt; 
 &lt;li&gt;Are there any costs to students for certifications, accounts, or materials that we should plan for?&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;AWS offers a range of resources that can extend the value of our collaboration, including &lt;a href="https://aws.amazon.com/education/awseducate/" target="_blank" rel="noopener"&gt;AWS Educate&lt;/a&gt; for foundational cloud learning, &lt;a href="https://aws.amazon.com/training/awsacademy/" target="_blank" rel="noopener"&gt;AWS Academy&lt;/a&gt; for curriculum-integrated cloud education, and &lt;a href="https://aws.amazon.com/training/restart/" target="_blank" rel="noopener"&gt;AWS re/Start&lt;/a&gt; for workforce development. Understanding your students’ ongoing needs helps us connect them to the right resources after our event ends.&lt;/p&gt; 
&lt;h3&gt;Implementation keys&lt;/h3&gt; 
&lt;p&gt;Several aspects of your implementation will help determine how successful it is. For the best chance of success, elements such as preparation, faculty involvement, follow-up activities, and assessment and feedback need to be fleshed out in detail prior to the start of the program.&lt;/p&gt; 
&lt;p&gt;Preparation makes all the difference in the success of your student experience. When you brief us on your student context and learning objectives, we customize our content and examples for maximum relevance. The more you can tell us about your students’ backgrounds, current coursework, and career aspirations, the better we can tailor the experience to meet their specific needs.&lt;/p&gt; 
&lt;p&gt;When faculty participate in our events and connect our content to ongoing coursework, students see clearer relationships between industry practices and academic learning. Faculty feedback also helps us improve our educational contributions over time, creating a continuous improvement cycle that benefits future collaborations.&lt;/p&gt; 
&lt;p&gt;The real value often comes after the event. When universities create follow-up opportunities for students to apply what they have learned, pursue additional certifications, or connect with our team for ongoing mentorship, the impact grows significantly. We’re always ready to support these extended learning opportunities when you help us understand how to contribute most effectively.&lt;/p&gt; 
&lt;p&gt;Assessment and feedback drive improvement. When you share student feedback, learning outcome data, and suggestions for improvement, we refine our approaches and create more valuable experiences for future collaborations. This cycle of feedback and iteration is how we move from good events to great ones.&lt;/p&gt; 
&lt;p&gt;These collaborations create meaningful value for everyone involved. Students gain practical skills, industry exposure, portfolio projects, and professional networks that strengthen their career readiness. Faculty benefit from current industry insights they can integrate into their teaching, curriculum development opportunities, and professional connections that keep them engaged with evolving industry practices. Universities strengthen industry relationships, enhance program offerings, and improve student outcomes that demonstrate their commitment to practical, career-focused education. AWS gains the opportunity to contribute meaningfully to the educational institutions that shape the next generation of builders while building relationships with emerging talent and gaining insights that inform our product development and educational resource creation.&lt;/p&gt; 
&lt;p&gt;This value is reciprocal, flowing continuously between students and the university, the university and AWS, and back. The following graphic illustrates the flow of value between the university, students, and AWS.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/05/University-value-partnership-flow.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30593 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/05/University-value-partnership-flow.jpg" alt="Graphic illustrating the flow of value back and forth among AWS, the university, and students. This flow is detailed in the text." width="1288" height="834"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;h3&gt;Getting started&lt;/h3&gt; 
&lt;p&gt;The conversation starts with your students. Tell us about their backgrounds, their goals, and what success looks like for your institution. From there, we work together to design an experience that serves your educational mission and delivers genuine value—not another generic industry presentation. To begin a conversation about your specific student needs and collaboration opportunities, reach out to your AWS account team or the &lt;a href="https://aws.amazon.com/government-education/contact/" target="_blank" rel="noopener"&gt;AWS Public Sector team&lt;/a&gt;. Visit &lt;a href="https://aws.amazon.com/education/awseducate" target="_blank" rel="noopener"&gt;AWS Educate&lt;/a&gt; to explore AWS education programs and resources.&lt;/p&gt; 
&lt;p&gt;We’re committed to creating experiences that serve all students and support lasting educational impact. Together, we can build something worth coming back for.&lt;/p&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>Accelerate your organization’s compliance journey with a Secure Research Environment on AWS</title>
		<link>https://aws.amazon.com/blogs/publicsector/accelerate-your-organizations-compliance-journey-with-a-secure-research-environment-on-aws/</link>
		
		<dc:creator><![CDATA[John Paul Laverde]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 12:42:29 +0000</pubDate>
				<category><![CDATA[AWS Partner Network]]></category>
		<category><![CDATA[AWS Professional Services]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Higher education]]></category>
		<category><![CDATA[Public Sector]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[AWS GovCloud (US)]]></category>
		<category><![CDATA[AWS Shared Responsibility Model]]></category>
		<guid isPermaLink="false">4446644d27aba4058358a63317aa90fb0fcb2f22</guid>

					<description>Learn how Amazon Web Services (AWS) developed the Secure Research Environment (SRE) to help institutions remain agile and competitive while supporting alignment with evolving security and compliance standards.</description>
										<content:encoded>&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30618 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/09/Accelerate-your-organizations-compliance-journey-with-a-Secure-Research-Environment-on-AWS.jpg" alt="Accelerate your organization's compliance journey with a Secure Research Environment on AWS" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;Please note that the following post is intended for informational purposes only. The approach detailed below may not be suitable for all organizations and/or compliance programs. It is important to evaluate this potential solution against the compliance needs of your organization and any applicable regulatory obligations you may have.&lt;/em&gt;&lt;/p&gt; 
&lt;hr&gt; 
&lt;p&gt;What if your institution could accelerate research compliance in weeks instead of 12–14 months? Traditional on-premises approaches take so long that by the time you meet requirements, regulators might have already updated the criteria and your researchers might have missed critical funding deadlines. Meanwhile, the grants went to institutions that got compliant faster.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt; developed the Secure Research Environment (SRE) to help institutions remain agile and competitive while supporting alignment with evolving security and compliance standards. This preconfigured cloud infrastructure provides a strong security foundation and standardized architectural patterns that can accelerate an organization’s compliance journey as requirements evolve. In constrained funding environments, the SRE helps organizations establish compliance-aligned capabilities early, enabling researchers to focus on discovery and innovation while institutions remain well positioned to compete for grants.&lt;/p&gt; 
&lt;p&gt;Drawing on extensive experience in cloud security, compliance auditing, and executive risk advisory, this post explores how Secure Research Environments (SREs) leverage security controls and architectural patterns to support alignment with multiple compliance frameworks. It highlights how automation and standardized design can streamline access to regulated research environments, while emphasizing that final compliance outcomes depend on organizational implementation, configuration, and formal assessment.&lt;/p&gt; 
&lt;h3&gt;When compliance becomes a barrier to discovery&lt;/h3&gt; 
&lt;p&gt;Right now, your researchers face a perfect storm. Compliance standards are changing rapidly while grant funding is becoming increasingly scarce.&lt;/p&gt; 
&lt;p&gt;The &lt;a href="https://www.nih.gov/" target="_blank" rel="noopener"&gt;National Institutes of Health (NIH)&lt;/a&gt; issued a mandate requiring &lt;a href="https://grants.nih.gov/grants/guide/notice-files/NOT-OD-24-157.html" target="_blank" rel="noopener"&gt;NIST SP 800-171&lt;/a&gt; for all controlled-access biomedical data repositories. Organizations that handle &lt;a href="https://www.archives.gov/cui" target="_blank" rel="noopener"&gt;Controlled Unclassified Information (CUI)&lt;/a&gt; now require Cybersecurity Maturity Model Certification (CMMC) 2.0. Without it, your institution can’t apply for federal-based research grants, limiting your access to federal funding opportunities. Additional US agencies are following suit. Internationally, your organization must demonstrate compliance with the &lt;a href="https://gdpr-info.eu/" target="_blank" rel="noopener"&gt;General Data Protection Regulation (GDPR)&lt;/a&gt; and &lt;a href="https://www.iso.org/standard/27001" target="_blank" rel="noopener"&gt;ISO 27001&lt;/a&gt; when handling sensitive information. Canada and the United Kingdom enforce their own data privacy regulations.&lt;/p&gt; 
&lt;p&gt;As compliance requirements expand, so do the costs of meeting them. And these challenges can have downstream effects across your institution. If your institution can’t secure funding from limited resources, you can’t expand your research footprint. For universities, this could affect R1 status or growth trajectory. For national labs, research hospitals, and defense contractors, it means losing competitive positioning for critical grants and the ability to attract top talent.&lt;/p&gt; 
&lt;p&gt;Beyond competitive standing, noncompliance carries regulatory and financial risks. False claims violations can result in &lt;a href="https://www.justice.gov/archives/opa/pr/pennsylvania-state-university-agrees-pay-125m-resolve-false-claims-act-allegations-relating" target="_blank" rel="noopener"&gt;significant fines&lt;/a&gt;, and data spillage involving CUI might carry additional penalties.&lt;/p&gt; 
&lt;h3&gt;Address multiple compliance frameworks with one preconfigured solution&lt;/h3&gt; 
&lt;p&gt;The SRE on AWS helps you address these challenges by providing your institution with a robust, more secure foundation for processing sensitive, protected, and sovereign workloads. In the US, this includes &lt;a href="https://aws.amazon.com/compliance/programs/" target="_blank" rel="noopener"&gt;NIST SP 800-172&lt;/a&gt;, &lt;a href="https://aws.amazon.com/compliance/cmmc/" target="_blank" rel="noopener"&gt;CMMC&lt;/a&gt;, the &lt;a href="https://aws.amazon.com/compliance/hipaa-compliance/" target="_blank" rel="noopener"&gt;Health Insurance Portability and Accountability Act of 1996 (HIPAA)&lt;/a&gt;, the &lt;a href="https://aws.amazon.com/compliance/fisma/" target="_blank" rel="noopener"&gt;Federal Information Security Management Act (FISMA)&lt;/a&gt;, and many more. Internationally, the SRE supports &lt;a href="https://aws.amazon.com/compliance/gdpr-center/" target="_blank" rel="noopener"&gt;GDPR&lt;/a&gt;, the &lt;a href="https://aws.amazon.com/compliance/canada-data-privacy/" target="_blank" rel="noopener"&gt;Personal Information Protection and Electronic Documents Act (PIPEDA)&lt;/a&gt;, &lt;a href="https://aws.amazon.com/compliance/iso-27001-faqs/" target="_blank" rel="noopener"&gt;ISO 27001,&lt;/a&gt; and other frameworks.&lt;/p&gt; 
&lt;p&gt;The SRE establishes a centralized environment, meaning your research, IT, and organizational support teams can provide thorough support to your researchers across disciplines while maintaining compliance with funding agencies’ requirements and regulations. AWS delivers this through a preconfigured multi-account architecture that meets essential compliance requirements.&lt;/p&gt; 
&lt;p&gt;Your research organization can deploy the solution in under 3 months (sometimes as little as 1 week for single frameworks) at a fraction of the cost of traditional on-premises approaches, which require significant capital investment and often leave researchers waiting or resorting to workaround solutions that might not meet compliance requirements.&lt;/p&gt; 
&lt;p&gt;Under the AWS &lt;a href="https://aws.amazon.com/compliance/shared-responsibility-model/" target="_blank" rel="noopener"&gt;shared responsibility model&lt;/a&gt;, AWS maintains the technical foundation, infrastructure security, automated security controls, and preventive guardrails. Your institution manages its data, policies, and documentation requirements, with support from step-by-step guides and training materials provided by AWS. For your IT teams, this centralized approach alleviates the burden of managing multiple one-off compliance environments and responding to those last-minute requests from researchers.&lt;/p&gt; 
&lt;h3&gt;How the SRE architecture automates compliance&lt;/h3&gt; 
&lt;p&gt;The SRE is built using the &lt;a href="https://aws.amazon.com/solutions/implementations/landing-zone-accelerator-on-aws/" target="_blank" rel="noopener"&gt;Landing Zone Accelerator on AWS (LZA)&lt;/a&gt;, which automates the deployment of a more secure, resilient, scalable cloud foundation. Depending on your institution’s requirements, the SRE can be deployed on &lt;a href="https://aws.amazon.com/govcloud-us/" target="_blank" rel="noopener"&gt;AWS GovCloud (US)&lt;/a&gt;, commercially, or both.&lt;/p&gt; 
&lt;p&gt;Figure 1 illustrates the architecture, including &lt;a href="https://aws.amazon.com/organizations/" target="_blank" rel="noopener"&gt;AWS Organizations&lt;/a&gt; with a multi-account structure, centralized identity and access management (IAM), centralized logging and monitoring, a segmented network with traffic inspection, and centralized DNS management. Within this foundation, the SRE creates separate compliance buckets called organizational units for different regulatory requirements. When your researcher wins a grant, they work with your IT department to identify which compliance standards apply. IT places the researcher into the appropriate bucket: HIPAA for health research, CMMC for defense projects, FISMA for federal work, and so on. Researchers working on multiple grants with different compliance requirements can access multiple buckets simultaneously, with each project automatically inheriting the correct controls.&lt;/p&gt; 
&lt;p&gt;When your researchers spin up services inside their bucket, they naturally inherit the appropriate security and compliance controls, which means they can meet required standards and conduct their research more securely without additional configuration.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/02/16/AWS-SRE-final1.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-29939 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/02/16/AWS-SRE-final1.jpg" alt="Technical architecture diagram showing SRE compliance buckets and researcher connectivity." width="2215" height="1490"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 1: Overview of the SRE Landing Zone architecture on AWS illustrating organizational units for different compliance frameworks&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Scale and adapt as your compliance needs evolve&lt;/h3&gt; 
&lt;p&gt;As your institutional needs evolve, your IT team can quickly add new compliance buckets or expand existing ones without rebuilding infrastructure from scratch. When compliance requirements change, you can update your SRE configurations rather than starting over, protecting your investment and maintaining continuous grant eligibility. This helps your SRE scale in line with your research ambitions.&lt;/p&gt; 
&lt;p&gt;Additionally, for organizations with heightened data protection requirements beyond standard compliance frameworks, the SRE can be extended with a &lt;a href="https://pages.awscloud.com/rs/112-TZM-766/images/TRE%20on%20AWS%20eBook.pdf" target="_blank" rel="noopener"&gt;Trusted Research Environment (TRE) on AWS&lt;/a&gt;. This adds an additional security layer at the data level for fine-grained control over data ingress and egress.&lt;/p&gt; 
&lt;h3&gt;Give your researchers a seamless compliance experience&lt;/h3&gt; 
&lt;p&gt;Although the SRE handles infrastructure-level compliance, your researchers experience something much more streamlined. From your researchers’ perspective, compliance happens behind the scenes. They don’t need to understand HIPAA requirements or configure security settings. They log in to their more secure research portal, a customized interface that shows only the products and services relevant to their specific grant. They focus on their research while compliance controls work automatically in the background. The portal serves as the primary access point for your researchers and their external partners, streamlining collaboration while maintaining strict compliance standards.&lt;/p&gt; 
&lt;p&gt;This streamlined approach gives your researchers what they need while helping avoid common institutional headaches such as shadow IT environments, unauthorized server purchases, and last-minute scrambles to provision compliant resources.&lt;/p&gt; 
&lt;h3&gt;Extending secure research globally&lt;/h3&gt; 
&lt;p&gt;Research institutions worldwide face the same core challenge: meeting rigorous compliance requirements without slowing down scientific discovery. The AWS SRE is built on a flexible, multi-account architecture that can be configured to reflect the regulatory requirements of any jurisdiction, whether your institution operates under a single national framework or navigates overlapping international standards. The SRE provides a consistent, scalable foundation that travels with your research mission.&lt;/p&gt; 
&lt;h3&gt;Get started with alignment and deployment&lt;/h3&gt; 
&lt;p&gt;Successful SRE implementation starts with organizational alignment. Your chief information officer (CIO), vice president of research, and chief information security officer (CISO) must work together from the outset to support your researchers’ compliance needs. You can be successful if you bring these leaders together early with a shared commitment to helping your researchers and aligning on what’s needed to succeed before implementation begins.&lt;/p&gt; 
&lt;p&gt;After that foundation is in place, each SRE implementation includes two major workstreams that run in parallel. By building infrastructure and preparing compliance documentation simultaneously, you close the months-long gap between technical completion and audit readiness that frequently stalls deployment. The two parallel workstreams are:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;&lt;strong&gt;Technical build&lt;/strong&gt; – Deploy infrastructure, including AWS Organizations, organizational units, network architecture, security controls, and automation using the LZA.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Compliance and audit readiness –&lt;/strong&gt; &lt;a href="https://aws.amazon.com/security-assurance-services/" target="_blank" rel="noopener"&gt;AWS Security Assurance Services&lt;/a&gt; prepares you for certification by providing documentation, control mapping, and evidence collection.&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p&gt;AWS offers three flexible pathways for deployment:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;&lt;strong&gt;AWS Partners and Security Assurance Services –&lt;/strong&gt;&lt;a href="https://aws.amazon.com/partners/work-with-partners/" target="_blank" rel="noopener"&gt; AWS Partners&lt;/a&gt; handle technical deployment, and Security Assurance Services prepares you for compliance certifications. Best for institutions seeking expert implementation support. AWS Partners can maintain your environment or teach your team to manage it independently. To get started, explore the &lt;a href="https://aws.amazon.com/partners/" target="_blank" rel="noopener"&gt;AWS Partner Network&lt;/a&gt; to find an experienced partner.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Guided build and Security Assurance Services –&lt;/strong&gt; Your team builds the SRE with guidance from AWS solutions architects while Security Assurance Services handles compliance. Best for institutions seeking to develop internal expertise and gain deep knowledge for independent management and scaling. To get started, review &lt;a href="https://docs.aws.amazon.com/solutions/latest/landing-zone-accelerator-on-aws/solution-overview.html" target="_blank" rel="noopener"&gt;the LZA implementation guide&lt;/a&gt; and connect with your AWS account team.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;AWS Professional Services and Security Assurance Services –&lt;/strong&gt; &lt;a href="https://aws.amazon.com/professional-services/" target="_blank" rel="noopener"&gt;AWS Professional Services&lt;/a&gt; builds your environment and Security Assurance Services handles compliance. Best for institutions seeking AWS engagement with full-service implementation. To get started, contact AWS Professional Services to scope your engagement.&lt;/li&gt; 
&lt;/ol&gt; 
&lt;h3&gt;Is your institution ready to gain an edge in competing for grants?&lt;/h3&gt; 
&lt;p&gt;With the SRE, your IT team can take a centralized, automated approach to research compliance, your researchers can stay focused on their work, and your institution can stay positioned to win grants. Review the deployment pathways to find the right approach for your institution or visit the &lt;a href="https://docs.aws.amazon.com/solutions/latest/landing-zone-accelerator-on-aws/solution-overview.html" target="_blank" rel="noopener"&gt;documentation on the LZA&lt;/a&gt; (the technical foundation of the SRE), &lt;a href="https://aws.amazon.com/partners/" target="_blank" rel="noopener"&gt;AWS Partner Network&lt;/a&gt;, and &lt;a href="https://aws.amazon.com/professional-services/" target="_blank" rel="noopener"&gt;AWS Professional Services&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;You can also take the next step by contacting AWS directly to learn more about building your SRE.&lt;/p&gt; 
&lt;p&gt;Read related stories on the AWS Public Sector Blog&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/building-trusted-research-environments-on-aws/" target="_blank" rel="noopener"&gt;Building Trusted Research Environments on AWS&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/data-ingress-and-egress-through-trusted-research-environments-and-other-secure-enclaves/" target="_blank" rel="noopener"&gt;Data ingress and egress through Trusted Research Environments and other secure enclaves&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/unlocking-research-potential-how-the-university-of-sheffield-and-ronin-accelerate-secure-research-through-data-connect/" target="_blank" rel="noopener"&gt;Unlocking research potential: How the University of Sheffield and RONIN accelerate secure research through Data Connect&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/4-best-practices-to-enhance-research-it-operations-with-aws/" target="_blank" rel="noopener"&gt;4 best practices to enhance research IT operations with AWS&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>Federated learning for biobank data at the CMU-NVIDIA Hackathon</title>
		<link>https://aws.amazon.com/blogs/publicsector/federated-learning-for-biobank-data-at-the-cmu-nvidia-hackathon/</link>
		
		<dc:creator><![CDATA[Ben Busby]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 13:33:25 +0000</pubDate>
				<category><![CDATA[Public Sector]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">a6e19ed23f10e1e5788c79681ef73fcf54e80dfc</guid>

