Ministry of Electronics and Information Technology
(MeitY)
Overview
Ministry of Electronics and Information Technology (MeitY) embarked on MeghRaj cloud initiative to harness the benefits of Cloud Computing and accelerate delivery of e-services. MeitY undertakes empanelment of Cloud Service Offerings of the Cloud Service Providers (CSPs) that includes compliance to the empanelment requirements followed by an audit by Standardisation Testing and Quality Certification (STQC). MeitY empanelment is an important criterion for procurement of Cloud Services by Public Sector Units (PSUs), Nationalized Banks, Financial Institutions and Government Agencies / Autonomous Institutions / Statutory Bodies under Government of India / States / UTs and Local Governments within India.
Amazon Web Services India Private Limited, a reseller of Amazon’s Cloud Services (AWS Cloud Services), has Cloud Service Provider (CSP) empanelment from MeitY for cloud services offered from the AWS Asia-Pacific (Mumbai) and AWS Asia Pacific (Hyderabad) Regions. AWS Regions are designed to be autonomous and each AWS Region consists of a minimum of three, isolated, and physically separate Availability Zones (AZs) within a geographic area. The empanelment letters are available on AWS Artifact: AWS Asia Pacific (BOM) and AWS Asia Pacific (HYD). For more information, including the current status of the empanelment of AWS cloud services, please refer Empanelment extension letter. AWS current empanelment status is available on the MeitY website. AWS also undergoes annual surveillance audit by STQC to ascertain continuous compliance of AWS with the MeitY empanelment terms and conditions.
AWS is architected to be one of the most secure global cloud infrastructure on which to build, migrate, and manage applications and workloads. Security and Compliance is a shared responsibility between AWS and the customer. AWS offers breadth of Security, Identity, & Compliance services that the customer (or their managed service providers) can use to manage and reduce security risk, and protect their networks and data. Please visit Best Practices for Security, Identity & Compliance page for further details.