Up-to-date IRAP reference consumer and architectures guidance for Australian open public sector organizations constructing workloads from PROTECTED level
July 2020 in, we announced that 92 Amazon Web Services (AWS) solutions had successfully assessed compliant with the Australian government’s Details Security Registered Assessors Plan (IRAP) for operating workloads at the PROTECTED degree. This enables organizations to utilize AWS to build an array of applications and providers for the advantage of all inhabitants of Australia.
We’re thrilled to announce the publication of the Reference Architectures for ISM PROTECTED Workloads within the AWS Cloud whitepaper and the AWS Consumer Guideline that are available these days in the IRAP documentation package in AWS Artifact. The material provides extra guidance to customers wanting to protected their workloads in AWS Cloud relative to certain requirements of the Australian government’s Information Security Guide (ISM).
The brand new Reference Architectures for ISM PROTECTED Workloads in the AWS Cloud whitepaper contains five example patterns that show how ISM PROTECTED AWS services interact to support the next use cases:
The AWS Customer Guide can be an independently authored guide by Foresight IT Consulting that delivers cloud customers with practical help with the usage of AWS for PROTECTED workloads.
The AWS IRAP PROTECTED documentation helps individual agencies simplify the procedure of adopting AWS services. It enables individual firms to complete their very own assessments and adopt AWS for a broader selection of services.
For the full set of solutions assessed for PROTECTED workloads, start to see the services in scope page (choose the IRAP tab). The assessed AWS providers are available within the prevailing AWS Asia-Pacific (Sydney) Area.
If you have queries about our PROTECTED assessment or wish to inquire about how exactly to use AWS for the highly sensitive workloads, get in touch with your account team.
For those who have feedback concerning this post, submit remarks in the Comments section below.
Want a lot more AWS Security how-to articles, news, and show announcements? Stick to us on Twitter.
You must be logged in to post a comment.