					<description>In this blog post, we will share how at the January 2026 Carnegie Mellon University (CMU)–NVIDIA Federated Learning Hackathon for Biomedical Applications, ten teams built end‑to‑end prototypes on NVIDIA FLARE (NVIDIA Federated Learning Application Runtime Environment), with data prepared for modeling on Amazon Web Services (AWS), to test how FL could support real‑world biobank collaboration at scale.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30572 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/02/Federated-learning-for-biobank-data-at-the-CMU-NVIDIA-Hackathon.jpg" alt="Federated learning for biobank data at the CMU-NVIDIA Hackathon" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://en.wikipedia.org/wiki/Biobank" target="_blank" rel="noopener"&gt;Biobanks&lt;/a&gt; around the world are sitting on rich genomic, clinical, and imaging datasets, but strict privacy, governance, and regulatory requirements make it difficult to centralize this data for large-scale &lt;a href="https://aws.amazon.com/ai/machine-learning/" target="_blank" rel="noopener"&gt;machine learning (ML)&lt;/a&gt; purposes. &lt;a href="https://en.wikipedia.org/wiki/Federated_learning" target="_blank" rel="noopener"&gt;Federated learning (FL)&lt;/a&gt; offers a way forward by keeping sensitive data at each institution while sending only model updates to a coordinating server, preserving data sovereignty and reducing privacy risks.&lt;/p&gt; 
&lt;p&gt;During the January &lt;a href="https://guides.library.cmu.edu/hackathon" target="_blank" rel="noopener"&gt;2026 Carnegie Mellon University (CMU)–NVIDIA Federated Learning Hackathon for Biomedical Applications&lt;/a&gt;, ten teams built end‑to‑end prototypes on &lt;a href="https://developer.nvidia.com/flare" target="_blank" rel="noopener"&gt;NVIDIA FLARE&lt;/a&gt; (NVIDIA Federated Learning Application Runtime Environment), with data prepared for modeling on &lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt;, to test how FL could support real‑world biobank collaboration at scale. Several teams used datasets from the &lt;a href="https://registry.opendata.aws/tag/life-sciences/" target="_blank" rel="noopener"&gt;Registry of Open Data on AWS&lt;/a&gt;, which has a collection of over 225 life sciences datasets across genomics, imaging, and proteins. In this post, we detail the projects the teams worked on, with links to the GitHub repositories from each team, so anyone can access and build on these projects.&lt;/p&gt; 
&lt;p&gt;The following photograph shows CMU–NVIDIA Hackathon organizers Dr. Melanie Gainey, STEM Librarian and Open Science Program Director at CMU, and Dr. Ben Busby, Global Omics Alliances Manager at NVIDIA, introducing the event to a packed room of participants.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/02/CMU–NVIDIA-Hackathon.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30564 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/02/CMU–NVIDIA-Hackathon.jpg" alt="Two presenters stand in front of tables packed with participants and their laptops at the Hackathon." width="938" height="623"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 1: CMU–NVIDIA Hackathon. Photographer: Rebecca Devereaux, CMU Multimedia Specialist&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Laying the groundwork with FedGen&lt;/h3&gt; 
&lt;p&gt;Before you can test federated AI workflows, you need realistic data that respects biobank constraints. &lt;a href="https://github.com/collaborativebioinformatics/FedGen" target="_blank" rel="noopener"&gt;FedGen&lt;/a&gt; tackled this by generating synthetic genomic datasets that mimic real-world properties such as linkage disequilibrium, site-specific variability, covariates, and site-level imbalance across multiple virtual biobanks.&lt;/p&gt; 
&lt;p&gt;The team built a FLARE-based client–server framework where each client trained a logistic regression model locally for a binary trait, with only weight updates shared across the federation and optional client-side privacy filters applied. This synthetic infrastructure now serves as a reusable testbed for future federated genome-wide association studies (GWAS) on AWS and on-premises biobank environments.&lt;/p&gt; 
&lt;h3&gt;Harmonizing pathology with FedPathHarmony&lt;/h3&gt; 
&lt;p&gt;Histopathology images are notoriously sensitive to site-specific staining protocols, scanner hardware, and local pipelines, all of which can cause models to learn institutional signatures instead of biology. The &lt;a href="https://github.com/collaborativebioinformatics/FedPathHarmony" target="_blank" rel="noopener"&gt;FedPathHarmony&lt;/a&gt; team explored harmonization of the &lt;a href="https://registry.opendata.aws/camelyon/" target="_blank" rel="noopener"&gt;CAMELYON&lt;/a&gt; dataset in a federated setting, using stain normalization and style transfer to align images across sites before or during FL training.&lt;/p&gt; 
&lt;p&gt;By integrating these harmonization steps into NVIDIA FLARE workflows, the team showed that it’s possible to reduce domain shift while keeping raw pathology images at each biobank. Their prototype highlights how algorithmic harmonization and federated orchestration can work together to improve generalization of diagnostic models across hospitals.&lt;/p&gt; 
&lt;h3&gt;Auditing federated readiness at scale with FedViz&lt;/h3&gt; 
&lt;p&gt;Before researchers can use data from different biobanks, they need to first understand what data each biobank has. They need to be able to compare these features and understand the sample size and data quality from each biobank before they can decide which biobank’s data they should use. &lt;a href="https://github.com/collaborativebioinformatics/FedViz" target="_blank" rel="noopener"&gt;FedViz&lt;/a&gt; tackles this challenge by providing a visualization command center built on harmonized metadata from large-scale consortia, allowing researchers to audit gaps in harmonization and quantify federated readiness across the cohorts.&lt;/p&gt; 
&lt;h3&gt;Pangenome graphs with OmniGenome&lt;/h3&gt; 
&lt;p&gt;Pangenome graphs need data from multiple ancestries and sequencing centers, but these datasets are often siloed across biobanks. &lt;a href="https://github.com/collaborativebioinformatics/omnigenome" target="_blank" rel="noopener"&gt;OmniGenome&lt;/a&gt; focused on building a federated framework for pangenome construction and analysis, using data from the &lt;a href="https://humanpangenome.org/" target="_blank" rel="noopener"&gt;Human Pangenome Reference Consortium (HPRC)&lt;/a&gt; as a proof of concept alongside federated genomic hashing without exposing raw sequences. They validated this approach on data from &lt;a href="https://registry.opendata.aws/1000-genomes/" target="_blank" rel="noopener"&gt;1000 Genomes&lt;/a&gt;, focused on variants with Alzheimer’s disease risk. This work suggests that comparable pangenome representations can be built in a federated setting, which can then be shared across biobanks without exposing raw sequence data.&lt;/p&gt; 
&lt;h3&gt;Untangling ancestry with Med_SNP_Deconvolution&lt;/h3&gt; 
&lt;p&gt;&lt;a href="https://www.genome.gov/Health/Genomics-and-Medicine/Polygenic-risk-scores" target="_blank" rel="noopener"&gt;Polygenic risk scores&lt;/a&gt; and ancestry inference tools built on existing genomic studies have shown limited generalizability across diverse populations, leaving a critical gap in equitable genomic medicine. Current approaches to ancestry inference require access to individual-level genotype data, making cross-institutional collaboration difficult under increasingly strict data privacy regulations.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://github.com/collaborativebioinformatics/Med_SNP_Deconvolution" target="_blank" rel="noopener"&gt;Med_SNP_Deconvolution&lt;/a&gt; tackles this issue by providing an end-to-end computational framework that transforms phased variant data into recombination-defined haploblock cluster identifiers—discrete categorical features that preserve population structure while obscuring individual-level variation—and integrates GPU-accelerated machine learning with NVIDIA FLARE federated infrastructure, enabling multiple research sites to collaboratively train ancestry classification models without centralizing raw genotype data.&lt;/p&gt; 
&lt;h3&gt;Federated rare disease subtyping with RAIDers&lt;/h3&gt; 
&lt;p&gt;Rare diseases such as Amyotrophic Lateral Sclerosis (ALS) present a unique challenge for genomic research: patient cohorts are too small and too scattered across institutions to yield statistically meaningful results, and strict privacy regulations prevent researchers from pooling raw data across biobanks.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://github.com/collaborativebioinformatics/RAIDers" target="_blank" rel="noopener"&gt;RAIDers&lt;/a&gt; (Rare Disease and AI) tackles this problem by building a federated computational framework that integrates 480 pathogenic variants from &lt;a href="https://www.ncbi.nlm.nih.gov/clinvar/" target="_blank" rel="noopener"&gt;ClinVar&lt;/a&gt; and population allele frequency data from &lt;a href="https://registry.opendata.aws/broad-gnomad/" target="_blank" rel="noopener"&gt;gnomAD&lt;/a&gt; to generate a synthetic cohort of more than 8,000 simulated patients across five institutions. They create a tool that validates a federated subtyping pipeline on synthetic data. RAIDers demonstrates that coherent ALS molecular subtypes can be discovered without centralizing sensitive genomic data, establishing a scalable architecture for rare disease subtyping that is ready for integration with real-world controlled-access biobank datasets.&lt;/p&gt; 
&lt;h3&gt;Multi-omic cancer subtyping with OncoLearn&lt;/h3&gt; 
&lt;p&gt;Cancer research increasingly depends on integrating genomic, transcriptomic, and clinical data to define meaningful subtypes. Current multi-omic models are constrained by patient privacy regulations, the logistical barriers of aggregating sensitive genetic datasets, and the poor generalizability of single-site cohorts across diverse global populations.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://github.com/collaborativebioinformatics/OncoLearn" target="_blank" rel="noopener"&gt;OncoLearn&lt;/a&gt; built a federated multi‑omic cancer subtyping pipeline for classifying breast cancer (BRCA) subtypes &lt;a href="https://registry.opendata.aws/tcga/" target="_blank" rel="noopener"&gt;using the cancer genome atlas (TCGA)&lt;/a&gt; dataset. The framework evaluates the efficacy of traditional supervised learning against modern transfer learning, validating this approach across five subtypes and demonstrating that federated transfer learning achieves high accuracy despite local computational constraints. The team’s open source codebase demonstrates how federated multi‑omic models could help cancer centers collaborate on precision oncology while maintaining their institutional data boundaries.&lt;/p&gt; 
&lt;p&gt;The following photograph shows CMU–NVIDIA Hackathon researchers working together on multi-omic cancer subtyping with OncoLearn.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/02/Researchers-working-with-OncoLearn.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30563 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/02/Researchers-working-with-OncoLearn.jpg" alt="Three hackathon participants gathered around a laptop." width="917" height="611"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 2: Researchers working with OncoLearn. Photographer: Rebecca Devereaux, CMU Multimedia Specialist.&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Aligning risk prediction with PRSAggregator&lt;/h3&gt; 
&lt;p&gt;Polygenic risk scores (PRS) aggregate effects across thousands of variants to stratify disease risk, but most PRS are derived from European-ancestry dominant cohorts and thus transfer poorly to other populations due to differences in linkage disequilibrium and allele frequencies. &lt;a href="https://github.com/collaborativebioinformatics/PRSAggretator" target="_blank" rel="noopener"&gt;PRSAggregator&lt;/a&gt; set out to harmonize PRS computation in a federated framework by enabling sites to collaboratively train or calibrate risk models and then aggregate scores in a privacy-preserving fashion.&lt;/p&gt; 
&lt;p&gt;The prototype explored federated strategies for aligning model parameters and evaluation metrics across sites, making it easier to interpret PRS distributions and thresholds globally. This work points toward a future in which federated pipelines help standardize genetic risk prediction across institutions and ancestries.&lt;/p&gt; 
&lt;p&gt;The following photograph shows the PRSAggregator team presenting their project on the third day of the CMU–NVIDIA Hackathon.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/02/PRS-Aggregator-team-presenting-their-project-on-day-3.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30562 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/02/PRS-Aggregator-team-presenting-their-project-on-day-3.jpg" alt="Three hackathon participants standing in front a lectern with a laptop, which is screencasting to a large screen behind them." width="944" height="629"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 3: PRS Aggregator team presenting their project on day 3. Photographer: Rebecca Devereaux, CMU Multimedia Specialist.&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Fusing modalities with MuFFLe&lt;/h3&gt; 
&lt;p&gt;Cancer prognosis models require multimodal data, such as RNA sequencing, clinical variables, and imaging, drawn from patients across multiple institutions. But privacy regulations and unequal access to healthcare technology mean that not every hospital can collect the same data types or share raw patient records across sites.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://github.com/collaborativebioinformatics/MuFFLe" target="_blank" rel="noopener"&gt;MuFFLe&lt;/a&gt; (Multimodal Framework for Federated Learning) tackles this problem by providing a privacy-preserving federated learning framework that integrates RNA sequencing and clinical features for tumor progression prediction, using NVIDIA FLARE to ensure each hospital trains only on its local data and shares encrypted model updates—never raw patient records—with a central aggregation server.&lt;/p&gt; 
&lt;p&gt;A key innovation is MuFFLe’s ability to handle modality gaps between institutions. When a smaller hospital lacks RNA sequencing capabilities, the framework selectively disables that encoder and zeroes out its embeddings, allowing the global model to train collaboratively even when data modalities are unequal across sites.&lt;/p&gt; 
&lt;p&gt;Validated on bladder cancer recurrence data from the &lt;a href="https://registry.opendata.aws/chimera/" target="_blank" rel="noopener"&gt;CHIMERA&lt;/a&gt; Challenge, MuFFLe successfully stratified 176 patients into three distinct risk clusters with interpretable attention heatmaps that highlight the tissue regions and gene features driving each prediction, establishing a scalable, extensible architecture for multimodal federated cancer prognosis.&lt;/p&gt; 
&lt;h3&gt;Predicting protein fitness with FedProFit&lt;/h3&gt; 
&lt;p&gt;Predicting how combinatorial protein mutations affect protein function is a critical challenge in protein engineering, but the experimental data needed to train accurate models—&lt;a href="https://pubmed.ncbi.nlm.nih.gov/25075907/" target="_blank" rel="noopener"&gt;deep mutational scanning (DMS)&lt;/a&gt; assays—is scattered across hospitals, academic labs, and industry partners who can’t easily share proprietary or sensitive sequence data.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://github.com/collaborativebioinformatics/FedProFit" target="_blank" rel="noopener"&gt;FedProFit&lt;/a&gt; tackles this problem by providing a federated learning framework with NVIDIA FLARE for predicting protein fitness scores across distributed DMS datasets, using NVIDIA BioNeMo’s ESM-2 650M protein language model as a frozen backbone and training only lightweight prediction heads locally at each client site. This way, only model weights, never raw sequence data, are shared with the central aggregation server.&lt;/p&gt; 
&lt;p&gt;To simulate realistic cross-institutional collaboration, the framework partitions the &lt;a href="https://registry.opendata.aws/proteingym/" target="_blank" rel="noopener"&gt;ProteinGym&lt;/a&gt; substitution benchmark, which comprises approximately 2.4 million missense variants across 217 DMS assays, into four federated client nodes representing a clinical hospital (human proteins), a virology lab (viral proteins), an antibiotic resistance lab (prokaryote proteins), and an academic bio-foundry (eukaryote proteins). This demonstrates that a single federated model can learn meaningful fitness predictions across highly heterogeneous biological domains without any site needing to expose its underlying data.&lt;/p&gt; 
&lt;h3&gt;Shared infrastructure, shared impact&lt;/h3&gt; 
&lt;p&gt;Across these ten projects, a consistent pattern emerged. By combining NVIDIA FLARE’s federated orchestration with cloud-scale compute and &lt;a href="https://aws.amazon.com/opendata/" target="_blank" rel="noopener"&gt;Open Data on AWS&lt;/a&gt;, teams could prototype sophisticated biomedical AI workflows in only a few days. The CMU–NVIDIA Hackathon projects collectively explored disease subtyping, GWAS, pangenomes, ancestry stratification, rare diseases, polygenic risk scores, multimodal data integration, and protein function through a federated lens grounded in real biobank constraints. Although each prototype is an early step, together they outline a technical blueprint for how biobanks, hospitals, and research organizations might collaborate on next‑generation biomedical AI without moving their most sensitive data.&lt;/p&gt; 
&lt;p&gt;The following is a group photograph of participants and organizers.&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 4: All participants and organizers gather on the final day of the hackathon. Photographer&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/02/All-participants-and-organizers.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30561 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/02/All-participants-and-organizers.jpg" alt="Group of participants and organizers posing in three rows in front of a campus quad surrounded by buildings at CMU." width="993" height="611"&gt;&lt;/a&gt;: Rebecca Devereaux, CMU Multimedia Specialist.&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;What’s next?&lt;/h3&gt; 
&lt;p&gt;Researchers, engineers, and students who want to build on this work can start today by exploring the open source repositories from the CMU–NVIDIA Hackathon and reusing data pipelines for their own biobank scenarios. A full &lt;a href="https://osf.io/preprints/biohackrxiv/5psfj_v1" target="_blank" rel="noopener"&gt;preprint&lt;/a&gt; shares deeper technical details for each project so that others can replicate and extend these prototypes. We also invite collaborators and biobanks interested in piloting federated learning workflows to connect with the organizing team and to join us at the next Federated Learning Hackathon at CMU Libraries in January 2027, where we’ll continue pushing the boundaries of privacy‑preserving biomedical AI.&lt;/p&gt; 
&lt;p&gt;To learn more about the CMU–NVIDIA Hackathon, read the CMU blog post about the event, &lt;a href="https://library.cmu.edu/about/news/2026-02/NVIDIA-hackathon" target="_blank" rel="noopener"&gt;Where Industry Meets Experimentation&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Acknowledgements:&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;Ayush Tripathi – Solutions Architect at AWS&lt;br&gt; Sphia Sadek – Solutions Architect at AWS&lt;/p&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>ASI and AWS see the future of complex global operations</title>
		<link>https://aws.amazon.com/blogs/publicsector/asi-and-aws-see-the-future-of-complex-global-operations/</link>
		
		<dc:creator><![CDATA[Bernard Asare]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 13:31:40 +0000</pubDate>
				<category><![CDATA[Amazon Bedrock]]></category>
		<category><![CDATA[Amazon EC2]]></category>
		<category><![CDATA[Amazon Elastic Kubernetes Service]]></category>
		<category><![CDATA[Amazon RDS]]></category>
		<category><![CDATA[Amazon Simple Storage Service (S3)]]></category>
		<category><![CDATA[AWS GovCloud (US)]]></category>
		<category><![CDATA[Public Sector]]></category>
		<guid isPermaLink="false">c46b5192adad50746a1a4b13ada1a1b0c7bcebab</guid>

					<description>Learn how ASI, in collaboration with Amazon Web Services (AWS), is transforming how the aviation industry manages uncertainty, optimizes operations, and reliably maintains safety at scale.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30576 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/04/04/ASI-and-AWS-see-the-future-of-complex-global-operations.png" alt="ASI and AWS see the future of complex global operations" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;The &lt;a href="https://www.faa.gov/air_traffic/nas" target="_blank" rel="noopener"&gt;US national airspace system (NAS)&lt;/a&gt; is one of the most complex operational environments in the world. Every day, over 47,000 aircraft move through shared airspace, navigating volatile weather, dense traffic flows, space launches, and constraints in real time. A storm cell, a ground stop, or a delayed decision in one region can rapidly ripple across the country.&lt;/p&gt; 
&lt;p&gt;The cost of being late—or wrong—is measured in millions of dollars, mounting delays, wasted fuel, and compounding operational risk. Many of the systems used to manage the NAS were designed for a slower era. Built to report what has already happened, they struggle to integrate fragmented data or anticipate how today’s decisions might shape the system tomorrow. As complexity accelerates and disruptions propagate faster, reactive decision-making is no longer sufficient.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.airspace-intelligence.com/" target="_blank" rel="noopener"&gt;Air Space Intelligence (ASI)&lt;/a&gt; is an American AI company leading transformation and delivering mission-critical decision-making systems to the aviation, defense, logistics, and energy organizations operating in these dynamic, complex environments.&lt;/p&gt; 
&lt;p&gt;In collaboration with &lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt;, which provides secure, resilient, highly scalable cloud infrastructure essential for high system availability and mission success, ASI is transforming how the aviation industry manages uncertainty, optimizes operations, and reliably maintains safety at scale.&lt;/p&gt; 
&lt;h3&gt;The challenge: Managing the NAS at scale&lt;/h3&gt; 
&lt;p&gt;The NAS operates as a vast interconnected network where individual decisions ripple across the system. Weather cells forming over the Atlantic Ocean impact transcontinental routes hours later. A ground stop at a major airport creates cascading delays nationwide. Military training exercises require rapid airspace reconfiguration. Each element affects every other, creating a web of dependencies that traditional solutions struggle to capture.&lt;/p&gt; 
&lt;p&gt;Airlines collectively operate 25,000–30,000 daily flights across the NAS, each requiring precise coordination between pilots, dispatchers, air traffic controllers (ATC), and command centers. The aviation industry has historically relied on fragmented systems and manual processes that react to disruptions rather than anticipating them.&lt;/p&gt; 
&lt;p&gt;ASI’s solution unifies both data and stakeholders into a common, predictive view of the NAS, facilitating coordinated, collaborative decision-making that anticipates impacts before they cascade across the system.&lt;/p&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“What makes our solution unique is how it enables seamless collaboration across the entire operational ecosystem,” explains Bernard Asare, senior vice president of civil aviation at ASI. “Pilots, dispatchers, and traffic managers view the same integrated real-time and predicted pictures and make coordinated decisions.”&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;h3&gt;AWS provides system reliability for mission-critical operations&lt;/h3&gt; 
&lt;p&gt;Managing the complexity of the NAS is only part of the challenge. Security, reliability, resilience, and availability are nonnegotiable. Decisions directly impact safety, national security, and critical infrastructure, leaving no room for downtime or degraded performance.&lt;/p&gt; 
&lt;p&gt;ASI’s infrastructure is built on AWS to meet these demands. It uses &lt;a href="https://aws.amazon.com/eks/" target="_blank" rel="noopener"&gt;Amazon Elastic Kubernetes Service (Amazon EKS)&lt;/a&gt; and &lt;a href="https://aws.amazon.com/ec2/" target="_blank" rel="noopener"&gt;Amazon Elastic Compute Cloud (Amazon EC2)&lt;/a&gt; for scalable compute, &lt;a href="https://aws.amazon.com/s3/" target="_blank" rel="noopener"&gt;Amazon Simple Storage Service (Amazon S3)&lt;/a&gt; for data storage, &lt;a href="https://aws.amazon.com/rds/" target="_blank" rel="noopener"&gt;Amazon Relational Database Service (Amazon RDS)&lt;/a&gt; for databases, and &lt;a href="https://aws.amazon.com/bedrock/" target="_blank" rel="noopener"&gt;Amazon Bedrock&lt;/a&gt; for AI training and inference. This architecture is built for multi-Availability Zone resilience, with stateless applications and automated scaling using Amazon EKS and &lt;a href="https://karpenter.sh/" target="_blank" rel="noopener"&gt;Karpenter&lt;/a&gt; to maintain uninterrupted operations under variable load.&lt;/p&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“AWS enables ASI to securely build, deploy, and operate high-availability, mission-critical AI platforms that support continuous, uninterrupted operations,” says Jon Varsanik, ASI’s vice president of platform engineering. “Its global infrastructure allows us to scale across commercial cloud and &lt;a href="https://aws.amazon.com/govcloud-us/" target="_blank" rel="noopener"&gt;AWS GovCloud (US)&lt;/a&gt; environments while maintaining security and resilience.”&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;p&gt;ASI’s solution protects sensitive aviation and defense data through sophisticated AWS security controls including encryption at rest and in transit, least-privilege IAM policies with mandatory multi-factor authentication (MFA) for administrative access, and network isolation using &lt;a href="https://aws.amazon.com/vpc/" target="_blank" rel="noopener"&gt;Amazon Virtual Private Cloud (Amazon VPC)&lt;/a&gt; with private subnets. For defense customers, the solution operates in AWS GovCloud (US) environments certified for Department of Defense (DoD) Impact Levels (ILs) 4–6 and &lt;a href="https://www.fedramp.gov/" target="_blank" rel="noopener"&gt;Federal Risk and Authorization Management Program (FedRAMP)&lt;/a&gt; compliance.&lt;/p&gt; 
&lt;h3&gt;The ASI solution predicts the future to proactively optimize operations today&lt;/h3&gt; 
&lt;p&gt;ASI’s solution represents a shift in how the aviation industry approaches operational decision-making. Rather than treating each flight as an isolated event, the solution provides thorough, predictive situational awareness across the NAS. By ingesting, fusing, and contextualizing over 150 real-time data streams including &lt;a href="https://www.faa.gov/" target="_blank" rel="noopener"&gt;Federal Aviation Administration (FAA)&lt;/a&gt; &lt;a href="https://www.faa.gov/air_traffic/technology/swim/overview" target="_blank" rel="noopener"&gt;System Wide Information Management (SWIM)&lt;/a&gt; data, &lt;a href="https://www.weather.gov/" target="_blank" rel="noopener"&gt;National Weather Service&lt;/a&gt; forecasts, &lt;a href="https://www.ll.mit.edu/" target="_blank" rel="noopener"&gt;MIT Lincoln Laboratory&lt;/a&gt; weather, military airspace status, and operational constraints, ASI creates a unified operational picture that facilitates proactive, system-wide optimization.&lt;/p&gt; 
&lt;p&gt;For each of the data streams, ASI invested heavily in understanding scope, quality, and what Asare calls the “temperament” of the data. This supports the solution’s ability to provide predictive capabilities 8 to 12 hours into the future, which means decision-makers such as traffic managers, ATC coordinators, dispatchers, and pilots can anticipate and mitigate disruptions before they cascade through the system. AI models power critical capabilities throughout the solution, such as predicting taxi times based on weather and congestion patterns, forecasting how traffic flows might evolve around convective weather, and optimizing routes to balance efficiency across the airspace rather than between individual flights. ASI uses Amazon Bedrock for custom model training, refinement, and inference, delivering AI-driven decision support every few minutes.&lt;/p&gt; 
&lt;h3&gt;Airline operations at scale&lt;/h3&gt; 
&lt;p&gt;ASI’s solution supports operations for major US airlines, including United Airlines, Delta Air Lines, and Alaska Airlines, helping them drive significant time and fuel savings.&lt;/p&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“Literally both the dispatchers and pilots are looking at the same picture of the weather, the airspace, and the same route recommendations,” Asare says. “Nowhere in the industry do you have pilots and dispatchers viewing the same picture and making decisions together.”&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;p&gt;By continuously monitoring system-wide conditions across the NAS, ASI helps airlines anticipate choke points before they cascade into delays. When convective weather disrupts major airspace corridors such as traffic flows stretching from Texas to New York, teams can use ASI’s technology to make proactive traffic flow management decisions, respond faster to minimize diversions, and support dispatchers on the day of operations.&lt;/p&gt; 
&lt;h3&gt;U.S. Department of Defense&lt;/h3&gt; 
&lt;p&gt;As a dual-use commercial-off-the-shelf (COTS) technology, ASI’s solution has been rapidly adapted to support mission-critical operations within the DoD. In a matter of months, ASI deployed its commercial capabilities into secure AWS GovCloud (US) environments meeting IL 4, 5, and 6 security requirements, which means defense organizations can field advanced decision support systems at mission speed.&lt;/p&gt; 
&lt;p&gt;Across the DoD, ASI supports the dynamic mission replanning and predictive command and control (C2) of air assets. It serves as a critical facilitator of the logistics kill chain, supporting the success of multimodal contested logistics in globally distributed, capacity-constrained environments. Joint stakeholders can use the solution to anticipate disruptions and coordinate decisions across domains and combatant commands, including &lt;a href="https://www.pacom.mil/about-usindopacom/" target="_blank" rel="noopener"&gt;U.S. Indo-Pacific Command (INDOPACOM)&lt;/a&gt;, &lt;a href="https://www.northcom.mil/About/" target="_blank" rel="noopener"&gt;U.S. Northern Command (USNORTHCOM)&lt;/a&gt;, and &lt;a href="https://www.ustranscom.mil/" target="_blank" rel="noopener"&gt;U.S. Transportation Command (USTRANSCOM)&lt;/a&gt;.&lt;/p&gt; 
&lt;blockquote&gt;
 &lt;p&gt;“The speed at which ASI delivered operational capability into secure environments changes how the department can deploy advanced decision support systems,” says Mark Lepczyk, president of ASI Federal.&lt;/p&gt;
&lt;/blockquote&gt; 
&lt;h3&gt;Looking ahead: Transform your mission-critical operations&lt;/h3&gt; 
&lt;p&gt;ASI is expanding its decision support capabilities to serve the FAA’s modernization initiatives, defense operations, and critical infrastructure sectors including energy and logistics. ASI and AWS are also exploring agentic AI workflows and advanced optimization techniques on Amazon Bedrock to further improve decision speed and scale. Organizations facing similar operational complexity can use more secure, resilient infrastructure from AWS to build predictive systems that anticipate disruptions before they cascade.&lt;/p&gt; 
&lt;h3&gt;Learn more about building mission-critical AI systems on AWS&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/bedrock/" target="_blank" rel="noopener"&gt;Amazon Bedrock&lt;/a&gt; for custom AI model training and inference&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/govcloud-us/" target="_blank" rel="noopener"&gt;AWS GovCloud (US)&lt;/a&gt; for defense and regulated workloads&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/architecture/security-identity-compliance/" target="_blank" rel="noopener"&gt;AWS security best practices&lt;/a&gt; for protecting sensitive operational data&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/contact-us/" target="_blank" rel="noopener"&gt;Contact AWS&lt;/a&gt; to discuss your operational intelligence requirements&lt;/li&gt; 
&lt;/ul&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>AI and cloud innovation create the airports of the future</title>
		<link>https://aws.amazon.com/blogs/publicsector/ai-and-cloud-innovation-create-the-airports-of-the-future/</link>
		
