Cloud Computing for National Security

“Cash for Clunkers” Should Have Used the Cloud!

By G C Network | August 24, 2009

Rich Bruklis wrote an excellent essy on how the government missed a perfect opportunity to use cloud computing. In “Cloud Opportunity Missed” he writes: “It appears that the voucher system…

US Navy Experiments With Secure Cloud Computing

By G C Network | August 20, 2009

This week in San Diego, CA the US Navy held the initial planning conference for Trident Warrior ’10. The Trident Warrior series is the premier annual FORCEnet Sea Trial Event…

GSA To Present On Cloud Initiative at NCOIC Plenary

By G C Network | August 13, 2009

A General Services Administration (GSA) representative is now scheduled to provide a briefing on the agency’s cloud computing initiative during a “Best Practices for Cloud Initiatives using Storefronts” session on…

FAA CIO Focuses on Cybersecurity

By G C Network | August 12, 2009

During this week Federal Executive Forum, FAA CIO Dave Bowen mentioned protection against software vulnerabilities, wireless intrusion and website vulnerabilities as his top cybersecurity priorities. As the Assistant Administrator for…

DHS Asst. Secretary Addresses Cybersecurity Priorities

By G C Network | August 11, 2009

Greg Schaffer, Assistant Secretary for CyberSecurity & Communications for the US Department of Homeland Security, sees Trusted Internet Connections, EINSTEIN, and front line defense of the nation’s networks as top…

US DoD Chief Security Officer on Cybersecurity Priorities

By G C Network | August 10, 2009

In a Federal Executive Forum interview, Robert Lentz, Chief Security Officer for the US Department of Defense, highlighted the departments cybersecurity priorities. Mr. Lentz is the Deputy Assistant Secretary of…

Twitter Under Denial of Service Attack

By G C Network | August 6, 2009

Multiple sources are reporting that Twitter continues to be under a denial of service attack. Some are speculating that this represents the power of a coordinated bot network attack. For…

NCOIC Holding Full Day Cloud Computing Session

By G C Network | August 5, 2009

The Network Centric Operations Industry Consortium (NCOIC) will be holding a one-day cloud computing session during its plenary meetings, 21-25 September at the Fair Lakes Hyatt in Fairfax, VA. A…

Sevatec a New Player in the Federal Cloud Computing Market

By G C Network | August 3, 2009

Just in time for the new Federal Cloud Computing Storefront, Sevatec, Inc. is announcing the development of a toolkit to help federal agencies transform their enterprise architectures to cloud computing…

GSA Releases Cloud Computing RFQ

By G C Network | July 31, 2009

Following through on a much anticipated action, GSA released their Cloud Computing Request For Quotation (RFQ) today. Cloud computing is a major part of President Obama’s reform effort and this…

As the national security community considers cloud computing as an IT infrastructure option, it is surely looking at the value of the cloud in an information sharing world. Implementation of the recently signed Presidential Memoradum on Controlled Unclassified Information is an imporant challenge that may be met by the deployment of a government cloud.

“(1) This memorandum (a) adopts, defines, and institutes “Controlled Unclassified Information” (CUI) as the single, categorical designation henceforth throughout the executive branch for all information within the scope of that definition, which includes most information heretofore referred to as “Sensitive But Unclassified” (SBU) in the Information Sharing Environment (ISE), and (b) establishes a corresponding new CUI Framework for designating, marking, safeguarding, and disseminating information designated as CUI. The memorandum’s purpose is to standardize practices and thereby improve the sharing of information, not to classify or declassify new or additional information.”

DHS has been working hard to develop and execute the appropriate business processes and associated workflows across multiple federal, state and local government information walls. Since the department inherited its IT portfolio from it’s many predecessor organizations, virtualization of their infrastructure into a cloud seems to be a option worthy of study. Server and storage virtualiztion, however, is only the first step. Data and applications must also be virtualized through the adoption of a department-wide services oriented approach. A cloud platform with the appropriate embedded security capabilities seems appropriate.

In this secure cloud computing environment, access management, device management and user management will also be critical deployment aspect.

Follow me at https://Twitter.com/Kevin_Jackson

G C Network

1 Comments

  1. OCHomeTheater on July 5, 2008 at 4:44 am

    cloud computing can play enormous role in national security