		<dc:creator><![CDATA[Bob Kwik]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 13:14:53 +0000</pubDate>
				<category><![CDATA[Amazon Bedrock]]></category>
		<category><![CDATA[Amazon Rekognition]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[Public Sector]]></category>
		<category><![CDATA[Travel and Hospitality]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">c2c8f485c05783499e927cbc734f86f7f47e25ab</guid>

					<description>In this blog post, learn more about the AI Adoption Alliance is a collaborative initiative designed to accelerate responsible AI deployment. The alliance, between Amazon Web Services (AWS), the Cities Today Institute, Zensors AI, and NVIDIA, helps airport operators navigate data governance, legacy integration, and use case evaluation to support AI adoption.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="alignleft size-full wp-image-30512" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/26/AI-and-cloud-innovation-create-the-airports-of-the-future.png" alt="" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;AI can redefine the way air travel and airports work. &lt;a href="https://aws.amazon.com/ai/agentic-ai/" target="_blank" rel="noopener"&gt;Agentic AI&lt;/a&gt;—capable of autonomous decision-making and action—has increased that potential. The payoff could be significant, but so is the implementation challenge.&lt;/p&gt; 
&lt;p&gt;Airports are among the most complex environments in the world. These mini cities operate around the clock and coordinate thousands of passengers, staff, and systems.&lt;/p&gt; 
&lt;p&gt;For airport operators, the challenge is how to harness new technologies like AI and now agentic AI to improve passenger experiences and grow revenues. The &lt;a href="https://www.gminsights.com/industry-analysis/artificial-intelligence-in-aviation-market" target="_blank" rel="noopener"&gt;AI in aviation market is forecast to exceed USD $4 billion by 2032&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;This is a highly regulated and complex sector, creating an implementation challenge. The &lt;a href="https://cities-today.com/industry-teams-up-with-airports-to-advance-ai-in-aviation/" target="_blank" rel="noopener"&gt;AI Adoption Alliance&lt;/a&gt; is a collaborative initiative designed to accelerate &lt;a href="https://aws.amazon.com/ai/responsible-ai/" target="_blank" rel="noopener"&gt;responsible AI&lt;/a&gt; deployment. The alliance, between &lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt;, the &lt;a href="https://cities-today.com/" target="_blank" rel="noopener"&gt;Cities Today Institute&lt;/a&gt;, &lt;a href="https://www.zensors.com/" target="_blank" rel="noopener"&gt;Zensors AI&lt;/a&gt;, and &lt;a href="https://www.nvidia.com/" target="_blank" rel="noopener"&gt;NVIDIA&lt;/a&gt;, helps airport operators navigate data governance, legacy integration, and use case evaluation to support AI adoption.&lt;/p&gt; 
&lt;h3&gt;AI addresses airports’ big data challenge&lt;/h3&gt; 
&lt;p&gt;It’s important to work backwards from the problem you want to solve. That usually means starting with the passenger experience or operational improvement. Identify the business value that could be unlocked, then experiment and test with new or proven technologies to find the best solution for your airport. When you’ve established a positive impact, implement that technology at scale.&lt;/p&gt; 
&lt;p&gt;Airports’ interdependent systems add up to a big data challenge that AI can address, as Nick Woods, managing director of &lt;a href="https://ca.vu/about/" target="_blank" rel="noopener"&gt;CAVU&lt;/a&gt;, founded by Manchester Airports Group (MAG), explains in our &lt;a href="https://d1.awsstatic.com/onedam/marketing-channels/website/aws/en_US/government-education/approved/AWS%20Intelligent%20Air%20Travel.pdf" target="_blank" rel="noopener"&gt;AWS paper on the future of intelligent air travel&lt;/a&gt;. He says, “AI agents give us the ability to break down those processes into the smallest composable elements and then get them to work together in a streamlined way.”&lt;/p&gt; 
&lt;p&gt;He describes three core journeys: the passenger, the aircraft, and the luggage journey. Within each, AI can optimize check-in, security, boarding, runway, and control tower operations. By focusing on these journeys, airports can target high-impact areas for AI-driven improvement.&lt;/p&gt; 
&lt;h3&gt;AI transforms passenger experience&lt;/h3&gt; 
&lt;p&gt;&lt;a href="https://www.sita.aero/resources/surveys-reports/air-transport-it-insights-2024/" target="_blank" rel="noopener"&gt;The top three AI use cases for airports worldwide are cybersecurity, customer service, and passenger processing.&lt;/a&gt; Agentic AI is advancing these applications further, enhancing efficiency, delivering proactive support, and creating personalized experiences that radically improve air travel.&lt;/p&gt; 
&lt;p&gt;At Aena, the world’s largest airport operator, the “Oli” assistant helps passengers with connections, document verification, and entertainment. Accessible through familiar platforms such as WhatsApp, Facebook, or WeChat, Oli’s real-time support is not only easy to use, it extends seamlessly to airlines and partner airports. Vinci Airports, which manages more than 70 airports in 14 countries, has tested a conversational AI assistant at Lyon Airport capable of understanding natural speech and responding contextually to complex passenger queries. Meanwhile, Air Canada uses &lt;a href="https://aws.amazon.com/rekognition/" target="_blank" rel="noopener"&gt;Amazon Rekognition&lt;/a&gt; for biometric identity verification with 99.9% accuracy, speeding up the boarding process. At Rome’s Fiumicino Airport, Aeroporti di Roma created a smart helper called &lt;a href="https://press.aboutamazon.com/aws/2025/10/aeroporti-di-roma-transforms-passenger-experience-with-ai-virtual-assistant-powered-by-aws-and-storm-reply" target="_blank" rel="noopener"&gt;Virtual Assistant&lt;/a&gt; that answers travelers’ questions about flights, baggage, and airport services through WhatsApp and their website—like having a friendly airport guide in your pocket. This AI assistant, powered by &lt;a href="https://aws.amazon.com/bedrock/" target="_blank" rel="noopener"&gt;Amazon Bedrock&lt;/a&gt; and developed by the &lt;a href="https://aws.amazon.com/ai/generative-ai/innovation-center/" target="_blank" rel="noopener"&gt;AWS Generative AI Innovation Center&lt;/a&gt; and &lt;a href="https://www.reply.com/storm-reply/it" target="_blank" rel="noopener"&gt;Storm Reply&lt;/a&gt;, talks to passengers in their own language and helps them find their way around one of Europe’s busiest airports.&lt;/p&gt; 
&lt;h3&gt;Operational and revenue benefits&lt;/h3&gt; 
&lt;p&gt;AI transforms how airports operate. One of their biggest challenges is that airport capacity is in constant flux. Accurately forecasting the day-to-day realities of air travel with predictive analytics can have an immediate impact on the bottom line.&lt;/p&gt; 
&lt;p&gt;At Riyadh Airport, an AI-enabled baggage-handling system developed with AWS cut unexpected failures by up to 50% and reduced repair times by 60%. &lt;a href="https://superlinear.eu/impact/superlinear-and-brussels-airport-company-revolutionize-the-airport-experience-using-ai" target="_blank" rel="noopener"&gt;Brussels Airport uses AI-powered demand forecasting&lt;/a&gt; to optimize check-in, border control, and baggage handling.&amp;nbsp;At &lt;a href="https://www.assaia.com/customer-stories/aeroporti-di-roma-reduces-departure-delays-by-6-minutes-with-assaia" target="_blank" rel="noopener"&gt;Rome Fiumicino Airport&lt;/a&gt;, Italy, the operator Aeroporti di Roma (ADR) uses ApronAi from &lt;a href="http://www.assaia.com/" target="_blank" rel="noopener"&gt;Assaia&lt;/a&gt; to reduce aircraft turnaround delays, assigning staff based on actual events rather than pre-planned schedules.&lt;/p&gt; 
&lt;p&gt;At &lt;a href="https://www.airportsinternational.com/article/aena-uses-drones-san-sebastian" target="_blank" rel="noopener"&gt;San Sebastián Airport&lt;/a&gt;, a combination of AI, drones, and a private 5G network detect foreign object debris (FOD) on the runway, a safety-critical issue that is time-consuming to rectify. At Gatwick, &lt;a href="https://veovo.com/insights/news/gatwick-integrated-airport-control-system-aop" target="_blank" rel="noopener"&gt;Veovo&lt;/a&gt; is building an Integrated Airport Control (IAC) System that can predict challenges in real time. The system provides live situational awareness using aggregated flight, passenger, and transport data. It sends recommendations to security, immigration, airlines, ground staff, air traffic control, and management to help them make coordinated, better-informed decisions.&lt;/p&gt; 
&lt;h3&gt;The agentic AI journey to autonomous airports&lt;/h3&gt; 
&lt;p&gt;AI in aviation is evolving from AI-supported to AI-managed experiences and operations. This next phase, powered by agentic AI, will drive autonomous coordination across complex airport systems. Agentic AI is potentially a breakthrough technology to support airport operations. Analytical AI is good at forecasting, but it’s not so powerful in decision support in a highly complex environment where you need to ask many different stakeholders what their status is and determine what the impact could be. This is where AI agents come into play.&lt;/p&gt; 
&lt;p&gt;For example, in the case of a delayed flight, the AI agent detects an issue, reallocates the stand, notifies passengers, dispatches ground handlers, and can even direct autonomous wheelchairs to meet the arrival. These capabilities are already being tested within an industry embracing a culture of experimentation and collaboration. As systems will eventually start coordinating themselves, this will change the role of airport staff. Instead of reacting to situations, people will focus on forward planning and refining the underlying rules and policies that drive AI automation, using their real-world experience to continuously improve the system.&lt;/p&gt; 
&lt;p&gt;Manchester Airports Group developed an AI-powered digital colleague to automate workforce absence management across thousands of employees in around-the-clock airport operations, using Amazon Bedrock &lt;a href="https://aws.amazon.com/what-is/foundation-models/" target="_blank" rel="noopener"&gt;foundation models (FMs)&lt;/a&gt; and &lt;a href="https://modelcontextprotocol.io/docs/getting-started/intro" target="_blank" rel="noopener"&gt;Model Context Protocol (MCP)&lt;/a&gt; to process text and speech interactions with over 90% accuracy while maintaining compliance with employment regulations through built-in guardrails. The serverless solution automatically validates absence requests against company policies and updates rostering systems in real time, reducing operational costs and freeing HR staff to focus on complex employee relations issues rather than routine administrative tasks. This implementation demonstrates how agentic AI architectures can transform labor-intensive processes in regulated, safety-critical environments while maintaining the consistency and reliability required for airport operations.&lt;/p&gt; 
&lt;p&gt;The aviation industry is on a path towards creating resilient, efficient, and environmentally conscious airports through measured integration of AI technologies. It’s an evolution that will reimagine air travel—unlocking the efficiencies that operators need and the travel experience that passengers expect.&lt;/p&gt; 
&lt;p&gt;To learn more, read &lt;a href="https://d1.awsstatic.com/onedam/marketing-channels/website/aws/en_US/government-education/approved/AWS%20Intelligent%20Air%20Travel.pdf" target="_blank" rel="noopener"&gt;How AI and autonomous systems shape airports of the future&lt;/a&gt;. To learn about the AI-powered digital colleague, watch this &lt;a href="https://www.youtube.com/watch?v=G6UTse7QGNU" target="_blank" rel="noopener"&gt;AWS re:Invent 2025 session&lt;/a&gt;.&lt;/p&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>AWS Supply Chain solutions for nonprofit organizations</title>
		<link>https://aws.amazon.com/blogs/publicsector/aws-supply-chain-solutions-for-nonprofit-organizations/</link>
		
		<dc:creator><![CDATA[Joshua Lacy]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 16:21:08 +0000</pubDate>
				<category><![CDATA[Amazon DynamoDB]]></category>
		<category><![CDATA[Amazon Quick Sight]]></category>
		<category><![CDATA[AWS IoT Core]]></category>
		<category><![CDATA[AWS Supply Chain]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[Public Sector]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">0866f4bc7b3a96eb6eace4a57a47e06f515622f6</guid>

					<description>This blog post explores how nonprofits can use AWS Supply Chain services to gain real-time visibility into their supply chains, reduce waste, and confirm that meals are reaching their intended recipients.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30534 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/29/AWS-Supply-Chain-solutions-for-nonprofit-organizations.jpg" alt="AWS Supply Chain solutions for nonprofit organizations" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;Although millions of people worldwide face food insecurity, a hidden challenge undermines relief efforts. Nonprofit organizations often can’t track whether their meal packages actually reach those in need. Packages need to move through international borders, regional warehouses, and remote distribution centers, and organizations operate with limited visibility into their own supply chains. They struggle to answer three fundamental questions that directly impact their mission: Where are our resources right now? Who exactly is receiving our aid? And are our packages actually reaching their intended destinations, or are they being intercepted along the way?&lt;/p&gt; 
&lt;p&gt;The consequences of these visibility gaps extend far beyond operational inefficiency. Food waste increases when distribution centers receive shipments they don’t need while others run short. Resources fail to reach the most vulnerable populations when packages are diverted or intercepted. Without granular data on deliveries and recipients, organizations can’t demonstrate their impact to donors or optimize their operations to serve more people with the same resources.&lt;/p&gt; 
&lt;p&gt;Organizations such as &lt;a href="https://www.actionagainsthunger.org/" target="_blank" rel="noopener"&gt;Action Against Hunger&lt;/a&gt; have expressed the need for better control over their supply chain data to understand which packages are intercepted, who is receiving their meal packages, and whether those packages are adequate for the health needs of recipients. Similarly, &lt;a href="https://operationbbqrelief.org/" target="_blank" rel="noopener"&gt;Operation BBQ Relief&lt;/a&gt; has identified the need for real-time visibility into meal supplies across different on-ground sites to identify which locations are running out of meals and which have surplus inventory that could be redistributed elsewhere.&lt;/p&gt; 
&lt;p&gt;This post explores how nonprofits can use &lt;a href="https://aws.amazon.com/aws-supply-chain/" target="_blank" rel="noopener"&gt;AWS Supply Chain&lt;/a&gt; services to gain real-time visibility into their supply chains, reduce waste, and confirm that meals are reaching their intended recipients.&lt;/p&gt; 
&lt;h3&gt;Understanding the nonprofit supply chain problem&lt;/h3&gt; 
&lt;p&gt;Traditional supply chain management systems were designed for commercial enterprises with different priorities and resources. These systems often assume stable infrastructure, predictable demand patterns, and substantial budgets for implementation and maintenance. Nonprofits operate in a fundamentally different environment. They manage multitier distribution networks that span international shipments, regional warehouses, and local distribution points, often in areas affected by natural disasters or chronic instability. They must make real-time decisions during crisis response situations while working with severe resource constraints that limit investment in expensive proprietary systems.&lt;/p&gt; 
&lt;p&gt;The accountability requirements add another layer of complexity. Nonprofits must demonstrate impact to donors, maintain transparency with beneficiaries, and comply with regulatory requirements across multiple jurisdictions. They need to track not only the movement of goods but also the individuals and communities they serve. And they need to respect privacy while operating with limited technical infrastructure in remote or disaster-affected areas.&lt;/p&gt; 
&lt;h3&gt;AWS services for supply chain management&lt;/h3&gt; 
&lt;p&gt;&lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt; provides a comprehensive set of services that nonprofits can combine with &lt;a href="https://aws.amazon.com/partners/" target="_blank" rel="noopener"&gt;AWS Partner&lt;/a&gt; solutions to create an end-to-end supply chain management system tailored to their specific needs. Rather than implementing a one-size-fits-all commercial system, organizations can build a flexible framework that addresses their specific challenges through three key capabilities.&lt;/p&gt; 
&lt;h3&gt;Real-time inventory visibility&lt;/h3&gt; 
&lt;p&gt;Nonprofits can eliminate food waste and prevent shortages by gaining instant visibility into inventory levels across their entire distribution network. Distribution centers often operate with limited visibility into current stock levels, leading to inefficient allocation decisions and unnecessary food waste. Organizations can use &lt;a href="https://aws.amazon.com/iot-core/" target="_blank" rel="noopener"&gt;AWS IoT Core&lt;/a&gt; and &lt;a href="https://aws.amazon.com/quicksuite/quicksight/" target="_blank" rel="noopener"&gt;Amazon Quick Sight&lt;/a&gt; to create real-time inventory dashboards that provide visibility across their entire distribution network.&lt;/p&gt; 
&lt;p&gt;Organizations can deploy &lt;a href="https://aws.amazon.com/what-is/iot/" target="_blank" rel="noopener"&gt;Internet of Things (IoT&lt;/a&gt;) sensors or implement QR code scanning systems that field workers use to record when shipments arrive, when packages are distributed, and when stock levels change. This data streams to AWS IoT Core for processing and storage, creating a continuous flow of information about inventory status across the entire network.&lt;/p&gt; 
&lt;p&gt;Amazon Quick Sight transforms this raw data into actionable insights through interactive dashboards. Supply chain managers can visualize inventory levels at each location, track consumption rates to predict when reorders are needed, and identify distribution centers approaching capacity or running low on stock. The system can automatically alert managers when inventory falls below threshold levels or when packages are approaching expiration dates, enabling proactive decision-making that reduces waste and prevents shortages.&lt;/p&gt; 
&lt;h3&gt;End-to-end package tracking&lt;/h3&gt; 
&lt;p&gt;Organizations can create accountability at every step of the distribution pipeline by implementing comprehensive tracking systems using AWS services combined with mobile applications. When meal packages move through multiple handoffs with limited visibility, organizations can’t verify that deliveries reached their intended destinations or identify where interceptions occurred.&lt;/p&gt; 
&lt;p&gt;The solution begins with assigning unique identifiers to shipments and individual packages. Organizations implement these identifiers as QR codes or radio frequency identification (RFID) tags that travel with the packages throughout their journey. At each checkpoint in the distribution pipeline, field workers use mobile applications to scan packages and record their location, condition, and status. This creates a digital chain of custody that documents every handoff and movement.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://aws.amazon.com/dynamodb/" target="_blank" rel="noopener"&gt;Amazon DynamoDB&lt;/a&gt; stores the tracking data, providing fast, scalable access to package status information. Supply chain managers can query the system to see exactly where any package is located, review its complete movement history, and identify any gaps or anomalies in the expected route. Field workers can use mobile applications to record delivery information and capture recipient details, creating a complete picture of who received aid and when.&lt;/p&gt; 
&lt;p&gt;Through this end-to-end visibility, organizations can generate chain-of-custody reports that demonstrate accountability to donors and regulatory bodies. More importantly, it helps identify patterns that indicate potential interception points or process bottlenecks, allowing organizations to strengthen their distribution networks and confirm resources reach those in need.&lt;/p&gt; 
&lt;h3&gt;Impact analytics and optimization&lt;/h3&gt; 
&lt;p&gt;Organizations can transform operational data into strategic insights by building analytics capabilities using Amazon Quick Sight and AWS analytics services. Without detailed analytics on who receives aid and where bottlenecks occur, organizations can’t optimize their operations or demonstrate their impact effectively.&lt;/p&gt; 
&lt;p&gt;The analytics framework aggregates data from inventory systems, tracking applications, and delivery records to create a comprehensive view of supply chain performance. Organizations can analyze patterns in recipient demographics, delivery locations, and distribution efficiency. They can identify inefficiencies such as unnecessary distribution centers, suboptimal routes, or locations that consistently experience shortages or surpluses.&lt;/p&gt; 
&lt;p&gt;These insights enable concrete improvements. Organizations can calculate metrics on food waste reduction by comparing inventory levels with distribution patterns. They can measure the effectiveness of interception prevention efforts by analyzing gaps in the chain of custody. They can generate donor reports that show direct impact on individuals and communities, complete with demographic information and geographic distribution of aid.&lt;/p&gt; 
&lt;p&gt;Advanced analytics capabilities enable predictive modeling that forecasts demand based on historical patterns, seasonal variations, and emerging crisis situations. This means that organizations can position inventory proactively, reducing response times and supplying resources to where they’re needed most.&lt;/p&gt; 
&lt;h3&gt;Implementation considerations&lt;/h3&gt; 
&lt;p&gt;When modernizing supply chain operations, nonprofits should approach implementation thoughtfully. By starting with a pilot program at one or two distribution centers, organizations can validate the approach, identify challenges, and demonstrate value before rolling out organization wide. This incremental approach reduces risk and enables learning from early experiences.&lt;/p&gt; 
&lt;p&gt;The AWS Partner Network offers solutions designed specifically for supply chain management that can accelerate implementation and provide industry-specific functionality. These partners bring expertise in nonprofit operations and can help organizations navigate the technical and operational challenges of modernization.&lt;/p&gt; 
&lt;p&gt;Mobile-first design is critical for success. Field workers often operate in areas with limited or intermittent connectivity, so solutions must work offline and synchronize data when connectivity becomes available. This continues tracking and inventory management even in challenging environments.&lt;/p&gt; 
&lt;p&gt;Data privacy and sovereignty require careful attention when collecting recipient information. Organizations must implement appropriate safeguards to protect personal data and comply with data protection regulations across all jurisdictions where they operate. AWS provides comprehensive security and compliance capabilities, including support for 143 security standards and compliance certifications, such as &lt;a href="https://aws.amazon.com/compliance/pci-dss-level-1-faqs/" target="_blank" rel="noopener"&gt;Payment Card Industry Data Security Standard (PCI DSS)&lt;/a&gt;, &lt;a href="https://aws.amazon.com/compliance/hipaa-compliance/" target="_blank" rel="noopener"&gt;Health Insurance Portability and Accountability Act (HIPAA)&lt;/a&gt;, &lt;a href="https://www.hhs.gov/hipaa/for-professionals/special-topics/hitech-act-enforcement-interim-final-rule/index.html" target="_blank" rel="noopener"&gt;Health Information Technology for Economic and Clinical Health (HITECH)&lt;/a&gt;, &lt;a href="https://aws.amazon.com/compliance/gdpr-center/" target="_blank" rel="noopener"&gt;General Data Protection Regulation (GDPR)&lt;/a&gt;, and &lt;a href="https://aws.amazon.com/compliance/fips/" target="_blank" rel="noopener"&gt;Federal Information Processing Standard (FIPS) 140-2&lt;/a&gt;, that help organizations meet these requirements regardless of where they operate.&lt;/p&gt; 
&lt;p&gt;Finally, training and change management deserve significant investment. New tracking systems and processes represent a substantial change for field staff who might be accustomed to paper-based systems or informal tracking methods. Comprehensive training programs and ongoing support mean that staff can effectively use new tools and understand how their data entry contributes to the organization’s mission.&lt;/p&gt; 
&lt;h3&gt;Measuring success&lt;/h3&gt; 
&lt;p&gt;Organizations implementing AWS services for supply chain management should track metrics that demonstrate both operational improvements and mission impact. Operational efficiency metrics include reduction in food waste, improved inventory turnover rates, and faster response times when crises emerge. These metrics demonstrate the business value of modernization and help justify continued investment.&lt;/p&gt; 
&lt;p&gt;Accountability metrics focus on supply chain integrity. Organizations should measure the percentage of packages tracked end-to-end, the reduction in reported interceptions, and the completeness of chain-of-custody documentation. These metrics demonstrate transparency to donors and regulatory bodies.&lt;/p&gt; 
&lt;p&gt;Impact visibility metrics connect supply chain operations to mission outcomes. Organizations should track the number of individuals served with verified delivery, demographic insights on beneficiaries, and geographic distribution of aid. These metrics tell the story of organizational impact in concrete, verifiable terms.&lt;/p&gt; 
&lt;p&gt;Cost savings metrics demonstrate financial stewardship. By measuring reduced waste, optimized distribution routes, and improved resource allocation, organizations can show donors that modernization investments generate returns that enable serving more people with the same resources.&lt;/p&gt; 
&lt;h3&gt;Getting started&lt;/h3&gt; 
&lt;p&gt;Nonprofits interested in modernizing their supply chain operations can begin with a structured assessment of their current state. Documenting existing supply chain processes, identifying specific pain points, and quantifying data gaps creates a baseline for measuring improvement and helps prioritize modernization efforts.&lt;/p&gt; 
&lt;p&gt;With this assessment complete, organizations should define specific requirements for tracking, visibility, and analytics capabilities. These requirements should reflect both immediate operational needs and longer-term strategic goals for supply chain optimization and impact measurement.&lt;/p&gt; 
&lt;p&gt;Exploring AWS services for supply chain management helps organizations understand what’s possible and identify approaches that fit their specific context. Engaging with AWS account teams or the &lt;a href="https://aws.amazon.com/government-education/nonprofits/" target="_blank" rel="noopener"&gt;AWS for Nonprofits&lt;/a&gt; program provides access to expertise and resources that can accelerate the planning process. AWS for Nonprofits offers credits, training, and technical guidance specifically designed to help nonprofit organizations use cloud technology for their missions.&lt;/p&gt; 
&lt;p&gt;By planning a pilot program, organizations can validate their approach with limited risk and investment. A well-designed pilot focuses on a specific distribution center or supply chain segment, implements core capabilities, and measures results against clear success criteria. The lessons learned from this pilot inform the broader rollout strategy.&lt;/p&gt; 
&lt;h3&gt;Conclusion&lt;/h3&gt; 
&lt;p&gt;Supply chain modernization is not only about technology—it’s about helping ensure that every meal reaches someone in need. Organizations combating food insecurity deserve access to the same sophisticated tools used by commercial enterprises. AWS is committed to supporting nonprofit organizations through programs such as AWS for Nonprofits, making these capabilities accessible, scalable, and designed to grow with organizational missions.&lt;/p&gt; 
&lt;p&gt;By gaining visibility into inventory levels, tracking packages throughout the distribution pipeline, and analyzing operations to identify optimization opportunities, nonprofits can reduce waste, prevent interceptions, and serve more people with the same resources. Organizations can use the data generated by modern supply chain systems to demonstrate their impact with precision and transparency, strengthening relationships with donors and beneficiaries alike.&lt;/p&gt; 
&lt;p&gt;The path to supply chain modernization begins with a single step. Whether that step is assessing current processes, engaging with AWS to explore solutions, or launching a pilot program at one distribution center, the journey toward greater visibility, accountability, and impact is within reach for nonprofit organizations committed to combating food insecurity.&lt;/p&gt; 
&lt;p&gt;Ready to get started? To learn more about how AWS supports nonprofit organizations, visit AWS for Nonprofits. To discuss your supply chain modernization needs, contact your &lt;a href="https://aws.amazon.com/contact-us/" target="_blank" rel="noopener"&gt;AWS account team&lt;/a&gt; or the &lt;a href="https://aws.amazon.com/government-education/contact/" target="_blank" rel="noopener"&gt;AWS Public Sector team&lt;/a&gt;.&lt;/p&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>Supporting GSA CUI protection requirements with AWS</title>
		<link>https://aws.amazon.com/blogs/publicsector/supporting-gsa-cui-protection-requirements-with-aws/</link>
		
		<dc:creator><![CDATA[Paul Keastead]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 14:11:49 +0000</pubDate>
				<category><![CDATA[Amazon Athena]]></category>
		<category><![CDATA[Amazon EC2]]></category>
		<category><![CDATA[Amazon Quick Sight]]></category>
		<category><![CDATA[AWS Identity and Access Management (IAM)]]></category>
		<category><![CDATA[AWS Security Hub]]></category>
		<category><![CDATA[Public Sector]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">ea38dd8daaf7fc84fde32f96725a75412a8e0d40</guid>

					<description>In this blog, we will discuss how federal contractors handling Controlled Unclassified Information (CUI) for the General Services Administration (GSA) face a critical reality when the updated security requirements are required to maintain your contracts. The stakes extend beyond business; inadequate CUI protection compromises sensitive government operations and US national interests. The recently updated GSA IT Security Procedural Guide CIO-IT Security-21-112 Revision 1 (January 2026) aligns with NIST SP 800-171 Revision 3 and sets the bar for protecting CUI in nonfederal systems. Learn how Amazon Web Services (AWS) provides security services specifically designed to help you address these requirements efficiently.</description>
										<content:encoded>&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/30/Supporting-GSA-CUI-protection-requirements-with-AWS.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30538 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/30/Supporting-GSA-CUI-protection-requirements-with-AWS.png" alt="Supporting GSA CUI protection requirements with AWS" width="1152" height="576"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Federal contractors handling Controlled Unclassified Information (CUI) for the General Services Administration (GSA) face a critical reality when the updated security requirements are required to maintain your contracts. The stakes extend beyond business; inadequate CUI protection compromises sensitive government operations and US national interests. The recently updated &lt;a href="https://www.gsa.gov/system/files/Protecting-Controlled-Unclassified-Information-%28CUI%29-in-Nonfederal-Systems-and-Organizations-Process-%5BCIO-IT-Security-21-112-Rev-1%5D.pdf" target="_blank" rel="noopener"&gt;GSA IT Security Procedural Guide CIO-IT Security-21-112 Revision 1&lt;/a&gt; (January 2026) aligns with &lt;a href="https://csrc.nist.gov/publications/detail/sp/800-171/rev-3/final" target="_blank" rel="noopener"&gt;NIST SP 800-171 Revision 3&lt;/a&gt; and sets the bar for protecting CUI in nonfederal systems.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt; provides security services specifically designed to help you address these requirements efficiently. This compliance guide for federal contractors, GSA vendors, compliance officers, and cloud architects responsible for implementing CUI protection controls shows you how.&lt;/p&gt; 
&lt;h3&gt;Understanding the GSA CUI protection framework&lt;/h3&gt; 
&lt;p&gt;The GSA CUI protection framework represents a comprehensive approach to safeguarding sensitive but unclassified government information throughout its lifecycle. Federal contractors must understand both the regulatory foundation and the specific technical controls required to support compliance. This framework builds upon decades of federal information security policy while adapting to modern cloud computing environments and emerging threats.&lt;/p&gt; 
&lt;p&gt;The regulatory landscape for CUI protection rests on several key authorities that work together to create a unified security posture:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://obamawhitehouse.archives.gov/the-press-office/2010/11/04/executive-order-13556-controlled-unclassified-information" target="_blank" rel="noopener"&gt;Executive Order 13556&lt;/a&gt; establishes the foundational CUI program and designates National Archives and Records Administration (NARA) as the executive agent&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.ecfr.gov/current/title-32/subtitle-B/chapter-XX/part-2002" target="_blank" rel="noopener"&gt;32 CFR Part 2002&lt;/a&gt; provides the implementing regulations for the CUI program across federal agencies&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://csrc.nist.gov/pubs/sp/800/171/r3/final" target="_blank" rel="noopener"&gt;NIST SP 800-171 Rev 3&lt;/a&gt; defines the 97 core security requirements for protecting CUI in nonfederal systems&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.gsa.gov/system/files/Protecting-Controlled-Unclassified-Information-%28CUI%29-in-Nonfederal-Systems-and-Organizations-Process-%5BCIO-IT-Security-21-112-Rev-1%5D.pdf" target="_blank" rel="noopener"&gt;GSA CIO-IT Security-21-112 Rev 1&lt;/a&gt; tailors these requirements specifically for GSA contractors and vendors&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.acquisition.gov/dfars/252.204-7012-safeguarding-covered-defense-information-and-cyber-incident-reporting." target="_blank" rel="noopener"&gt;DFARS 252.204-7012&lt;/a&gt; mandates CUI protection requirements for Department of Defense contractors&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Understanding the specific CUI categories you handle is essential for implementing appropriate controls. The &lt;a href="https://www.archives.gov/cui/registry/category-list" target="_blank" rel="noopener"&gt;CUI Registry&lt;/a&gt; maintains the authoritative list of CUI categories and subcategories, each with specific handling requirements. Common categories GSA contractors encounter include:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://www.archives.gov/cui/registry/category-detail/procurement-acquisition" target="_blank" rel="noopener"&gt;Procurement and acquisition information&lt;/a&gt; – Includes source selection data, contractor proposals, and pre-decisional procurement documents that could provide unfair competitive advantage if disclosed&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.archives.gov/cui/registry/category-detail/privacy-info" target="_blank" rel="noopener"&gt;Privacy information&lt;/a&gt; – Personally identifiable information (PII) collected or maintained by GSA, including employee records, contractor personnel data, and citizen information from government services&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.archives.gov/cui/registry/category-detail/info-systems-vulnerability-info" target="_blank" rel="noopener"&gt;Information systems information&lt;/a&gt; – System architecture documentation, security plans, and technical specifications that could reveal vulnerabilities if compromised&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://www.archives.gov/cui/registry/category-detail/protected-critical-infrastructure-information" target="_blank" rel="noopener"&gt;Critical infrastructure security information&lt;/a&gt; – Details about government facilities, IT systems, and operational technologies that support essential government functions&lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;AWS services mapped to GSA requirements&lt;/h3&gt; 
&lt;p&gt;The following sections demonstrate how specific AWS services support GSA CUI protection requirements. Each control area maps to built-in AWS capabilities that federal contractors can implement to support compliance while maintaining operational efficiency. Rather than requiring custom-built solutions or extensive third-party tools, AWS provides purpose-built services that align with NIST SP 800-171 Rev 3 controls. The implementation examples include both &lt;a href="https://aws.amazon.com/what-is/iac/" target="_blank" rel="noopener"&gt;infrastructure as code (IaC)&lt;/a&gt; templates and verification scripts to help you operationalize these controls in your environment. By understanding these mappings, you can design compliant architectures from the ground up and demonstrate security control implementation during GSA audits and assessments.&lt;/p&gt; 
&lt;h3&gt;Access control&lt;/h3&gt; 
&lt;p&gt;To enforce approved authorizations for logical access to CUI system resources and establish managed remote access, &lt;a href="https://aws.amazon.com/iam/" target="_blank" rel="noopener"&gt;AWS Identity and Access Management (IAM)&lt;/a&gt; provides access control capabilities including granular permissions, IAM roles for cross-account access, IAM groups for organizing users, permission boundaries, and service control policies (SCPs) for organization-wide controls.&lt;/p&gt; 
&lt;p&gt;Use &lt;a href="https://aws.amazon.com/iam/access-analyzer/" target="_blank" rel="noopener"&gt;IAM Access Analyzer&lt;/a&gt; to identify unintended access. Implement &lt;a href="https://aws.amazon.com/organizations/" target="_blank" rel="noopener"&gt;AWS Organizations&lt;/a&gt; with SCPs for multi-account governance. For secure remote access, &lt;a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html" target="_blank" rel="noopener"&gt;Session Manager, a capability of AWS Systems Manager&lt;/a&gt;, provides audit logging and IAM integration without requiring open inbound ports. &lt;a href="https://aws.amazon.com/vpc/" target="_blank" rel="noopener"&gt;Amazon Virtual Private Cloud (Amazon VPC)&lt;/a&gt; supports network segmentation with tiered subnets for different security zones.&lt;/p&gt; 
&lt;p&gt;The following Terraform configuration demonstrates how to establish network segmentation for CUI workloads by creating an isolated virtual private cloud (VPC) with dedicated subnets that enforce logical separation between security zones:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-json"&gt;# Terraform example for network segmentation
resource "aws_vpc" "cui_vpc" {
  cidr_block           = "[IP_ADDRESS]"
  enable_dns_hostnames = true
  enable_dns_support   = true
  
  tags = {
    Name        = "CUI-Production-VPC"
    Environment = "Production"
    Compliance  = "GSA-CUI"
  }
}

resource "aws_subnet" "private_cui" {
  vpc_id            = aws_vpc.cui_vpc.id
  cidr_block        = "10.0.10.0/24"
  availability_zone = "us-east-1a"
  
  tags = {
    Name     = "CUI-Data-Subnet"
    DataType = "CUI"
  }
}
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;h3&gt;Multi-factor authentication&lt;/h3&gt; 
&lt;p&gt;To implement multi-factor authentication (MFA) for access to privileged and non-privileged accounts, &lt;a href="https://aws.amazon.com/iam/identity-center/" target="_blank" rel="noopener"&gt;AWS IAM Identity Center&lt;/a&gt; provides centralized identity management with built-in MFA support and integration with corporate identity providers. For application-level MFA, &lt;a href="https://aws.amazon.com/cognito/" target="_blank" rel="noopener"&gt;Amazon Cognito&lt;/a&gt; offers user pools with MFA enforcement and adaptive authentication.&lt;/p&gt; 
&lt;p&gt;There are several MFA methods with varying levels of assurance. Hardware time-based one-time password (TOTP) tokens represent the preferred method due to their resistance to phishing and interception attacks. Mobile authenticator applications using TOTP algorithms (such as Authy) and Fast Identity Online 2 (FIDO2) security keys with Web Authentication (WebAuthn) compatibility are also approved for production use. However, Short Message Service (SMS) one-time password (OTP) methods face restrictions due to their vulnerability to SIM-swapping and interception attacks, and email-based OTP isn’t recommended because it lacks phishing resistance.&lt;/p&gt; 
&lt;p&gt;To verify ongoing MFA compliance across your IAM user base, use the following Python script, which audits IAM users and identifies accounts lacking MFA device enrollment:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-json"&gt;# Verify MFA compliance across IAM users
import boto3

def verify_mfa_enabled():
    iam = boto3.client('iam')
    users = iam.list_users()['Users']
    non_compliant_users = []
    
    for user in users:
        mfa_devices = iam.list_mfa_devices(
            UserName=user['UserName']
        )
        if not mfa_devices['MFADevices']:
            non_compliant_users.append(user['UserName'])
    
    return non_compliant_users
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;h3&gt;Vulnerability monitoring and scanning&lt;/h3&gt; 
&lt;p&gt;The GSA requires that you monitor and scan for vulnerabilities periodically and remediate within defined timeframes. &lt;a href="https://aws.amazon.com/inspector/" target="_blank" rel="noopener"&gt;Amazon Inspector&lt;/a&gt; provides automated vulnerability scanning for &lt;a href="https://aws.amazon.com/ec2/" target="_blank" rel="noopener"&gt;Amazon Elastic Compute Cloud (Amazon EC2)&lt;/a&gt; and container workloads with Common Vulnerability Scoring System (CVSS) scoring. &lt;a href="https://aws.amazon.com/security-hub/" target="_blank" rel="noopener"&gt;AWS Security Hub&lt;/a&gt; aggregates security findings with automated compliance checks and integration with AWS and partner services. For containers, &lt;a href="https://aws.amazon.com/ecr/" target="_blank" rel="noopener"&gt;Amazon Elastic Container Registry (Amazon ECR)&lt;/a&gt; provides scan-on-push capability and &lt;a href="https://www.cve.org/" target="_blank" rel="noopener"&gt;CVE&lt;/a&gt; database updates.&lt;/p&gt; 
&lt;p&gt;The following table illustrates GSA remediation timeframes.&lt;/p&gt; 
&lt;table border="3"&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Critical (internet-facing)&lt;/td&gt; 
   &lt;td&gt;15 days&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Critical or high&lt;/td&gt; 
   &lt;td&gt;30 days&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Moderate&lt;/td&gt; 
   &lt;td&gt;90 days&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Low&lt;/td&gt; 
   &lt;td&gt;180 days&lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;The following &lt;a href="https://aws.amazon.com/cloudformation/" target="_blank" rel="noopener"&gt;AWS CloudFormation&lt;/a&gt; template creates a custom &lt;a href="https://aws.amazon.com/config/" target="_blank" rel="noopener"&gt;AWS Config&lt;/a&gt; rule that triggers noncompliance alerts when critical vulnerabilities exceed 15 days or when high-severity findings exceed 30 days without remediation:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-json"&gt;# AWS Config Rule for vulnerability compliance
AWSTemplateFormatVersion: '2010-09-09'
Resources:
  VulnerabilityComplianceRule:
    Type: AWS::Config::ConfigRule
    Properties:
      ConfigRuleName: inspector-findings-compliance
      Description: Monitor critical vulnerabilities
      Source:
        Owner: AWS
        SourceIdentifier: INSPECTOR_FINDINGS_ACTIVE
      InputParameters:
        criticalThreshold: 15
        highThreshold: 30

&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;h3&gt;Boundary protection&lt;/h3&gt; 
&lt;p&gt;The GSA requires that you monitor and control communications at external and key internal interfaces. &lt;a href="https://aws.amazon.com/network-firewall/" target="_blank" rel="noopener"&gt;AWS Network Firewall&lt;/a&gt; provides stateful inspection, intrusion detection and prevention, and domain filtering. &lt;a href="https://aws.amazon.com/waf/" target="_blank" rel="noopener"&gt;AWS WAF&lt;/a&gt; includes &lt;a href="https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups.html" target="_blank" rel="noopener"&gt;AWS Managed Rules&lt;/a&gt;, rate-based rules for distributed denial of service (DDoS) mitigation, and custom rules. A defense-in-depth approach uses network access control lists (network ACLs) for subnet-level filtering, security groups for instance-level access control, and &lt;a href="https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html" target="_blank" rel="noopener"&gt;VPC Flow Logs&lt;/a&gt; for traffic monitoring.&lt;/p&gt; 
&lt;p&gt;The recommended architecture is for internet traffic to flow through AWS WAF, to the Application Load Balancer, through AWS Network Firewall, to application servers, and finally to the CUI database in &lt;a href="https://aws.amazon.com/rds/" target="_blank" rel="noopener"&gt;Amazon Relational Database Service (Amazon RDS)&lt;/a&gt; in the data subnet.&lt;/p&gt; 
&lt;h3&gt;Transmission and storage confidentiality&lt;/h3&gt; 
&lt;p&gt;The GSA requires that you implement cryptographic mechanisms to prevent unauthorized disclosure during transmission and storage.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://aws.amazon.com/kms/" target="_blank" rel="noopener"&gt;AWS Key Management Service (AWS KMS)&lt;/a&gt; provides FIPS 140-2 validated cryptographic modules, customer managed keys, automatic key rotation, and cross-account key sharing. &lt;a href="https://aws.amazon.com/certificate-manager/" target="_blank" rel="noopener"&gt;AWS Certificate Manager (ACM)&lt;/a&gt; provides SSL/TLS certificates with automatic renewal. &lt;a href="https://aws.amazon.com/s3/" target="_blank" rel="noopener"&gt;Amazon Simple Storage Service (Amazon S3)&lt;/a&gt; supports server-side encryption with AWS KMS keys (SSE-KMS). Amazon RDS provides encryption at rest using AWS KMS and SSL/TLS for data in transit.&lt;/p&gt; 
&lt;p&gt;The following table illustrates encryption requirements.&lt;/p&gt; 
&lt;table border="3"&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;td&gt;At rest&lt;/td&gt; 
   &lt;td&gt;Amazon S3, Amazon EBS, Amazon RDS&lt;/td&gt; 
   &lt;td&gt;AES-256 with AWS KMS&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;In transit (external)&lt;/td&gt; 
   &lt;td&gt;In transit (external)&lt;br&gt; ALB, CloudFront&lt;/td&gt; 
   &lt;td&gt;TLS 1.2+&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;In transit (internal)&lt;/td&gt; 
   &lt;td&gt;Amazon VPC&lt;/td&gt; 
   &lt;td&gt;TLS 1.2+ or VPN&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Database&lt;/td&gt; 
   &lt;td&gt;Amazon RDS, Amazon DynamoDB&lt;/td&gt; 
   &lt;td&gt;AWS KMS and SSL&lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;h3&gt;Flaw remediation&lt;/h3&gt; 
&lt;p&gt;The GSA requires that you identify, report, and correct system flaws and install security-relevant updates within defined timeframes. &lt;a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/patch-manager.html" target="_blank" rel="noopener"&gt;Patch Manager, a capability of AWS Systems Manager&lt;/a&gt; provides automated patching with customizable patch baselines, scheduled maintenance windows, and compliance reporting.&lt;/p&gt; 
&lt;p&gt;The following CloudFormation template establishes a weekly patching schedule that runs every Sunday at 2 AM, providing a 4-hour maintenance window with automatic approval for critical security patches:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-json"&gt;# Patch Manager Maintenance Window
Resources:
  PatchMaintenanceWindow:
    Type: AWS::SSM::MaintenanceWindow
    Properties:
      Name: CUI-System-Patching
      Schedule: cron(0 2 ? * SUN *)
      Duration: 4
      Cutoff: 1
      
  PatchBaseline:
    Type: AWS::SSM::PatchBaseline
    Properties:
      Name: CUI-Critical-Security-Patches
      OperatingSystem: AMAZON_LINUX_2
      ApprovalRules:
        PatchRules:
          - ApproveAfterDays: 0
            ComplianceLevel: CRITICAL
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;a href="https://aws.amazon.com/lambda/" target="_blank" rel="noopener"&gt;AWS Lambda&lt;/a&gt; functions can automate remediation by triggering patch installations through Systems Manager.&lt;/p&gt; 
&lt;h3&gt;Unsupported system components&lt;/h3&gt; 
&lt;p&gt;The GSA requires that you replace system components when support is no longer available. AWS Config rules can detect end-of-life (EOL) software by evaluating instances against an EOL database and initiating remediation. &lt;a href="https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-inventory.html" target="_blank" rel="noopener"&gt;AWS Systems Manager Inventory&lt;/a&gt; tracks installed software versions with integration to AWS Config for compliance monitoring.&lt;/p&gt; 
&lt;h3&gt;Continuous monitoring with AWS&lt;/h3&gt; 
&lt;p&gt;GSA requires quarterly, annual, and triennial deliverables. AWS services can help automate reporting.&lt;/p&gt; 
&lt;p&gt;For quarterly deliverables, you can use vulnerability scanning reports such as Amazon Inspector findings exported to Amazon S3, AWS Security Hub reports, and AWS Config compliance snapshots. For plan of action and milestones (POA&amp;amp;M) updates, integrate with &lt;a href="https://aws.amazon.com/servicecatalog/" target="_blank" rel="noopener"&gt;AWS Service Catalog&lt;/a&gt; for tracking and custom dashboards in &lt;a href="https://aws.amazon.com/quicksight/" target="_blank" rel="noopener"&gt;Amazon Quick Sight&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;You can build an automated compliance dashboard using a three-layer architecture: AWS Security Hub, AWS Config, Amazon Inspector, and AWS CloudTrail feed data into Amazon S3; &lt;a href="https://aws.amazon.com/athena/" target="_blank" rel="noopener"&gt;Amazon Athena&lt;/a&gt; queries the structured data; and Amazon Quick Sight visualizes compliance status.&lt;/p&gt; 
&lt;p&gt;Implement these steps to enable continuous monitoring:&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;1. Enable Security Hub&lt;/strong&gt; with the NIST 800-171 standard to aggregate findings from AWS Config, Amazon Inspector, and IAM Access Analyzer.&lt;br&gt; 2. &lt;strong&gt;Configure daily exports&lt;/strong&gt; from Security Hub and AWS Config to Amazon S3 with date-based partitioning.&lt;br&gt; 3. &lt;strong&gt;Create Athena tables&lt;/strong&gt; mapped to your Amazon S3 structure with calculated fields linking findings to NIST 800-171 control families.&lt;br&gt; 4. &lt;strong&gt;Build Quick Sight dashboards&lt;/strong&gt; showing:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Overall compliance score and trends&lt;/li&gt; 
 &lt;li&gt;Control family status with drill-down capability&lt;/li&gt; 
 &lt;li&gt;Vulnerability remediation tracker against GSA deadlines&lt;/li&gt; 
 &lt;li&gt;POA&amp;amp;M progress with responsible parties&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;5.&lt;strong&gt; Schedule quarterly reports&lt;/strong&gt; using Quick Sight email with PDF exports for GSA.&lt;br&gt; The following Athena query demonstrates how to calculate monthly compliance percentages by NIST 800-171 control, identifying which controls require immediate attention based on their failure rates:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-json"&gt;# Sample Athena Query
SELECT
    DATE_TRUNC('month', updatedat) AS report_month,
    compliance_control_id,
    compliance_control_title,
    COUNT(DISTINCT finding_id) AS total_findings,
    ROUND(100.0 * SUM(CASE WHEN compliance_status = 'PASSED' THEN 1 ELSE 0 END) / COUNT(*), 2) AS compliance_percentage
FROM security_hub_findings
WHERE standard_name = 'NIST-800-171'
    AND updatedat &amp;gt;= DATE_ADD('month', -3, CURRENT_DATE)
GROUP BY 1, 2, 3
ORDER BY compliance_percentage ASC;
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;h3&gt;Conclusion&lt;/h3&gt; 
&lt;p&gt;Implementing GSA CUI protection requirements can feel overwhelming, but breaking the process into discrete phases makes it manageable. Start with foundational identity and governance controls, then layer on network security, data protection, and vulnerability management capabilities. Each phase builds upon the previous one, creating defense in depth for your CUI workloads. Complete the documentation phase in parallel as you implement technical controls.&lt;/p&gt; 
&lt;p&gt;GSA’s updated CUI protection requirements aren’t optional; they’re the gateway to maintaining your federal contracting business and fulfilling your responsibility to protect sensitive government operations. Organizations that fail to implement these controls risk contract termination and compromise critical government functions.&lt;/p&gt; 
&lt;p&gt;AWS provides the security services, proven infrastructure, and compliance expertise you need to address these requirements. From IAM and Security Hub to Amazon Inspector and AWS KMS, AWS offers purpose-built capabilities that federal contractors trust to protect their most sensitive workloads. With comprehensive AWS &lt;a href="https://aws.amazon.com/compliance/programs/" target="_blank" rel="noopener"&gt;compliance programs&lt;/a&gt;, you’re building on a foundation designed for government security requirements.&lt;/p&gt; 
&lt;p&gt;The GSA guidance is in effect. Explore &lt;a href="https://aws.amazon.com/artifact/" target="_blank" rel="noopener"&gt;AWS Artifact&lt;/a&gt; for compliance documentation, and engage with &lt;a href="https://aws.amazon.com/security-assurance-services/" target="_blank" rel="noopener"&gt;AWS security specialists&lt;/a&gt; who understand federal requirements.&lt;/p&gt; 
&lt;h3&gt;Next steps&lt;/h3&gt; 
&lt;p&gt;To learn more about NIST 800-171 and AWS compliance capabilities, explore these resources:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/security-assurance-services/" target="_blank" rel="noopener"&gt;Contact AWS Security Assurance Services&lt;/a&gt; – Speak to a trusted advisor regarding GSA CUI protection requirements&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/financial-services/security-compliance/compliance-center/" target="_blank" rel="noopener"&gt;AWS Compliance Center&lt;/a&gt; – Access AWS compliance reports and certifications through AWS Artifact&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/framework/security.html" target="_blank" rel="noopener"&gt;AWS Well-Architected Framework: Security pillar&lt;/a&gt; – Review security best practices on AWS&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://docs.aws.amazon.com/config/latest/developerguide/operational-best-practices-for-nist_800-171.html" target="_blank" rel="noopener"&gt;Operational Best Practices for NIST 800 171&lt;/a&gt; – Sample mapping between the NIST 800-171 and AWS managed Config rules&lt;/li&gt; 
&lt;/ul&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>Advancing the defense system lifecycle with digital engineering on AWS</title>
		<link>https://aws.amazon.com/blogs/publicsector/advancing-the-defense-system-lifecycle-with-digital-engineering-on-aws/</link>
		
		<dc:creator><![CDATA[Jenifer Wang]]></dc:creator>
		<pubDate>Thu, 26 Mar 2026 18:07:46 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[AWS Direct Connect]]></category>
		<category><![CDATA[AWS Directory Service]]></category>
		<category><![CDATA[AWS GovCloud (US)]]></category>
		<category><![CDATA[AWS Identity and Access Management (IAM)]]></category>
		<category><![CDATA[AWS License Manager]]></category>
		<category><![CDATA[Public Sector]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">adddb03163a744ab1a540d469673ee057272459d</guid>

					<description>AWS provides infrastructure that enables mission and program teams to build and manage their own digital engineering environments with secure, scalable computing resources and tools. This resource supplier relationship delivers value through cost efficiency, simplified management, reliable failover, and streamlined infrastructure operations. In this post, we provide a detailed walkthrough for building a secure and scalable digital engineering environment on AWS.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30517 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/26/Advancing-the-defense-system-lifecycle-with-digital-engineering-on-AWS-2.png" alt="Advancing the defense system lifecycle with digital engineering on AWS" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;Please note that the following post is intended for informational purposes only. The approach detailed below may not be suitable for all organizations and/or compliance programs. It is important to evaluate this potential solution against the compliance needs of your organization and any applicable regulatory obligations you may have.&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;The United States (US) Department of War (DoW) is embarking on a transformative journey through &lt;a href="https://aws.amazon.com/blogs/industries/understanding-digital-engineering-and-how-it-drives-business-value/" target="_blank" rel="noopener"&gt;digital engineering&lt;/a&gt;. Their aim is to improve decision-making, accelerate delivery, and enhance collaboration throughout a system’s lifecycle. To implement this approach, they are working with &lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt;, which provides secure, &lt;a href="https://aws.amazon.com/what-is/hpc/" target="_blank" rel="noopener"&gt;high performance computing (HPC)&lt;/a&gt;, scalable storage, and advanced networking to support modeling, simulation, and the computational demands of digital engineering at scale. AWS offers specialized HPC instances, petabyte-scale storage, and low-latency networking to run complex simulations, iterate on digital models, and maintain authoritative sources of truth throughout a system’s lifecycle.&lt;/p&gt; 
&lt;p&gt;The DoW &lt;a href="https://ac.cto.mil/wp-content/uploads/2019/06/USA001603-18-DSD.pdf" target="_blank" rel="noopener"&gt;Digital Engineering Strategy&lt;/a&gt; defines digital engineering as “an integrated digital approach that uses authoritative sources of system data and models as a continuum across disciplines to support lifecycle activities from concept through disposal.” Digital engineering modernizes traditional engineering by using three foundational technologies: model-based systems engineering (MBSE), digital threads, and &lt;a href="https://aws.amazon.com/solutions/guidance/digital-twin-framework-on-aws/?did=sl_card&amp;amp;trk=sl_card" target="_blank" rel="noopener"&gt;digital twins&lt;/a&gt;. These technologies create a single source of truth across all functional disciplines. The field is now extended to incorporate &lt;a href="https://aws.amazon.com/training/learn-about/machine-learning/" target="_blank" rel="noopener"&gt;artificial intelligence and machine learning (AI/ML)&lt;/a&gt;, data analytics, and augmented reality (AR) and virtual reality (VR), all linked through digital threads. This integrated approach delivers a comprehensive mission and program solution built on consistent source systems and data, eliminating fragmented, siloed implementations that hinder enterprise-wide scalability and interoperability.&lt;/p&gt; 
&lt;p&gt;AWS provides infrastructure that enables mission and program teams to build and manage their own digital engineering environments with secure, scalable computing resources and tools. This resource supplier relationship delivers value through cost efficiency, simplified management, reliable failover, and streamlined infrastructure operations. With AWS, organizations can rapidly validate MBSE models, build and maintain digital twins, and connect data through a unified digital thread across the entire program lifecycle. These capabilities accelerate system delivery to the field while &lt;a href="https://aws.amazon.com/blogs/industries/why-digital-engineering-requires-a-cloud-transformation/" target="_blank" rel="noopener"&gt;reducing total lifecycle costs&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;In this post, we provide a detailed walkthrough for building a secure and scalable digital engineering environment on AWS.&lt;/p&gt; 
&lt;h3&gt;Solution overview&lt;/h3&gt; 
&lt;p&gt;The reference architecture for our digital engineering solution presents a comprehensive cloud infrastructure designed for workloads with robust security and networking requirements. The architecture is organized into several key accounts and virtual private clouds (VPCs), each serving specific functions. It incorporates security best practices through multiple layers of network segmentation, dedicated security services, and separate accounts for different functions. The solution architecture shown in the following diagram provides the blueprint for our entire implementation approach. The diagram shows some enterprise shared services tools (directory services, single sign-on, collaboration tools, license servers, and package and container repositories) in the shared services account, network security capabilities including next-generation firewall and intrusion detection and prevention systems in the network account, and virtual desktop infrastructure for modeling, computational analysis, and simulation software in the end users and desktops account, and digital engineering workloads requiring parallel clustering, HPC, and AI/ML and analytics in the digital engineering workload account.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/23/Figure1_Blog-Architecture-Blog-IL4_IL5-LZA-1.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30495 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/23/Figure1_Blog-Architecture-Blog-IL4_IL5-LZA-1.jpg" alt="Architecture diagram for baseline infrastructure for digital engineering on AWS GovCloud (US). The architecture is detailed in the text." width="1545" height="1141"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 1: Baseline infrastructure for digital engineering on AWS GovCloud (US)&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;To help defense and regulated organizations successfully implement this architecture, we’ve developed a methodical approach that breaks down the implementation into three strategic phases. Each phase builds upon the previous one, ensuring a robust and compliant foundation while progressively adding digital engineering capabilities:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;Building a foundational blueprint&lt;/li&gt; 
 &lt;li&gt;Extending the blueprint for digital engineering&lt;/li&gt; 
 &lt;li&gt;Tailoring the blueprint for mission outcomes&lt;/li&gt; 
&lt;/ol&gt; 
&lt;h3&gt;Building a foundational blueprint&lt;/h3&gt; 
&lt;p&gt;AWS workloads for DoW customers require appropriate security authorization and compliance certification. AWS GovCloud (US) integrate security from the ground up, providing controls and services that protect sensitive workloads at scale with minimal operational overhead. Through our extensive experience hosting the DoW workload, we’ve developed proven architectures and solutions to accelerate customer adoption journey.&lt;/p&gt; 
&lt;p&gt;The &lt;a href="https://aws.amazon.com/solutions/implementations/landing-zone-accelerator-on-aws/" target="_blank" rel="noopener"&gt;Landing Zone Accelerator (LZA)&lt;/a&gt; is a pre-built and widely adopted AWS solution for managing and governing multi-account environments with highly regulated workloads and complex compliance requirements. The LZA provides the foundation to support MBSE, digital threads, and digital twins. Our approach uses the &lt;a href="https://docs.aws.amazon.com/prescriptive-guidance/latest/secure-architecture-dod/introduction.html" target="_blank" rel="noopener"&gt;AWS Prescriptive Guidance: Secure Cloud Computing Architecture (SCCA) on AWS for US Department of Defense&lt;/a&gt; as the foundation for creating an Impact Level 4 (IL4) and Impact Level (IL5) compliant cloud infrastructure.&lt;/p&gt; 
&lt;p&gt;Let’s walk through the key components of this foundational architecture:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;&lt;a href="https://docs.aws.amazon.com/glossary/latest/reference/glos-chap.html#region" target="_blank" rel="noopener"&gt;AWS GovCloud (US) Regions&lt;/a&gt; fulfill the US government’s specific regulatory and compliance requirements.&lt;/li&gt; 
 &lt;li&gt;Direct connectivity to the on-premises networks is achieved through &lt;a href="https://aws.amazon.com/directconnect/" target="_blank" rel="noopener"&gt;AWS Direct Connect&lt;/a&gt; and virtual private gateway associations.&lt;/li&gt; 
 &lt;li&gt;The management account is the privileged account providing AWS administrative and organizational tools such as &lt;a href="https://aws.amazon.com/organizations/" target="_blank" rel="noopener"&gt;AWS Organizations&lt;/a&gt;.&lt;/li&gt; 
 &lt;li&gt;The audit account features centralized security and compliance monitoring tools.&lt;/li&gt; 
 &lt;li&gt;The log archive provides immutable storage for centralized log aggregation. AWS delivers the underlying storage infrastructure with strong durability and retention capabilities.&lt;/li&gt; 
 &lt;li&gt;The network account consists of security and network services providing network perimeter protection while using &lt;a href="https://aws.amazon.com/transit-gateway/" target="_blank" rel="noopener"&gt;AWS Transit Gateway&lt;/a&gt;, which acts as a hub to control network routing.&lt;/li&gt; 
 &lt;li&gt;The shared services account serves your enterprise identity management, licensing, software package management, container repositories, collaboration tools, and more.&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p&gt;This architecture is shown in the following diagram.&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/16/Figure2_Blog-Architecture-Blog-IL4_IL5-LZA-2.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30434 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/16/Figure2_Blog-Architecture-Blog-IL4_IL5-LZA-2.jpg" alt="Diagram for secure cloud computing architecture on AWS for the department of defense. The architecture is explained in detail in the text." width="1164" height="811"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 2: SCCA for US DoD reference architecture on AWS&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;With this secure, compliant foundation established, we can now extend the architecture with specialized capabilities tailored specifically for digital engineering workloads.&lt;/p&gt; 
&lt;h3&gt;Extending the blueprint for digital engineering&lt;/h3&gt; 
&lt;p&gt;With the secure SCCA foundation in place, we now add three specialized accounts essential for a complete digital engineering environment:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Shared services account – Extending to include data and model repositories&lt;/li&gt; 
 &lt;li&gt;End users account – Delivers virtual desktop experiences&lt;/li&gt; 
 &lt;li&gt;Digital engineering workload account – Hosts modeling and simulation environments&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The account separation by function is critical because it enforces least privilege access, isolates workload risks from infrastructure services, and enables independent scaling and compliance controls for each function.&lt;/p&gt; 
&lt;h3&gt;Shared services account&lt;/h3&gt; 
&lt;p&gt;The shared services account plays a crucial role in streamlining operations and maintaining consistency across an organization’s AWS infrastructure while providing the flexibility of extending their existing infrastructures and investment.&lt;/p&gt; 
&lt;p&gt;This centralized hub offers three types of tools:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;&lt;strong&gt;Collaboration&lt;/strong&gt; – Enterprise engineering and product teams require integrated suites of tools for efficient collaboration, including source code repositories, container registries, product lifecycle management systems, and model repositories—all deployed following guidance for &lt;a href="https://aws.amazon.com/solutions/guidance/enabling-secure-collaboration-on-aws/" target="_blank" rel="noopener"&gt;secure collaboration on AWS&lt;/a&gt;. These tools are deployed on AWS compute and managed service resources, providing scalability and reliability.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;License management&lt;/strong&gt; – Managing software licenses across multiple departments, projects, and accounts can be a complex and costly challenge. &lt;a href="https://aws.amazon.com/license-manager/" target="_blank" rel="noopener"&gt;AWS License Manager&lt;/a&gt; helps organizations manage software licenses in AWS and on-premises environments, reducing the risk of noncompliance and fine-tuning costs. For vendor-specific licensing needs, enterprises can also consider third-party solutions to complement their license management strategy.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Identity and access management&lt;/strong&gt; – The shared services account centralizes &lt;a href="https://aws.amazon.com/iam/" target="_blank" rel="noopener"&gt;AWS Identity and Access Management (IAM)&lt;/a&gt; for AWS resources and supports integration with corporate identity providers. Organizations can use their existing Active Directory, Lightweight Directory Access Protocol (LDAP) services, or &lt;a href="https://aws.amazon.com/directoryservice/" target="_blank" rel="noopener"&gt;AWS Directory Service&lt;/a&gt; for user authentication. This centralized approach provides consistent access control across the AWS environment.&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p&gt;The following figure illustrates the detailed architecture for the shared services account.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/16/Figure3_Blog-Architecture-Shared-Services-Account.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30433 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/16/Figure3_Blog-Architecture-Shared-Services-Account.jpg" alt="Diagram of the architecture for the shared services account. The account architecture is explained in the text." width="851" height="522"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 3: Shared services account for collaboration&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;End users account&lt;/h3&gt; 
&lt;p&gt;The end users account provides &lt;a href="https://aws.amazon.com/what-is/vdi/" target="_blank" rel="noopener"&gt;virtual desktop infrastructure (VDI)&lt;/a&gt; that delivers role-based secure access to digital engineering tools and resources. With VDI, users can access powerful computing resources and specialized applications from any location while maintaining strict security controls. With account separation, VDI resources connect securely to cross-account services such as the shared services account without giving users direct access to the underlying infrastructure.&lt;/p&gt; 
&lt;p&gt;The end users account provides two virtual desktop capabilities&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/workspaces/" target="_blank" rel="noopener"&gt;Amazon WorkSpaces&lt;/a&gt; provides fully managed virtual desktop solutions, including application streaming so users can access applications through a web browser, and Desktop as a Service (DaaS) for provisioning virtual Windows or Amazon Linux desktops—all without managing complex on-premises VDI infrastructure.&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://docs.aws.amazon.com/res/latest/ug/overview.html" target="_blank" rel="noopener"&gt;Research and Engineering Studio (RES)&lt;/a&gt; orchestrates secure virtual desktop environments through a seamless web portal where users can access Windows and Linux desktops for scientific research, product design, engineering simulations, and data analysis using their existing corporate credentials.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The following diagram illustrates the detailed architecture for the end users account.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/22/Figure4_Blog-Architecture-Desktop-Account-1.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30465 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/22/Figure4_Blog-Architecture-Desktop-Account-1.jpg" alt="Architecture diagram for end users account. The architecture is detailed in the text." width="551" height="287"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 4: End users account for virtual desktop experiences&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Digital engineering workload account&lt;/h3&gt; 
&lt;p&gt;The digital engineering workload account functions as the dedicated environment for transforming physical systems into virtual models. This account provides digital engineering capabilities to optimize design and enhance decision-making, using integrated data architecture to support engineering, logistics, testing, and manufacturing operations while converting raw data into engineering insights, simulations, and actionable results through multiple processing layers.&lt;/p&gt; 
&lt;p&gt;Let’s examine each processing layer in detail:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Data ingestion&lt;/strong&gt; handles the collection and transfer of data from multiple sources into the cloud environment, supporting both real-time streaming and batch processing.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Workflow orchestration&lt;/strong&gt; coordinates and automates the complex data processing tasks, providing efficient and reliable execution of data pipelines.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Data storage&lt;/strong&gt; refers to repositories where data has been ingested, processed, and stored for organizational use, such as databases, data lakes, or data warehouses. These storage systems maintain information in specific formats optimized for defined organizational functions or processes.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Compute clusters&lt;/strong&gt; enable high-performance processing for intensive computational tasks and simulations.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Data lake (&lt;/strong&gt;destination of data) is a centralized repository that stores all types of data (structured, semi-structured, and unstructured) from multiple data sources in its original format, enabling consolidated access for various analytical needs and future processing.&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;AI/ML and analytics&lt;/strong&gt; transforms data into actionable insights through AI capabilities such as &lt;a href="https://aws.amazon.com/what-is/nlp/" target="_blank" rel="noopener"&gt;natural language processing (NLP)&lt;/a&gt;, computer vision, and deep learning and ML techniques such as predictive modeling, pattern recognition, classification, and regression.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The following diagram illustrates the detailed architecture for the digital engineering workload environment.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/16/Figure5_Blog-Architecture-Workload-Account.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30431 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/16/Figure5_Blog-Architecture-Workload-Account.jpg" alt="Architecture diagram for digital engineering workload. The architecture is detailed in the text." width="1277" height="681"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 5: Workload account reference architecture&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;This integrated architecture supports digital engineering practices by enabling data-driven decision-making throughout the system lifecycle. AWS Transit Gateway connects the three accounts, making it possible for users to authenticate through shared services, ability to access virtual desktops in the end users account, and execute workloads that process data and run simulations in the digital engineering workload account.&lt;/p&gt; 
&lt;h3&gt;Tailoring the blueprint for mission outcomes&lt;/h3&gt; 
&lt;p&gt;With the secure foundation and specialized accounts deployed, organizations can now implement flexible mission-specific workflows. Let’s explore how these digital engineering capabilities work together in a practical application that enables real-time predictive maintenance for in-service vehicles.&lt;/p&gt; 
&lt;p&gt;Here’s how the workflow operates:&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;1. Data ingestion&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/iot-core/" target="_blank" rel="noopener"&gt;AWS IoT Core&lt;/a&gt; securely transmits real-time operational data from on-board sensors (such as propulsion systems, gear boxes, dynamic components, or built-in-test equipment) and &lt;a href="https://aws.amazon.com/kinesis/data-streams/" target="_blank" rel="noopener"&gt;Amazon Kinesis Data Streams&lt;/a&gt; routes that data for processing.&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/storagegateway/" target="_blank" rel="noopener"&gt;AWS Storage Gateway&lt;/a&gt; transfers engineering design data such as computer-aided design (CAD) models, component specifications, or product lifecycle management (PLM) records to &lt;a href="https://aws.amazon.com/s3/" target="_blank" rel="noopener"&gt;Amazon Simple Storage Service (Amazon S3)&lt;/a&gt;.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;2. Workflow management&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/step-functions/" target="_blank" rel="noopener"&gt;AWS Step Functions&lt;/a&gt; orchestrates the end-to-end workflow, including extract, transform, and load (ETL) pipelines of sensor data, model validation steps for predictive algorithms, and analytics processes for fleet-wide analysis.&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/lambda/" target="_blank" rel="noopener"&gt;AWS Lambda&lt;/a&gt; executes discrete processing tasks such as data transformation of raw sensor readings, setup of simulation parameters for different scenarios, and validation checks for maintenance prediction models&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/eventbridge/" target="_blank" rel="noopener"&gt;Amazon EventBridge&lt;/a&gt; schedules regular ETL jobs for historical data analysis and triggers real-time analysis based on incoming sensor data.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;3. Simulation processing&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/batch/" target="_blank" rel="noopener"&gt;AWS Batch&lt;/a&gt; executes large-scale fleet simulations, including mission scenarios, deployment schedules, and resupply schedules.&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/emr/" target="_blank" rel="noopener"&gt;Amazon EMR&lt;/a&gt; and &lt;a href="https://aws.amazon.com/ec2/" target="_blank" rel="noopener"&gt;Amazon Elastic Compute Cloud (Amazon EC2)&lt;/a&gt; process vast amounts of design data for performance analysis and develop optimal deployment strategies or maintenance intervals.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;4. Data Lake architecture&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Amazon S3 serves as the central repository and authoritative source of truth for the system digital twin data, including complete historical records of operational data, maintenance logs, configuration, parts lists, and design specifications.&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/glue/" target="_blank" rel="noopener"&gt;AWS Glue Data&lt;/a&gt; Catalog enables efficient discovery and preparation of data for various analytics tasks, such as comparing performance across other models in the same weapon system class or analyzing maintenance patterns.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;5. Predictive analytics&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/sagemaker/" target="_blank" rel="noopener"&gt;Amazon SageMaker&lt;/a&gt; deploys ML models for: 
  &lt;ul&gt; 
   &lt;li&gt;Prediction of equipment failure in advance of incidents such as failure of the gear box, propulsion system, or dynamic components.&lt;/li&gt; 
   &lt;li&gt;Anomaly detection in sensor readings, which could indicate incidents or equipment malfunctions.&lt;/li&gt; 
   &lt;li&gt;Optimization of maintenance scheduling to reduce unscheduled downtime, automatically adjust inspection intervals, and logically group maintenance tasks.&lt;/li&gt; 
  &lt;/ul&gt; &lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/quicksight/" target="_blank" rel="noopener"&gt;Amazon Quick Sight&lt;/a&gt; delivers real-time dashboards for both operational personnel (such as commanding officers managing weapon system maintenance and supply) and decision-makers (such as fleet commanders managing overall fleet readiness).&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The following figure illustrates the architecture for a mission-specific workflow (predictive maintenance).&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/16/Figure6_Blog-Architecture-Use-Case_-Type-I.jpg" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30432 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/16/Figure6_Blog-Architecture-Use-Case_-Type-I.jpg" alt="Diagram illustrating the architecture for a workflow for predictive maintenance for a department of war vehicle. The workflow is explained in the text." width="1630" height="771"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 6: Predictive maintenance workflow for a DoW in-service vehicle&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Conclusion&lt;/h3&gt; 
&lt;p&gt;Digital engineering on AWS transforms the defense system lifecycle through seamless integration, scalability, and innovation, serving as a blueprint for digital transformation success. This post demonstrates the process of building a comprehensive digital engineering environment on AWS, from establishing a secure foundation with Landing Zone Accelerator and SCCA compliance frameworks to extending the architecture with specialized accounts for collaboration, virtual desktop experiences, and workload management.&lt;/p&gt; 
&lt;p&gt;Backed by &lt;a href="https://aws.amazon.com/about-aws/global-infrastructure/" target="_blank" rel="noopener"&gt;AWS Global Infrastructure&lt;/a&gt;, robust compliance programs, advanced AI/ML capabilities, and HPC resources, organizations can design, develop, test, and sustain next‑generation defense systems within a fully secure DoW-compliant digital ecosystem. The breadth of AWS service, combined with the expertise of the &lt;a href="https://aws.amazon.com/partners/" target="_blank" rel="noopener"&gt;AWS Partner Network (APN)&lt;/a&gt;, enables rapid deployment of secure, scalable solutions that reduce costs and shorten development cycles.&lt;/p&gt; 
&lt;p&gt;As the defense landscape evolves, AWS remains dedicated to supporting your digital engineering transformation. To get started, contact your &lt;a href="https://aws.amazon.com/government-education/contact/" target="_blank" rel="noopener"&gt;AWS account team&lt;/a&gt; to develop a tailored implementation plan for your organization.&lt;/p&gt; 
&lt;h3&gt;Learn more about digital engineering on AWS&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/industries/why-digital-engineering-requires-a-cloud-transformation/" target="_blank" rel="noopener"&gt;Why digital engineering requires a cloud transformation&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/industries/understanding-digital-engineering-and-how-it-drives-business-value/" target="_blank" rel="noopener"&gt;Understanding digital engineering and how it drives business value&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/hpc/building-your-digital-twin-solution-using-the-digital-twin-framework-on-aws/" target="_blank" rel="noopener"&gt;Building your digital twin solution using the Digital Twin Framework on AWS&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>Student attentiveness and engagement analysis in live classrooms with generative AI</title>
		<link>https://aws.amazon.com/blogs/publicsector/student-attentiveness-and-engagement-analysis-in-live-classrooms-with-generative-ai/</link>
		
		<dc:creator><![CDATA[Neha Jha]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 22:42:06 +0000</pubDate>
				<category><![CDATA[Amazon Bedrock]]></category>
		<category><![CDATA[Amazon DynamoDB]]></category>
		<category><![CDATA[Amazon Simple Queue Service (SQS)]]></category>
		<category><![CDATA[Amazon Simple Storage Service (S3)]]></category>
		<category><![CDATA[AWS CloudFormation]]></category>
		<category><![CDATA[AWS Lambda]]></category>
		<category><![CDATA[Public Sector]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">9a2fa7b4bc530934e25859d2c44a3dc86f64248e</guid>

					<description>Learn how student attentiveness and engagement analysis in live classrooms has been addressed with generative AI.</description>
										<content:encoded>&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30507 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/25/Student-attentiveness-and-engagement-analysis-in-live-classrooms-with-generative-AI.jpg" alt="Student attentiveness and engagement analysis in live classrooms with generative AI" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Online learning has revolutionized education, offering broader flexibility and accessibility. However, as many educators have discovered, keeping students engaged in a virtual classroom can be a significant challenge. Students often find it difficult to stay focused with ongoing distractions. Teachers also struggle to gauge attentiveness. As a result, it becomes a pressing need to find innovative ways to keep students actively involved in online live classrooms.&lt;/p&gt; 
&lt;p&gt;In physical classrooms, teachers use facial cues and student’s expression. By observing these nonverbal signals, teachers can immediately identify whether students are confused, engaged, or losing interest. This helps them manage the classroom in real time, so they know whether to repeat certain concepts or take corrective measures to improve engagement. In online live classrooms, such real-time understanding of students’ understanding and their attentiveness is difficult. Due to network issues or students preferring to leave their cameras off, teachers don’t have a good way to understand the classroom’s vibe.&lt;/p&gt; 
&lt;p&gt;These are the challenges we’re heard from some of our EdTech customers. We’ve built a sample solution teachers can use to gauge students’ attentiveness and their understanding in online live classrooms. Teachers can see this data in real time and can take corrective measures to build engaging classrooms and better learning outcomes.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/07/Architecture_student-attentiveness.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30348 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/07/Architecture_student-attentiveness.png" alt="Achitecture drawing" width="1405" height="803"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p&gt;The solution relies on shared screen content during online live-classroom instruction. It captures the shared screen at predefined fixed intervals (for example every 1,2 or 5 minutes). It uses &lt;a href="https://aws.amazon.com/bedrock/" target="_blank" rel="noopener"&gt;Amazon Bedrock&lt;/a&gt;, which provides access to &lt;a href="https://aws.amazon.com/generative-ai/" target="_blank" rel="noopener"&gt;generative AI&lt;/a&gt; &lt;a href="https://aws.amazon.com/what-is/foundation-models/" target="_blank" rel="noopener"&gt;foundation models (FMs)&lt;/a&gt; to comprehend the visual screen capture and the content. It then uses a generative AI model to generate polls and quizzes that are shared to all students. These real-time interactions from students are captured and showcased to teachers to provide information on how well students are following the topic. Teachers can evaluate attentiveness in real time and identify disengaged students so they can adjust their teaching strategies appropriately.&lt;/p&gt; 
&lt;p&gt;The solution addresses multiple edge cases that occur during screen capture, such as when the captured view is obstructed, when displayed content doesn’t align with the day’s lesson topic or core theme, or when the language and medium of instruction are inconsistent with class settings. The sample solution integrates seamlessly with existing live-classroom platforms, making it a flexible and extensible tool for online learning across schools, universities, and other educational institutions.&lt;/p&gt; 
&lt;p&gt;In this section, we walk you through the steps of this sample solution, which is designed to analyze student engagement and attentiveness in online live classrooms using generative AI. This architecture follows a serverless architecture pattern with an event-driven approach that is built to scale seamlessly with minimal overhead.&lt;/p&gt; 
&lt;p&gt;The solution follows eight event-driven steps:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;Capture a screenshot from the online live classroom&lt;/li&gt; 
 &lt;li&gt;Integrate the captured screenshot with asynchronous processing&lt;/li&gt; 
 &lt;li&gt;Process the captured screenshot with an &lt;a href="https://aws.amazon.com/lambda/" target="_blank" rel="noopener"&gt;AWS Lambda&lt;/a&gt; function&lt;/li&gt; 
 &lt;li&gt;Generate a content description of the captured screenshot using Amazon Bedrock&lt;/li&gt; 
 &lt;li&gt;Store the content description in &lt;a href="https://aws.amazon.com/dynamodb/" target="_blank" rel="noopener"&gt;Amazon DynamoDB&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;Generate questions for delivering a quiz or poll&lt;/li&gt; 
 &lt;li&gt;and 8. Delivering the quiz or poll to the live-classroom solution&lt;/li&gt; 
&lt;/ol&gt; 
&lt;h3&gt;&lt;strong&gt;Capture a screenshot from the online live classroom&lt;/strong&gt;&lt;/h3&gt; 
&lt;p&gt;This solution uses &lt;a href="https://aws.amazon.com/ivs/" target="_blank" rel="noopener"&gt;Amazon Interactive Video Service (Amazon IVS)&lt;/a&gt; for streaming and captures screenshots at regular intervals. The sample solution is designed to be flexible and can work with live streaming solutions that allow programmatic screen capture and can store the captures to an &lt;a href="https://aws.amazon.com/s3/" target="_blank" rel="noopener"&gt;Amazon Simple Storage Service (Amazon S3)&lt;/a&gt; bucket.&lt;/p&gt; 
&lt;p&gt;With Amazon IVS you can configure the recording with both low-latency and real-time options. You can capture a screenshot at any interval between 1 to 300 seconds and store them in your Amazon S3 bucket. This demo solution has been configured to capture a screenshot every 30 seconds. The demo solution also configures the &lt;a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lifecycle-mgmt.html" target="_blank" rel="noopener"&gt;Amazon S3 Lifecycle&lt;/a&gt; rule to remove all screenshots after 1 day.&lt;/p&gt; 
&lt;p&gt;Alternatively, &lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt; has another open source solution named &lt;a href="https://github.com/aws-samples/amazon-ivs-ugc-platform-web-demo" target="_blank" rel="noopener"&gt;Amazon IVS UGC platform&lt;/a&gt;. It’s a reference application that allows live streaming, user authentication, live chat, and more. You can integrate this sample solution with a user-generated content (UGC) platform application. Refer to &lt;a href="https://github.com/aws-samples/amazon-ivs-ugc-platform-web-demo?tab=readme-ov-file#deployment" target="_blank" rel="noopener"&gt;GitHub README.md&lt;/a&gt; for more details and the installation guide.&lt;/p&gt; 
&lt;h3&gt;Integrate the captured screenshot with asynchronous processing&lt;/h3&gt; 
&lt;p&gt;After the captured screenshot is stored inside the Amazon S3 bucket, we use Amazon &lt;a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/EventNotifications.html" target="_blank" rel="noopener"&gt;S3 Event Notifications&lt;/a&gt; to send notifications for all captured screenshots uploaded to the Amazon S3 bucket. This event triggers the next steps of the workflow: processing the screenshot and generating the corresponding transcript and quiz or poll. Every time a captured screenshot is uploaded to Amazon S3, it triggers an event notification, which stores messages in &lt;a href="https://aws.amazon.com/sqs/" target="_blank" rel="noopener"&gt;Amazon Simple Queue Service (Amazon SQS)&lt;/a&gt; for asynchronous event-driven processing. These events are asynchronously by an AWS Lambda function.&lt;/p&gt; 
&lt;h3&gt;Process the captured screenshot with an AWS Lambda function&lt;/h3&gt; 
&lt;p&gt;The Amazon SQS messages get consumed by AWS Lambda function that handles the entire image processing workflow. It understands what has been presented as part of the captured screenshot, validates whether the extracted content from the captured screenshot is relevant to the topic being taught, and validates whether the content is complete and can be used to generate a quiz or poll.&lt;/p&gt; 
&lt;h3&gt;Generate a content description of the captured screenshot using Amazon Bedrock&lt;/h3&gt; 
&lt;p&gt;AWS Lambda function will use &lt;a href="https://aws.amazon.com/bedrock/anthropic/" target="_blank" rel="noopener"&gt;Claude Sonnet 4.0 by Anthropic in Amazon Bedrock&lt;/a&gt; to infer a textual description from the captured screenshot. You can choose any &lt;a href="https://aws.amazon.com/what-is/large-language-model/" target="_blank" rel="noopener"&gt;large language model (LLM)&lt;/a&gt; available on Amazon Bedrock that has vision capability. To set proper context and prepare the LLM, we use the following prompt to generate a description of the captured screenshot, which can be content such as text on a presentation slide or a whiteboard drawing.&lt;/p&gt; 
&lt;p&gt;This prompt is designed for extracting and assessing cloud computing digital-board content only. Before using this prompt, replace &lt;code&gt;{{expertise}}&lt;/code&gt; with your subject:&lt;/p&gt; 
&lt;p&gt;Prompt: Role: You are a Teaching &amp;amp; Learning Specialist analyzing screenshots of classroom digital-boards to extract educational content.&lt;/p&gt; 
&lt;p&gt;What to analyze: Focus exclusively on text/content visible on the digital-board. Ignore teacher/students, chat, or anything not written on the board.&lt;/p&gt; 
&lt;p&gt;Instructions:&lt;/p&gt; 
&lt;p&gt;Examine the screenshot of the video class.&lt;/p&gt; 
&lt;p&gt;Extract all educational text exactly as it appears (questions, answers, steps, explanations, diagram labels).&lt;/p&gt; 
&lt;p&gt;Translate the extracted content into English while preserving meaning and original formatting.&lt;/p&gt; 
&lt;p&gt;If the content does not relate to &lt;code&gt;{{expertise}}&lt;/code&gt;, respond with the single word “irrelevant”.&lt;/p&gt; 
&lt;p&gt;Do: Preserve exact wording, include every visible educational element.&lt;/p&gt; 
&lt;p&gt;Don’t: Infer, add details, or describe behavior not written on the board.&lt;/p&gt; 
&lt;p&gt;Output: Provide only one of the following:&lt;/p&gt; 
&lt;p&gt;• Summary including only the extracted board content (translated to English), OR&lt;/p&gt; 
&lt;p&gt;• The single word “irrelevant”.&lt;/p&gt; 
&lt;h3&gt;Store the content description from the captured screen in Amazon DynamoDB&lt;/h3&gt; 
&lt;p&gt;After the content description is generated from the captured screen, it’s important to confirm that the captured screen isn’t a blank or green screen, a welcome or thank you slide, or a slide with content not related to the topic or similar to an already captured description (for example, if you moved back to a previous slide). This helps the solution generate a quiz or poll for only a valid captured screen. These validations are being handled inside AWS Lambda function named LambdaFunctionForQuesAndTranscript. After the screen capture is validated, the function stores it inside Amazon DynamoDB.&lt;/p&gt; 
&lt;h3&gt;Generate questions for delivering the quiz or poll&lt;/h3&gt; 
&lt;p&gt;After storing the content description, the function now generates a quiz or poll using the stored content description. It uses an Amazon Bedrock LLM to generate the quiz or poll and stores it in Amazon DynamoDB. The following is an example prompt for generating a quiz or poll:&lt;/p&gt; 
&lt;p&gt;Prompt: Role: You are an expert teacher in &lt;code&gt;{{expertise}}&lt;/code&gt; designing multiple-choice questions to assess attentiveness and understanding of digital-board content.&lt;/p&gt; 
&lt;p&gt;When to generate questions: Only when the extracted content clearly relates to &lt;code&gt;{{expertise}}&lt;/code&gt;.&lt;/p&gt; 
&lt;p&gt;Requirements for each question:&lt;/p&gt; 
&lt;p&gt;• English only&lt;/p&gt; 
&lt;p&gt;• Exactly one question per item&lt;/p&gt; 
&lt;p&gt;• Exactly four options (A, B, C, D)&lt;/p&gt; 
&lt;p&gt;• Only one correct answer&lt;/p&gt; 
&lt;p&gt;• All choices must be relevant, distinct, and plausible&lt;/p&gt; 
&lt;p&gt;• Include a brief explanation for the correct answer&lt;/p&gt; 
&lt;p&gt;Ignore any text written on t-shirts, humans, bold formatting. If the transcript already contains a question, use it directly to form the MCQ; if not, create a new question that aligns with the AWS &lt;code&gt;{{expertise}}&lt;/code&gt; concept reflected in the transcript. Only generate questions when the transcript content is related to AWS &lt;code&gt;{{expertise}}&lt;/code&gt;.&lt;/p&gt; 
&lt;p&gt;Each generated question must include four options with one correct answer, ensuring that the options are relevant and logically consistent. Return the output strictly in the following JSON format, and generate questions only in English:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-json"&gt;{
"question": "&amp;lt;generated question&amp;gt;",
"options": ["&amp;lt;option 1&amp;gt;", "&amp;lt;option 2&amp;gt;", "&amp;lt;option 3&amp;gt;", "&amp;lt;option 4&amp;gt;"],
"solution": "&amp;lt;correct option&amp;gt;",
"result": "True"
}
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;The AWS Lambda function also pushes the generated quiz to the Amazon SQS queue to deliver it to students. This approach allows integration with existing solutions by pulling messages from the queue and delivering them to live-classroom solutions.&lt;/p&gt; 
&lt;h3&gt;Delivering the quiz or poll to the live-classroom solution&lt;/h3&gt; 
&lt;p&gt;The AWS Lambda function process the messages from the Amazon SQS queue and sends the generated quiz or poll to the students’ UI. In the sample solution, we’ve integrated logic to deliver questions to the &lt;a href="https://github.com/aws-samples/amazon-ivs-ugc-platform-web-demo" target="_blank" rel="noopener"&gt;Amazon IVS UGC platform&lt;/a&gt; demo solution. However, the AWS Lambda function is extensible and can be customized to integrate with any API integration to connect with your live-class streaming solution.&lt;/p&gt; 
&lt;h3&gt;How to deploy&lt;/h3&gt; 
&lt;p&gt;This is a sample solution designed to help developers get started with a generative AI integration with an online live classroom. It isn’t production ready and will require additional development work to be suitable for production use. It is not intended for production use as-is. Its primary goal is to help developers understand the concepts and approach for integration. By using this solution, you understand and accept its risks and limitations. You’re responsible for any charges incurred while creating and launching your solution.&lt;/p&gt; 
&lt;p&gt;We’ve published this solution on GitHub at aws-samples/sample-live-class-student-engagement-analysis-with-generative-ai. The published sample solution has a &lt;a href="https://github.com/aws-samples/sample-live-class-student-engagement-analysis-with-generative-ai/blob/main/docs/DEPLOYMENT_GUIDE.md" target="_blank" rel="noopener"&gt;detailed guide&lt;/a&gt; for deployment along with the &lt;a href="https://github.com/aws-samples/sample-live-class-student-engagement-analysis-with-generative-ai/blob/main/docs/PREREQUISITE_GUIDE.md" target="_blank" rel="noopener"&gt;prerequisites&lt;/a&gt; needed.&lt;/p&gt; 
&lt;h3&gt;Run the demo&lt;/h3&gt; 
&lt;p&gt;You can try this demo by uploading a captured screenshot to the Amazon S3 bucket that you provided as &lt;code&gt;ScreenCaptureS3Bucket&lt;/code&gt;. This will trigger the complete flow of the architecture, and it calls the final Lambda function &lt;code&gt;LambdaFunctionToRecieveUniqueQuestion&lt;/code&gt;.&lt;/p&gt; 
&lt;p&gt;To run the demo, follow these steps:&lt;/p&gt; 
&lt;ol&gt; 
 &lt;li&gt;Navigate to the &lt;a href="https://console.aws.amazon.com/s3/" target="_blank" rel="noopener"&gt;Amazon S3 console&lt;/a&gt; and locate the Amazon S3 bucket created using the &lt;a href="https://aws.amazon.com/serverless/sam/" target="_blank" rel="noopener"&gt;AWS Serverless Application Model (AWS SAM)&lt;/a&gt;. You can use the sample_screenshot image located under the asset folder to test. To upload files to the bucket directory, follow the guide at &lt;a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-objects-upload.html" target="_blank" rel="noopener"&gt;Uploading objects to a directory bucket&lt;/a&gt; in the Amazon S3 User Guide. You must create a folder first and then upload the image.&lt;/li&gt; 
 &lt;li&gt;It will trigger the rest of the flow of the architecture and you will be able to see the processing log of the final Lambda function with the name &lt;code&gt;LambdaFunctionToRecieveUniqueQuestion&lt;/code&gt;. To access the log of AWS Lambda function, follow the steps at AWS Lambda Developer Guide &amp;gt; &lt;a href="https://docs.aws.amazon.com/lambda/latest/dg/monitoring-cloudwatchlogs-view.html#monitoring-cloudwatchlogs-console" target="_blank" rel="noopener"&gt;Access function logs using the console&lt;/a&gt;.&lt;/li&gt; 
&lt;/ol&gt; 
&lt;p&gt;For more detailed steps, follow this &lt;a href="https://github.com/aws-samples/sample-live-class-student-engagement-analysis-with-generative-ai/blob/main/docs/DEMO_GUIDE.md" target="_blank" rel="noopener"&gt;guide&lt;/a&gt;.&lt;/p&gt; 
&lt;h3&gt;Run the demo with the Amazon IVS UGC platform&lt;/h3&gt; 
&lt;p&gt;Setting up the Amazon IVS UGC platform demo is optional, but it allows you to explore a fully integrated solution where pop quizzes and questions are displayed to students during the live session, in screenshot like below.&lt;/p&gt; 
&lt;p&gt;For the prerequisites required to set up the demo, make sure the following tools are installed :&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;AWS CLI&lt;/strong&gt; – &lt;a href="https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html" target="_blank" rel="noopener"&gt;Installing the AWS CLI version 2&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;NodeJS&lt;/strong&gt; – &lt;a href="https://nodejs.org/" target="_blank" rel="noopener"&gt;Installing Node.js&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;Docker&lt;/strong&gt; – &lt;a href="https://www.docker.com/get-started/" target="_blank" rel="noopener"&gt;Installing Docker&lt;/a&gt; for Amazon IVS UGC platform demo&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;To configure and deploy the demo, complete the steps in the following guides:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://github.com/aws-samples/amazon-ivs-ugc-platform-web-demo?tab=readme-ov-file#deployment" target="_blank" rel="noopener"&gt;Deploy the demo&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Follow &lt;a href="https://github.com/aws-samples/sample-live-class-student-engagement-analysis-with-generative-ai/blob/main/docs/INTEGRATE_UGC.md" target="_blank" rel="noopener"&gt;Amazon IVS UGC platform integration guide&lt;/a&gt; with sample solution.&lt;/p&gt; 
&lt;p&gt;Follow &lt;a href="https://github.com/aws-samples/sample-live-class-student-engagement-analysis-with-generative-ai/blob/main/docs/DEMO_GUIDE_UGC.md" target="_blank" rel="noopener"&gt;Amazon IVS UGC platform demo&lt;/a&gt; with sample solution for testing purpose.&lt;/p&gt; 
&lt;h3&gt;Cleanup&lt;/h3&gt; 
&lt;p&gt;Most of the solution components are serverless, and there will be lower idle cost of the overall architecture. However, to clean up this sample solution, you need to delete the &lt;a href="https://aws.amazon.com/cloudformation/" target="_blank" rel="noopener"&gt;AWS CloudFormation&lt;/a&gt; template using the following command:&lt;/p&gt; 
&lt;p&gt;&lt;code&gt;sam delete&lt;/code&gt;&lt;/p&gt; 
&lt;p&gt;To clean up the Amazon IVS UGC platform demo, follow the instructions at &lt;a href="https://github.com/aws-samples/amazon-ivs-ugc-platform-web-demo?tab=readme-ov-file#backend-teardown" target="_blank" rel="noopener"&gt;Backend Teardown&lt;/a&gt;.&lt;/p&gt; 
&lt;h3&gt;Conclusion&lt;/h3&gt; 
&lt;p&gt;This solution showcases how generative AI can be used to capture student attentiveness and engagement during online live-classroom instruction. It creates an interactive learning environment that keeps students engaged, giving teachers actionable insights so they can adapt their teaching strategies and ultimately improve learning outcomes. The ability to generate a quiz or poll based on captured screenshots keeps students consistently challenged with relevant content, and the system’s serverless architecture provides seamless scalability on demand with very little overhead.&lt;/p&gt; 
&lt;p&gt;As online education continues to grow, solutions like these will play a crucial role in integrating virtual learning with traditional classroom experiences. This approach uses an existing solution, and you can engage with AWS partner and your AWS account team to help you customize it for your needs.&lt;/p&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>How Sphero brings safe, impactful AI to K12 classrooms with Amazon Bedrock</title>
		<link>https://aws.amazon.com/blogs/publicsector/how-sphero-brings-safe-impactful-ai-to-k12-classrooms-with-amazon-bedrock/</link>
		
		<dc:creator><![CDATA[Jackson Platt]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 21:35:51 +0000</pubDate>
				<category><![CDATA[Amazon Bedrock]]></category>
		<category><![CDATA[Amazon Simple Storage Service (S3)]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[Public Sector]]></category>
		<guid isPermaLink="false">37d83859cfc6b53f8b2f8ada6c3673ade0735afb</guid>

					<description>In this blog, learn how Sphero, a company that creates programmable robots for K12 education, built a generative AI coding assistant into its Sphero Edu app using Amazon Web Services (AWS) to solve that problem.</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="size-full wp-image-30501 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/24/How-Sphero-brings-safe-impactful-AI-to-K12-classrooms-with-Amazon-Bedrock.png" alt="How Sphero brings safe, impactful AI to K12 classrooms with Amazon Bedrock" width="1152" height="576"&gt;&lt;/p&gt; 
&lt;p&gt;Robots are rolling through K12 classrooms as teachers use them for everything from biology and math assignments to language arts lessons. Students program these robots, often in sessions as short as 15 minutes. Getting stuck is part of the learning process, but with class sizes and finite period lengths, waiting for help isn’t always an option. And even when a teacher can get there, troubleshooting code on the spot isn’t simple.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://sphero.com/" target="_blank" rel="noopener"&gt;Sphero&lt;/a&gt;, a company that creates programmable robots for K12 education, built a &lt;a href="https://aws.amazon.com/ai/generative-ai/" target="_blank" rel="noopener"&gt;generative AI&lt;/a&gt; coding assistant into its Sphero Edu app using &lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt; to solve that problem. Students don’t type prompts or interact with an open interface. Instead, they tap a single button and receive immediate, focused feedback on their code. That one-click design reduces the risk of unpredictable outputs reaching students, keeping every AI interaction safe, age-appropriate, and focused on learning. It’s an approach that earns teacher trust and addresses the concerns that have made many schools hesitant about AI in the first place.&lt;/p&gt; 
&lt;h3&gt;Thirty kids, 15 robots, and one teacher&lt;/h3&gt; 
&lt;p&gt;Sphero’s current users are mostly elementary and middle school students in third through sixth grade who use Chromebooks, iPads, or tablets to control a small programmable robot using Bluetooth. Teachers use these robots to supplement learning across subjects, from coding exercises to science experiments.&lt;/p&gt; 
&lt;p&gt;In a typical session, students write a program, run it, and watch what the robot does. If something goes wrong, they try to figure out why. But in a room full of students working at different speeds, there’s no guarantee the teacher can reach everyone before the lesson ends. “Thirty kids in a classroom with 15 robots rolling around—the teacher can only do so much,” said Brian Kellner, vice president of software engineering at Sphero.&lt;/p&gt; 
&lt;p&gt;Sphero built the AI assistant to fill that gap, helping teachers support more students in the moments that matter and helping students think through challenges more deeply. Rather than giving students the complete answer, it offers hints, explanations, and guided feedback, preserving the trial-and-error learning cycle that makes robotics effective in the first place.&lt;/p&gt; 
&lt;h3&gt;Why safety shaped every design decision&lt;/h3&gt; 
&lt;p&gt;Before Sphero considered how AI could assist students, the team thought about what could go wrong. Schools have strict and varying policies around technology, and Sphero had already seen a school discontinue use of its products after a student-shared program displayed a cartoon sword image that violated a zero-weapon policy. That experience helped shape how Sphero would approach AI, leading the team to a guiding principle for whatever they built: safe, simple, and valuable, in that order.&lt;/p&gt; 
&lt;p&gt;“As AI settles in schools, we must be cautious about what power we give students and how schools might respond to what AI can do,” said Micah Daby, product manager at Sphero. Kellner agreed: “If we say safe, simple, valuable, we want to be able to stand behind safe.”&lt;/p&gt; 
&lt;h3&gt;Building on an existing AWS foundation&lt;/h3&gt; 
&lt;p&gt;Sphero had been running its infrastructure on AWS for years. When Kellner began exploring AI, the AWS account team helped move the project from broad ideas to a viable first use case. An AWS-funded proof of concept kicked off in April 2025 and validated the technical approach by the end of May. Sphero spent the summer testing and refining prompts with its internal content team, then released the AI assistant in August for the back-to-school season.&lt;/p&gt; 
&lt;p&gt;“When we first started looking at adding AI to our products, we were not very grounded,” said Kellner. “The AWS account team guided us to experts to help us refine our ideas into something feasible, then helped us define a scope of work for the first phase. That gave us clarity on what we would build and how it would work.”&lt;/p&gt; 
&lt;h3&gt;How the Sphero Edu AI assistant works&lt;/h3&gt; 
&lt;p&gt;The AI space evolves quickly, and Sphero didn’t want to be locked into a single model. Because of this, the team chose &lt;a href="https://aws.amazon.com/bedrock/" target="_blank" rel="noopener"&gt;Amazon Bedrock&lt;/a&gt; for its flexibility. Sphero can update the knowledge base, switch models, and build new features on the same foundation. For a nine-person software team, that manageability matters. “I can go in and change things in the knowledge base and resync it without heavily involving engineers working on other critical needs,” said Daby.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://aws.amazon.com/bedrock/knowledge-bases/" target="_blank" rel="noopener"&gt;Amazon Bedrock Knowledge Bases&lt;/a&gt; is at the core of the AI assistant. Using a &lt;a href="https://aws.amazon.com/what-is/retrieval-augmented-generation/" target="_blank" rel="noopener"&gt;Retrieval Augmented Generation (RAG)&lt;/a&gt; approach, the AI pulls from a curated set of Sphero documents to generate grounded responses rather than relying on the model alone. The knowledge base draws from Sphero’s programming wiki and internal documents stored in &lt;a href="https://aws.amazon.com/s3/" target="_blank" rel="noopener"&gt;Amazon Simple Storage Service (Amazon S3)&lt;/a&gt;, covering robot-specific behaviors, hardware limitations, and common student errors. This means the AI can only respond to Sphero robots and programming, and updates sync in about a minute as the team adds new information. When teachers report that a response was inaccurate, Daby can usually fix it by updating the knowledge base directly, keeping the tool grounded in real classroom use.&lt;/p&gt; 
&lt;p&gt;What students see is a set of one-click features inside the Sphero Edu app. Explain My Program breaks down what their code does in plain language. Code Review checks for errors, including issues students wouldn’t know to look for, like a spin command that is physically impossible for the motor to execute in the given time. Block Help explains any specific block, tailored to whichever robot is connected. A fourth feature gives Sphero’s content team the ability to embed AI hints directly into structured lessons, so students get guided feedback at the right moment without the AI solving the problem for them.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://aws.amazon.com/bedrock/guardrails/" target="_blank" rel="noopener"&gt;Amazon Bedrock Guardrails&lt;/a&gt; handles safety on the backend, filtering both input and output. Because the AI features are one-click, students can’t enter free-form prompts in most of the app. The only variable the AI receives is the student’s program code, which limits the surface area for misuse. Even in the one lesson where students can type short text into speak blocks, the prompts instruct the model to treat that input with extra caution. The team also ran prompt-injection tests and found that the model recognized and ignored these attempts.&lt;/p&gt; 
&lt;h3&gt;Most students get what they need in one click&lt;/h3&gt; 
&lt;p&gt;Since launching in August 2025, the Sphero Edu AI assistant has been accessed more than 15,000 times per week. The most telling metric is how few clicks students make when using it. About 65% of students who use the Explain My Program feature click it one time and return to their lesson with what they need. “They’re in a 15-minute session with their robot, they click, they get some good feedback, and they get on with it,” said Kellner.&lt;/p&gt; 
&lt;p&gt;In that context, response speed matters. Staging tests showed that &lt;a href="https://aws.amazon.com/bedrock/anthropic/" target="_blank" rel="noopener"&gt;Claude Haiku 4.5 by Anthropic in Amazon Bedrock&lt;/a&gt; delivered roughly half the response time at about one-third the cost compared to &lt;a href="https://aws.amazon.com/bedrock/anthropic/" target="_blank" rel="noopener"&gt;Claude Sonnet 3.7 by Anthropic in Amazon Bedrock&lt;/a&gt;. Sphero decided to transition to Claude Haiku, with responses rarely exceeding 15 seconds. Reliability has been strong, too, with the team recording only eight errors over a recent 3-week period.&lt;/p&gt; 
&lt;p&gt;Teacher feedback has reinforced the approach. At a live webinar, educators said the tool added value without requiring new purchases or additional training. “It’s so cool that students can interact with AI without having the safety issues surrounding entering their own prompts,” said one educator. “It’s an amazing resource for cross-curricular learning.”&lt;/p&gt; 
&lt;h3&gt;Multilingual support, vision capabilities, and what comes next&lt;/h3&gt; 
&lt;p&gt;Sphero is developing a feature that gives students hands-on experience training &lt;a href="https://aws.amazon.com/ai/machine-learning/" target="_blank" rel="noopener"&gt;machine learning (ML)&lt;/a&gt; models using sensor data from their robots—for example, training the robot to recognize when it’s shaken and respond with lights or sound. Daby is also working on multilingual support, so the assistant can respond in the student’s language, extending accessibility to non-English speakers. Vision and image processing capabilities are in the early stages of exploration.&lt;/p&gt; 
&lt;p&gt;For other education technology (EdTech) companies considering AI for K12, Kellner’s advice is straightforward: “Put yourself in the shoes of the teacher. What is a teacher really going to experience with your tool in the classroom? Teachers have a tough job. Finding what works for them is important.”&lt;/p&gt; 
&lt;p&gt;Sphero’s educator guide goes deeper into how the company approaches student safety, AI literacy, and classroom resources for teaching AI with hands-on robotics. &lt;a href="https://docs.google.com/document/d/1cFc9B_Ee-t5_-g4j8xPViXDWnuiwomw9wLyZ9P0OVEo/preview?tab=t.0#heading=h.bk1dd3d5ltfy" target="_blank" rel="noopener"&gt;Read Sphero’s guide now&lt;/a&gt; or, to learn more about how AWS supports EdTech companies building AI solutions for education, &lt;a href="https://aws.amazon.com/government-education/contact/" target="_blank" rel="noopener"&gt;contact the AWS EdTech team&lt;/a&gt;.&lt;/p&gt; 
&lt;h3&gt;Read related stories on the AWS Public Sector Blog&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/doing-more-with-less-in-higher-education-how-institutions-drive-efficiency-with-ai-and-automation-on-aws/" target="_blank" rel="noopener"&gt;Doing more with less in higher education: How institutions drive efficiency with AI and automation on AWS&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/ai-that-listens-building-educator-centered-ai-tools-on-aws/" target="_blank" rel="noopener"&gt;AI that listens: Building educator-centered AI tools on AWS&lt;/a&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;a href="https://aws.amazon.com/blogs/publicsector/claude-for-education-now-available-in-aws-marketplace/" target="_blank" rel="noopener"&gt;Claude for Education now available in AWS Marketplace&lt;/a&gt;&lt;/li&gt; 
&lt;/ul&gt;</content:encoded>
					
		
		
			</item>
		<item>
		<title>Building an identity-verified remote assessment platform on AWS</title>
		<link>https://aws.amazon.com/blogs/publicsector/building-an-identity-verified-remote-assessment-platform-on-aws/</link>
		
		<dc:creator><![CDATA[Mohammed Reda]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 20:55:43 +0000</pubDate>
				<category><![CDATA[Amazon Bedrock]]></category>
		<category><![CDATA[Amazon Bedrock AgentCore]]></category>
		<category><![CDATA[Amazon CloudWatch]]></category>
		<category><![CDATA[Amazon Cognito]]></category>
		<category><![CDATA[Amazon DynamoDB]]></category>
		<category><![CDATA[Amazon Nova]]></category>
		<category><![CDATA[Amazon Rekognition]]></category>
		<category><![CDATA[Amazon Simple Storage Service (S3)]]></category>
		<category><![CDATA[Amazon Textract]]></category>
		<category><![CDATA[Amazon Transcribe]]></category>
		<category><![CDATA[AWS Identity and Access Management (IAM)]]></category>
		<category><![CDATA[AWS Lambda]]></category>
		<category><![CDATA[EdTechs]]></category>
		<category><![CDATA[Higher education]]></category>
		<category><![CDATA[Public Sector]]></category>
		<guid isPermaLink="false">5b5f65a6766be5178003d611dc89942da5789b4c</guid>

					<description>Universities across the UK conduct tens of thousands of online interviews and exams each year. During a single admissions intake, over 20,000 video interviews were recorded for international applicants, with 1.3% of sessions showing confirmed fraud, including 0.15% involving deepfakes. A survey by the International Center for Academic Integrity (ICAI) found that 2% of students […]</description>
										<content:encoded>&lt;p&gt;&lt;img loading="lazy" class="alignleft size-full wp-image-30458" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Building-an-identity-verified-remote-assessment-platform-on-AWS.jpg" alt="Building an identity-verified remote assessment platform on AWS" width="2048" height="1024"&gt;&lt;/p&gt; 
&lt;p&gt;Universities across the UK conduct tens of thousands of online interviews and exams each year. During a single admissions intake, &lt;a href="https://www.theguardian.com/education/2025/feb/12/uk-universities-automating-interviews-face-deepfake-applicants" target="_blank" rel="noopener"&gt;over 20,000&lt;/a&gt; video interviews were recorded for international applicants, with 1.3% of sessions showing confirmed fraud, including 0.15% involving &lt;a href="https://en.wikipedia.org/wiki/Deepfake" target="_blank" rel="noopener"&gt;deepfakes&lt;/a&gt;. A &lt;a href="https://academicintegrity.org/aws/ICAI/pt/sp/facts" target="_blank" rel="noopener"&gt;survey&lt;/a&gt; by the International Center for Academic Integrity (ICAI) found that 2% of students admitted to having someone else complete an exam or assignment on their behalf, confirming that impersonation remains a persistent risk in remote assessments.&lt;/p&gt; 
&lt;p&gt;The broader academic integrity landscape compounds this challenge. More than 60% of students globally admit to some form of academic dishonesty, and &lt;a href="https://en.wikipedia.org/wiki/Contract_cheating" target="_blank" rel="noopener"&gt;contract cheating&lt;/a&gt; services continue to grow. These trends place increasing pressure on institutions to protect the credibility of remote admissions, interviews, and exams without relying solely on manual review.&lt;/p&gt; 
&lt;p&gt;This pressure coincides with a strategic push to expand the global reach of UK higher education. The &lt;a href="https://www.gov.uk/government/publications/the-uks-international-education-strategy-2026" target="_blank" rel="noopener"&gt;UK International Education Strategy&lt;/a&gt; sets a target of £40 billion in education exports by 2030 and emphasizes sustainable recruitment of high-quality international students. Meeting that goal requires assessment processes that scale globally while preserving academic integrity and institutional reputation. &lt;a href="https://aws.amazon.com/ai/" target="_blank" rel="noopener"&gt;AI&lt;/a&gt; has a key role to play in helping universities conduct remote interviews and exams efficiently without compromising trust.&lt;/p&gt; 
&lt;p&gt;In this post, we show how to build a secure, scalable assessment platform on &lt;a href="https://aws.amazon.com/" target="_blank" rel="noopener"&gt;Amazon Web Services (AWS)&lt;/a&gt; using multi-agent AI and biometric verification to automate identity checks and exam evaluation. The solution uses &lt;a href="https://aws.amazon.com/bedrock/agentcore/" target="_blank" rel="noopener"&gt;Amazon Bedrock AgentCore&lt;/a&gt; to coordinate specialized agents, &lt;a href="https://aws.amazon.com/rekognition/" target="_blank" rel="noopener"&gt;Amazon Rekognition&lt;/a&gt; for face verification, &lt;a href="https://aws.amazon.com/transcribe/" target="_blank" rel="noopener"&gt;Amazon Transcribe&lt;/a&gt; for speech analysis, and &lt;a href="https://aws.amazon.com/textract/" target="_blank" rel="noopener"&gt;Amazon Textract&lt;/a&gt; for identity document extraction. These services are combined with voice-matching models to detect impersonation before and during exams, which reduces fraud risk and enables institutions to assess candidates with greater confidence.&lt;/p&gt; 
&lt;h3&gt;Solution architecture&lt;/h3&gt; 
&lt;p&gt;The platform is built on Amazon Bedrock AgentCore and uses five specialized agents coordinated across three workflows: registration, authentication, and exam execution. The following diagram shows the platform architecture, including the five agents, &lt;a href="https://docs.aws.amazon.com/bedrock-agentcore/latest/devguide/gateway.html" target="_blank" rel="noopener"&gt;Amazon Bedrock AgentCore Gateway&lt;/a&gt;, and the AWS services they use.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/23/blog-archv3.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30491 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/23/blog-archv3.png" alt="Figure 1 End-to-end architecture connecting the React frontend" width="5000" height="3208"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 1: End-to-end architecture connecting the React frontend, five Amazon Bedrock AgentCore agents, AWS Lambda tool functions, and AWS AI services&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;Registration establishes the user’s verified identity. A single registration agent handles document extraction, voice capture, and account creation across three sequential steps, using &lt;a href="https://aws.amazon.com/blogs/machine-learning/amazon-bedrock-agentcore-memory-building-context-aware-agents/" target="_blank" rel="noopener"&gt;Amazon Bedrock AgentCore Memory&lt;/a&gt; to maintain context between them. At the end of registration, the user has an &lt;a href="https://aws.amazon.com/cognito/" target="_blank" rel="noopener"&gt;Amazon Cognito&lt;/a&gt; account with biometric references (face and voice) stored in &lt;a href="https://aws.amazon.com/s3/" target="_blank" rel="noopener"&gt;Amazon Simple Storage Service (Amazon S3)&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Authentication verifies the user’s identity before each exam attempt. The authentication agent compares a live face capture against the stored reference using Amazon Rekognition and matches voice samples using a speaker-embedding model. Both checks must pass for the user to proceed.&lt;/p&gt; 
&lt;p&gt;Exam execution demonstrates a reading proficiency assessment, where the user reads a displayed passage aloud while being recorded. An orchestrator agent coordinates two child agents: a reading test agent that handles transcription and biometric monitoring during the exam and an evaluation agent that scores the reading across multiple dimensions. Reading passages are stored in &lt;a href="https://aws.amazon.com/dynamodb/" target="_blank" rel="noopener"&gt;Amazon DynamoDB&lt;/a&gt; and served to the frontend.&lt;/p&gt; 
&lt;p&gt;The reading assessment is one example of what can be built on this architecture. The modular design allows additional specialized agents to be added for other exam types, such as listening comprehension, writing, coding assessments, or domain-specific evaluations, without modifying the existing registration or authentication flows.&lt;/p&gt; 
&lt;h3&gt;Model flexibility&lt;/h3&gt; 
&lt;p&gt;All agents in this solution are built with the &lt;a href="https://strandsagents.com/latest/" target="_blank" rel="noopener"&gt;Strands Agents&lt;/a&gt; SDK and run on &lt;a href="https://docs.aws.amazon.com/bedrock-agentcore/latest/devguide/agents-tools-runtime.html" target="_blank" rel="noopener"&gt;Amazon Bedrock AgentCore Runtime&lt;/a&gt;. Each agent can use any foundation model (FM) available through &lt;a href="https://aws.amazon.com/bedrock/" target="_blank" rel="noopener"&gt;Amazon Bedrock&lt;/a&gt;, including first-party models such as &lt;a href="https://aws.amazon.com/nova/" target="_blank" rel="noopener"&gt;Amazon Nova&lt;/a&gt; and third-party models such as &lt;a href="https://aws.amazon.com/bedrock/anthropic/" target="_blank" rel="noopener"&gt;Claude by Anthropic in Amazon Bedrock&lt;/a&gt;. Changing the underlying model requires updating a single configuration parameter—no changes to agent logic or tool integrations are needed.&lt;/p&gt; 
&lt;h3&gt;Tool access through Amazon Bedrock AgentCore Gateway&lt;/h3&gt; 
&lt;p&gt;Rather than each agent invoking AWS services directly, the platform implements tools as &lt;a href="https://aws.amazon.com/lambda/" target="_blank" rel="noopener"&gt;AWS Lambda&lt;/a&gt; functions and exposes them through the AgentCore Gateway using the &lt;a href="https://modelcontextprotocol.io/docs/getting-started/intro" target="_blank" rel="noopener"&gt;Model Context Protocol (MCP)&lt;/a&gt;. This gives all agents shared access to capabilities, including:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Identity document extraction (Amazon Textract)&lt;/li&gt; 
 &lt;li&gt;Speech transcription (Amazon Transcribe)&lt;/li&gt; 
 &lt;li&gt;Face detection and comparison (Amazon Rekognition)&lt;/li&gt; 
 &lt;li&gt;User account management (Amazon Cognito)&lt;/li&gt; 
 &lt;li&gt;Biometric profile storage and lookup (Amazon DynamoDB)&lt;/li&gt; 
 &lt;li&gt;Voice embedding comparison (&lt;a href="https://github.com/resemble-ai/Resemblyzer" target="_blank" rel="noopener"&gt;Resemblyzer&lt;/a&gt;)&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The gateway enforces authentication for every tool invocation. Before an agent can access tools, it obtains an &lt;a href="https://docs.aws.amazon.com/bedrock-agentcore/latest/devguide/identity-authentication.html" target="_blank" rel="noopener"&gt;OAuth 2.0&lt;/a&gt; token using client credentials that flow through Amazon Cognito. The following example shows how an agent requests a gateway access token:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;``` python
def get_gateway_token():
    response = requests.post(
        COGNITO_TOKEN_URL,
        data="grant_type=client_credentials"
             "&amp;amp;client_id={ID}&amp;amp;client_secret={SECRET}&amp;amp;scope={SCOPE}",
        headers={"Content-Type": "application/x-www-form-urlencoded"}
    )
    return response.json()["access_token"]
``` 
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;This prevents agents from accessing underlying AWS services directly. The gateway validates every request, acting as a centralized security boundary.&lt;/p&gt; 
&lt;h3&gt;Voice verification&lt;/h3&gt; 
&lt;p&gt;Voice matching uses Resemblyzer, an open source speaker recognition library that generates 256-dimensional neural embeddings from audio recordings. Comparing these embeddings using cosine similarity determines whether two recordings come from the same speaker.&lt;/p&gt; 
&lt;p&gt;Resemblyzer runs as a Lambda container image on &lt;a href="https://aws.amazon.com/ec2/graviton/" target="_blank" rel="noopener"&gt;AWS Graviton2&lt;/a&gt; (ARM64) processors. To eliminate cold-start latency, we use &lt;a href="https://aws.amazon.com/blogs/aws/new-provisioned-concurrency-for-lambda-functions/" target="_blank" rel="noopener"&gt;provisioned concurrency&lt;/a&gt; to keep warm instances available with the voice model preloaded in memory.&lt;/p&gt; 
&lt;h3&gt;Detailed solution flows&lt;/h3&gt; 
&lt;p&gt;The following sections walk through each workflow in detail, including the agent prompts, tool implementations, and key code patterns.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Registration flow&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;Registration uses a single agent invoked three times by the frontend, with each invocation performing a distinct function:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;MODE 1:&lt;/strong&gt; Extract identity data from an ID document&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;MODE 2:&lt;/strong&gt; Collect a spoken security phrase and verify it matches the intended text&lt;/li&gt; 
 &lt;li&gt;&lt;strong&gt;MODE 3:&lt;/strong&gt; Complete account creation&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Amazon Bedrock AgentCore Memory maintains conversation context across all three modes. The frontend generates a session ID one time and includes it in all three agent calls. The registration agent saves data from MODE 1 and MODE 2 to memory, then loads that data in MODE 3. The frontend doesn’t store or retransmit sensitive identity information.&lt;/p&gt; 
&lt;p&gt;Because users don’t yet have an account during registration, the frontend uses an &lt;a href="https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-identity.html" target="_blank" rel="noopener"&gt;Amazon Cognito identity pool&lt;/a&gt; with unauthenticated access enabled. This provides temporary &lt;a href="https://aws.amazon.com/iam/" target="_blank" rel="noopener"&gt;AWS Identity and Access Management (IAM)&lt;/a&gt; credentials scoped to two permissions: invoking the registration agent on Amazon Bedrock AgentCore Runtime and calling Amazon API Gateway for &lt;a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/ShareObjectPreSignedURL.html" target="_blank" rel="noopener"&gt;Amazon S3 presigned URLs&lt;/a&gt;. The frontend signs each agent request using &lt;a href="https://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-authenticating-requests.html" target="_blank" rel="noopener"&gt;AWS Signature Version 4 (SigV4)&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;The following prompt instructs the registration agent on how to determine which mode to execute and what tools to call in each case:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```
You are a User Registration Agent.

ROLE: Enroll users with ID verification and biometric capture.

MODE 1 – EXTRACT PASSPORT
When: Only passport_s3_url provided
Steps:
  1. extract_data_from_passport
  2. Extract YEAR from date_of_birth
  3. Build phrase: “My name is FULL_NAME, and I was born in YEAR”

MODE 2 – VERIFY VOICE
When: voice_audio_s3_url + expected_phrase provided
Steps:
  1. verify_spoken_phrase
  2. Return verification result

MODE 3 – COMPLETE REGISTRATION
When: user_id + email provided
Context: Load extraction data from Memory (saved in MODE 1)
Steps:
  1. Load extraction data from Memory
  2. Apply user edits (if data_overrides provided)
  3. extract_face_from_id, create_cognito_user, save_user_profile
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;In MODE 1, the first step of registration, the user uploads a government-issued ID document for identity extraction. The following screenshot shows the Assessment Portal interface for uploading the ID document.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-2-Registration-step-1.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30455 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-2-Registration-step-1.png" alt="Figure 2 Registration step 1" width="636" height="749"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 2: Registration step 1&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;The user uploads a government-issued ID using an Amazon S3 presigned URL. The registration agent calls the &lt;code&gt;extract_data_from_passport&lt;/code&gt; tool through the gateway. The following code shows how the Lambda tool uses Amazon Textract to extract structured fields from the identity document:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
# Inside the registration-tools Lambda function
textract_response = textract.analyze_id(
    DocumentPages=[{'Bytes': image_bytes}]
)

extracted_data = {
    "full_name": "",
    "date_of_birth": "",
    "nationality": "",
    "document_number": ""
}

for field in textract_response['IdentityDocuments'][0]['IdentityDocumentFields']:
    field_type = field['Type']['Text']
    field_value = field['ValueDetection']['Text']

    if field_type in ['FIRST_NAME', 'LAST_NAME']:
        extracted_data["full_name"] = (
            extracted_data["full_name"] + " " + field_value
        ).strip()
    elif field_type == 'DATE_OF_BIRTH':
        extracted_data["date_of_birth"] = field_value
    elif field_type == 'COUNTRY':
        extracted_data["nationality"] = field_value
    elif field_type == 'DOCUMENT_NUMBER':
        extracted_data["document_number"] = field_value
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;The agent generates a personalized security phrase from the extracted data (for example, “My name is Jane Doe, and I was born in 1995”), then saves the extraction data and passport Amazon S3 URL to Amazon Bedrock AgentCore Memory. The following code shows how the agent persists state so that later modes can retrieve it:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
memory_client.create_event(
    memory_id=MEMORY_ID,
    session_id=session_id,  # Links this to MODE 2 and MODE 3
    messages=[
        (user_request, "USER"),
        (json.dumps({
            "mode": "extraction",
            "data": extracted_data,
            "passport_s3_url": passport_url
        }), "ASSISTANT")
    ]
)
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;In MODE 2, the second registration step, the user records themselves saying the personalized phrase. The frontend uploads the recording to Amazon S3 and invokes the registration agent again with the same session ID. The following screenshot shows the Assessment Portal interface for voice verification.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-3-Registration-step-2.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30454 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-3-Registration-step-2.png" alt="Screenshot of the assessment portal showing the voice verification screen with the start recording " width="820" height="1378"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 3: Registration step 2&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;The agent calls the &lt;code&gt;verify_spoken_phrase&lt;/code&gt; tool, which uses Amazon Transcribe to convert the audio to text and compare it against the expected phrase. The following code shows how the tool starts a transcription job and verifies the spoken content:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
# Inside the registration-tools Lambda function
transcribe.start_transcription_job(
    TranscriptionJobName=job_name,
    Media={'MediaFileUri': voice_s3_url},
    MediaFormat='wav',
    LanguageCode='en-US'
)

# Poll until completed, then fetch transcript
transcript_text = get_completed_transcript(job_name)

# Verify that key words from the expected phrase appear in the transcript
expected_words = [w for w in expected_phrase.lower().split() if len(w) &amp;gt; 2]
verified = all(word in transcript_text.lower() for word in expected_words)
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;The following screenshot shows the Assessment Portal interface for voice verification with notification that the voice was verified.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-4-Voice-verification-confirmed.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30453 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-4-Voice-verification-confirmed.png" alt="Screenshot of the assessment portal showing the voice verification screen showing successful recording with its status displayed as recording complete and voice verified. There's a re-record button in the bottom center and back and continue buttons at the bottom." width="789" height="544"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 4: Voice verification confirmed&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;The agent saves the verification result and voice URL to memory using the same session ID.&lt;/p&gt; 
&lt;p&gt;In MODE 3, account creation, the frontend invokes the registration agent a third time with only the email and session ID but no identity data. The agent loads all previous data from memory. The following code shows how the agent retrieves the extraction and verification context saved in earlier modes:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
events = memory_client.list_events(
    memory_id=MEMORY_ID,
    session_id=session_id,  # Retrieves MODE 1 and MODE 2 data
    max_results=10
)

for event in events:
    if '"mode": "extraction"' in event:
        extracted_data = json.loads(event)['data']
        passport_url = json.loads(event)['passport_s3_url']
    if '"mode": "verification"' in event:
        voice_url = json.loads(event)['voice_s3_url']
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;With data loaded from memory, the agent completes registration by invoking three tools in sequence. The following code shows the face extraction tool, which uses Amazon Rekognition to detect and crop the face from the ID document:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
response = rekognition.detect_faces(
    Image={'Bytes': id_image_bytes},
    Attributes=['DEFAULT']
)
bbox = response['FaceDetails'][0]['BoundingBox']

face_image = original_image.crop((left, top, right, bottom))
s3.upload(face_image, f'users/{user_id}/reference_face.jpg')
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;The following code shows the Amazon Cognito account creation tool, which generates a password and creates the user with a permanent password so they can sign in immediately:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
password = secrets.token_urlsafe(12) + "Aa1!"

cognito.admin_create_user(
    UserPoolId=USER_POOL_ID,
    Username=email,
    UserAttributes=[
        {'Name': 'email', 'Value': email},
        {'Name': 'name', 'Value': extracted_data['full_name']},
        {'Name': 'email_verified', 'Value': 'true'}
    ],
    TemporaryPassword=password,
    MessageAction='SUPPRESS'
)

cognito.admin_set_user_password(
    UserPoolId=USER_POOL_ID,
    Username=email,
    Password=password,
    Permanent=True
)
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;Finally, the agent saves the user profile to DynamoDB, linking the Amazon Cognito account to the biometric references in Amazon S3. At this point, the user is registered and ready for authentication. The following screenshot shows successful creation of login credentials.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-5-Registration-complete.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30452 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-5-Registration-complete.png" alt="Screenshot showing successful creation of login credentials with username and password fields in the center and a button to download credentials on the bottom left and a continue to login button on the bottom right." width="661" height="408"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 5: Registration complete&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Authentication flow&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;The following prompt defines the authentication agent’s verification workflow, showing the sequence of tool calls the agent executes for every biometric check:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```
You are a Biometric Verification Agent for secure identity verification.

BIOMETRIC VERIFICATION PROCESS:
1. Call: get_user_profile → Get user_id and reference paths
2. Call: compare_face_with_reference → Face score
3. Call: compare_voice_with_reference → Voice score
4. Check: face match AND voice match → verified = true
5. Call: log_auth_attempt
6. Return verification result with scores
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;To authenticate the password, the user signs in with email and password using an Amazon Cognito user pool. The following code shows the frontend authentication flow:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```javascript
import { signIn, fetchAuthSession } from 'aws-amplify/auth';

const { isSignedIn } = await signIn({
  username: email,
  password: password
});

if (isSignedIn) {
  const session = await fetchAuthSession();
  const idToken = session.tokens?.idToken;
  const cognitoSub = idToken.payload.sub;
}
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;The following screenshot shows the sign-in screen in the Assessment Portal.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-6-Sign-in-page.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30451 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-6-Sign-in-page.png" alt="Screenshot of the sign-in screen showing an email field and a password field with a sign in button in the center of the screen." width="684" height="400"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 6: Sign-in page&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;Amazon Cognito returns a &lt;a href="https://docs.aws.amazon.com/cognito/latest/developerguide/amazon-cognito-user-pools-using-tokens-with-identity-providers.html" target="_blank" rel="noopener"&gt;JSON web token (JWT)&lt;/a&gt; containing the user’s profile information, valid for 1 hour.&lt;/p&gt; 
&lt;p&gt;To verify the biometric, the user captures a 6-second video saying a security phrase. The frontend extracts a still frame and the audio track, uploads both to Amazon S3, then invokes the authentication agent with the JWT bearer token. The following screenshot shows the Identity Verification screen&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-7-Biometric-identity-verification.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30450 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-7-Biometric-identity-verification.png" alt="Screenshot of the identity verification screen showing it verifying an identity. It displays an instruction to clearly say a phrase." width="719" height="516"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 7: Biometric identity verification&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;The agent executes a four-step workflow through Amazon Bedrock AgentCore Gateway tools:&lt;/p&gt; 
&lt;p&gt;1. To look up the user profile, the agent converts the &lt;code&gt;cognito_sub&lt;/code&gt; from the JWT to the internal &lt;code&gt;user_id&lt;/code&gt; by querying a DynamoDB global secondary index. This also returns paths to biometric references from registration.&lt;/p&gt; 
&lt;p&gt;2. Compare the face with the reference. The following code shows the face comparison logic using the Amazon Rekognition CompareFaces API:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
response = rekognition.compare_faces(
    SourceImage={'S3Object': {'Bucket': bucket, 'Name': live_face_key}},
    TargetImage={'S3Object': {'Bucket': bucket, 'Name': reference_face_key}},
    SimilarityThreshold=70
)

similarity = response['FaceMatches'][0]['Similarity']  # 0-100
match = similarity &amp;gt;= 80.0
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;3. To compare the voice with the reference, the agent calls &lt;code&gt;compare_voice_with_reference&lt;/code&gt;, which uses the pre-warmed Resemblyzer model described in the Solution architecture section to generate speaker embeddings and calculate cosine similarity. The following Python code shows the voice comparison logic inside the authentication-tools Lambda container:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
from resemblyzer import VoiceEncoder, preprocess_wav
from scipy.spatial.distance import cosine

encoder = get_voice_encoder()  # Pre-warmed cache

# Preprocess audio files
ref_wav = preprocess_wav(ref_path)
live_wav = preprocess_wav(live_path)

# Generate 256-dimensional speaker embeddings
ref_embedding = encoder.embed_utterance(ref_wav)
live_embedding = encoder.embed_utterance(live_wav)

# Calculate cosine similarity
similarity = 1 - cosine(ref_embedding, live_embedding)
match = similarity &amp;gt;= 0.60```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;4. Log authentication attempt. The following code shows the structured log entry recorded to&lt;a href="https://aws.amazon.com/cloudwatch/" target="_blank" rel="noopener"&gt; Amazon CloudWatch&lt;/a&gt; for audit purposes:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
log_entry = {
    "user_id": user_id,
    "email": email,
    "face_similarity_score": face_score,
    "voice_similarity_score": voice_score,
    "result": "success" if both_passed else "failure",
    "timestamp": datetime.now().isoformat()
}
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;Authentication succeeds only if both face and voice verification pass—an attacker would need to defeat both systems simultaneously. The following screenshot shows the Identity Verified screen with face verification passing at 100% and voice verification passing at 83.3%.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-8-Identity-verified.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30449 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-8-Identity-verified.png" alt="Screenshot of the identity verified screen showing successful face and voice verification, with a continue to assessment button at the bottom." width="707" height="426"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 8: Identity verified&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Exam and evaluation flow&lt;/strong&gt;&lt;/p&gt; 
&lt;p&gt;The exam workflow demonstrates multi-agent coordination using the orchestrator pattern. When a user starts an English reading test, three agents work together to administer the exam, verify identity, and calculate scores.&lt;/p&gt; 
&lt;p&gt;First, the passage is retrieved and recorded. The frontend randomly selects a passage ID and retrieves the passage text by calling the &lt;code&gt;select_reading_passage&lt;/code&gt; tool directly through Amazon Bedrock AgentCore Gateway using MCP protocol. The following code shows how the frontend issues the MCP tool call to fetch a random passage:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```javascript
const randomPassageId = `passage_${Math.floor(Math.random() * 5) + 1}`;

const mcpResponse = await fetch(gatewayUrl, {
  method: 'POST',
  headers: {
    'Authorization': `Bearer ${bearerToken}`,
    'Content-Type': 'application/json'
  },
  body: JSON.stringify({
    "jsonrpc": "2.0",
    "id": 1,
    "method": "tools/call",
    "params": {
      "name": "examination-tools___select_reading_passage",
      "arguments": {"passage_id": randomPassageId}
    }
  })
});
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;The passage is displayed to the user with a brief preview period. The user reads the passage aloud while being recorded, and the video is uploaded to Amazon S3. The passage ID is forwarded to the orchestrator agent so the reading test agent can retrieve the same text for scoring comparison. The following screenshot shows the Reading Test screen with a test in progress.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-9-Reading-test-in-progress.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30448 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-9-Reading-test-in-progress.png" alt="Screenshot of the reading test screen showing the assigned passage and indicating it is recording." width="878" height="492"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 9: Reading test in progress&lt;/em&gt;&lt;/p&gt; 
&lt;p&gt;The frontend invokes the orchestrator agent through JWT bearer authentication with the video URL, user ID, and passage ID. The following prompt shows how the orchestrator is instructed to coordinate two child agents in sequence:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```
You are an Exam Orchestrator for English Interview Assessment.

WORKFLOW:
1. Call reading test agent with video URL, user ID, and passage ID
2. Extract transcription details from response
3. Call evaluation agent with transcription data
4. Combine both results into final response
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;The orchestrator delegates all processing to specialized agents and doesn’t perform transcription, biometric checks, or scoring itself. This solution uses the &lt;a href="https://strandsagents.com/docs/user-guide/concepts/multi-agent/agents-as-tools/" target="_blank" rel="noopener"&gt;agents as tools pattern&lt;/a&gt; from the Strands Agents SDK, where each sub-agent is wrapped as a callable tool. The orchestrator decides when to invoke each agent, the same as it would decide when to call any other tool. The following code shows how the reading test and evaluation agents are defined as tools:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
from strands import Agent, tool

  @tool
  def call_reading_test_agent(video_s3_url: str, user_id: str, passage_id: str = None) -&amp;gt;
  dict:
      """Execute reading test (transcribe + biometrics). Returns test data without
  scores."""
      result = invoke_reading_test_agent(video_s3_url, user_id, passage_id)
      return {"status": "success", "content": [{"text": json.dumps(result)}]}

  @tool
  def call_evaluation_agent(transcribed_text: str, original_text: str, words_data: list,
  duration: float, passage_word_count: int) -&amp;gt; dict:
      """Score reading test results. Returns evaluation scores."""
      result = invoke_evaluation_agent(transcribed_text, original_text, words_data,
  duration, passage_word_count)
      return {"status": "success", "content": [{"text": json.dumps(result)}]}

  # Orchestrator treats sub-agents as tools
  agent = Agent(
      system_prompt=ORCHESTRATOR_PROMPT,
      tools=[call_reading_test_agent, call_evaluation_agent],
      model=model
  )
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;The Strands Agents framework supports additional multi-agent patterns, including swarm, graph, workflow, and agent-to-agent (A2A) protocol for distributed communication. For more details, refer to &lt;a href="https://strandsagents.com/docs/user-guide/concepts/multi-agent/agents-as-tools/" target="_blank" rel="noopener"&gt;Strands Agents Multi-agent Patterns&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;The reading test agent executes six tools in sequence to process the recording. The following prompt defines this workflow:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```
You are a Reading Test Agent.
ROLE: Execute test workflow ONLY. Do NOT calculate scores.

WORKFLOW - EXECUTE ALL 6 TOOLS:
1. select_reading_passage
2. transcribe_reading_audio
3. align_words_to_passage
4. extract_biometric_samples
5. compare_face_with_reference
6. compare_voice_with_reference
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;The following sections describe some of these tools in detail:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Transcription tool&lt;/strong&gt; – The agent sends the video to Amazon Transcribe, which extracts the audio automatically. The following Python code shows how the tool retrieves word-level confidence scores from the transcription result:&lt;/li&gt; 
&lt;/ul&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
transcribe.start_transcription_job(
    TranscriptionJobName=job_name,
    Media={'MediaFileUri': video_s3_url},
    MediaFormat='webm',
    LanguageCode='en-US'
)

words_data = [{
    'word': item['alternatives'][0]['content'],
    'confidence': float(item['alternatives'][0]['confidence']),
    'start_time': float(item.get('start_time', 0)),
    'end_time': float(item.get('end_time', 0))
} for item in transcript_items if item['type'] == 'pronunciation']
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Word alignment tool&lt;/strong&gt; – The agent aligns transcribed words to the original passage using sequence matching. The following Python code shows how every passage word is classified as correct, missing, or low confidence:&lt;/li&gt; 
&lt;/ul&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
import difflib

matcher = difflib.SequenceMatcher(
    None,
    [w.lower() for w in original_text.split()],
    [w.lower() for w in [wd['word'] for wd in words_data]]
)

for i, passage_word in enumerate(original_text.split()):
    passage_word_analysis.append({
        'word': passage_word,
        'position': i + 1,
        'status': determine_status(i, matcher, words_data),
        'confidence': get_confidence(i, matcher, words_data)
    })
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;This shows the status of all passage words, not only words spoken, which prevents gaming.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Biometric extraction tool&lt;/strong&gt; – The agent extracts a face frame and a 5-second audio segment at random timestamps using &lt;a href="https://www.ffmpeg.org/about.html" target="_blank" rel="noopener"&gt;FFmpeg&lt;/a&gt;. The following Python code shows the random extraction approach:&lt;/li&gt; 
&lt;/ul&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```python
duration = get_video_duration(video_path)

frame_time = random.uniform(30, duration)
extract_frame_at(video_path, frame_time, output_path)

audio_start = random.uniform(0, duration - 5)
extract_audio_segment(video_path, audio_start, 5, output_path)
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;Because the extraction point is unpredictable, an attacker can’t prerecord the opening of a session and switch partway through—the genuine test-taker must be present for the full duration&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;strong&gt;Identity verification tool&lt;/strong&gt; – The agent calls the same face and voice comparison tools used during authentication, checking the randomly extracted samples against registration references. Both must pass.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The orchestrator then calls the evaluation agent with the transcription data. The following prompt defines the scoring workflow:&lt;/p&gt; 
&lt;div class="hide-language"&gt; 
 &lt;pre&gt;&lt;code class="lang-python"&gt;```
You are an Evaluation Agent for scoring English reading tests.

WORKFLOW:
STEP 1: Call analyze_word_scores(words_data)
STEP 2: Call compare_with_reference(transcribed, original, words_data)
STEP 3: EVALUATE LANGUAGE QUALITY YOURSELF (no tool needed)
  - Grammar (1-5): How naturally was it read?
  - Coherence (1-5): Did the reading flow logically?
STEP 4: Call calculate_final_score with all metrics
```
&lt;/code&gt;&lt;/pre&gt; 
&lt;/div&gt; 
&lt;p&gt;The agent uses Amazon Bedrock AgentCore Gateway tools for objective metrics—word clarity from Amazon Transcribe confidence scores and reading accuracy using sequence matching—then applies its own foundation model reasoning to assess grammar and coherence. The final score combines accuracy (40%), fluency (25%), speed (15%), grammar (10%), and coherence (10%), mapped to &lt;a href="https://www.coe.int/en/web/common-european-framework-reference-languages/level-descriptions" target="_blank" rel="noopener"&gt;CEFR levels&lt;/a&gt; (A1 through C2) and a pass or fail outcome.&lt;/p&gt; 
&lt;p&gt;The Orchestrator combines responses from both agents and returns a single result to the frontend, which displays the overall score, a breakdown across six scoring dimensions, a word-level analysis grid (green for correct, yellow for low confidence, and red for missing), the CEFR level, and biometric verification status. If biometric verification failed during the exam, results are flagged for manual review. The following screenshot shows the word-level analysis grid.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-10-Word-level-analysis-grid.png" target="_blank" rel="noopener"&gt;&lt;img loading="lazy" class="size-full wp-image-30447 aligncenter" src="https://d2908q01vomqb2.cloudfront.net/9e6a55b6b4563e652a23be9d623ca5055c356940/2026/03/21/Figure-10-Word-level-analysis-grid.png" alt="Screenshot of the word-level analysis grid showing columns of words in green with one word marked with a red X to show it hadn't been read." width="821" height="717"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;p style="text-align: center"&gt;&lt;em&gt;Figure 10: Word-level analysis grid&lt;/em&gt;&lt;/p&gt; 
&lt;h3&gt;Security and data protection&lt;/h3&gt; 
&lt;p&gt;The platform collects biometric data, face images, voice recordings, and exam videos that require careful handling. &lt;a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-lifecycle-mgmt.html" target="_blank" rel="noopener"&gt;Amazon S3 lifecycle policies&lt;/a&gt; can be configured to automatically delete biometric files after a retention period that aligns with an organization’s compliance and data protection requirements. Data is encrypted at rest and in transit, and all authentication attempts are logged to Amazon CloudWatch for audit purposes.&lt;/p&gt; 
&lt;p&gt;Access to tools is controlled through the Amazon Bedrock AgentCore Gateway using OAuth 2.0 machine-to-machine authentication. Each agent must obtain a valid token before invoking any tool, and the gateway can restrict which tools are available to specific agents. This prevents an evaluation agent from accessing user account management tools.&lt;/p&gt; 
&lt;h3&gt;Conclusion&lt;/h3&gt; 
&lt;p&gt;Remote assessment fraud is a growing challenge as education and professional development move online. This post demonstrated how to build a scalable, identity-verified assessment platform using Amazon Bedrock AgentCore, combining specialized AI agents, biometric verification, and serverless architecture.&lt;/p&gt; 
&lt;p&gt;The implementation focuses on English language assessment, but the architecture applies broadly. Professional certification bodies, corporate hiring teams, financial services compliance programs, and healthcare credentialing boards all face similar challenges: verifying that the right person is completing the right assessment. The multi-agent design makes adaptation straightforward—create specialized agents for the new domain, add domain-specific tools to the gateway, and reuse the existing biometric verification components without modification.&lt;/p&gt; 
&lt;p&gt;To learn more about how Amazon Bedrock AgentCore and &lt;a href="https://aws.amazon.com/generative-ai/" target="_blank" rel="noopener"&gt;generative AI&lt;/a&gt; can help your organization build secure, identity-verified assessment systems, contact your AWS account team or contact &lt;a href="https://aws.amazon.com/contact-us/sales-support/" target="_blank" rel="noopener"&gt;AWS sales support&lt;/a&gt;.&lt;/p&gt;</content:encoded>
					
		
		
			</item>
	</channel>
</rss>