Cloud Computing for National Security

OMG Cloud Standards Summit

By G C Network | July 2, 2009

July 13-15, 2009, in Arlington, VA, the Object Management Group, is holding a Standards in Government & NGO’s Workshop. During the first day, the Cloud Computing Standards Summit will focus…

NDU IRM Cloud Computing Event “Sold Out”!!!

By G C Network | July 2, 2009

Hope you’ve already registered for the “The Cloud Computing Symposium” , Wednesday, July 15, 2009 at the National Defense University in Washington, DC! This promises to be the premier government…

SSA’s Jim Borland on Healthcare Information Technology

By G C Network | June 25, 2009

Today, on this week’s Federal News Radio Federal Executive Forum webcast, Mr. Jim Borland, Special Advisor for Health IT, Office of the Commissioner, Social Security Administration(SSA), will discuss the value…

Dr. Leslie Lenert of CDC Speaks on Healthcare IT

By G C Network | June 24, 2009

During this week’s Federal News Radio Federal Executive Forum pre-recording, Dr. Leslie Lenert, Director, National Center for Public Health Informatics (NCPHI) at the Centers for Disease Control and Prevention (CDC),…

Linda Fischetti on VHA Healthcare

By G C Network | June 23, 2009

This week pre-recording of Federal News Radio Federal Executive Forum featured Linda Fischetti , Health Informatics Architect at the Veterans Health Administration (VHA). During a panel discussion, her comments on…

Vish Sankaran, HHS, Speaks on Healthcare IT

By G C Network | June 22, 2009

During the pre-recording of this weeks Federal News Radio Federal Executive Forum, Vish Sankaran, Program Director of Federal Health Architecture, discussed the role of information technology in improving the country’s…

Iranian Protests Showcase Twitter, Facebook, YouTube (and Cloud Computing) !

By G C Network | June 21, 2009

In covering unfolding events in Iran, the world’s most powerful news outlets have been entirely dependent on the Twitter-provided flow of text, images, and video. While this has definitely showcased…

Two Days with AWS Federal

By G C Network | June 18, 2009

Today, I start two days of training with Amazon Web Services (AWS) Federal. If that’s the first time you’ve ever heard about an AWS Federal division, your not alone. Held…

Maneuver Warfare in IT: A Cheerleading Pundit

By G C Network | June 15, 2009

The Twitter conversation between Christofer Hoff and I went like this: Christofer – I haven’t formally blogged a resp. (yet) to @Kevin_Jackson on his ‘maneuver warfare in IT’ Not just a cultural shift but a…

Expanding Maneuver Warfare in IT

By G C Network | June 12, 2009

Earlier this week I published “Cloud Computing: The Dawn of Maneuver Warfare in IT Security” via Ulitzer. In publishing the article my intent was to explore the more dynamic approach…

As the national security community considers cloud computing as an IT infrastructure option, it is surely looking at the value of the cloud in an information sharing world. Implementation of the recently signed Presidential Memoradum on Controlled Unclassified Information is an imporant challenge that may be met by the deployment of a government cloud.

“(1) This memorandum (a) adopts, defines, and institutes “Controlled Unclassified Information” (CUI) as the single, categorical designation henceforth throughout the executive branch for all information within the scope of that definition, which includes most information heretofore referred to as “Sensitive But Unclassified” (SBU) in the Information Sharing Environment (ISE), and (b) establishes a corresponding new CUI Framework for designating, marking, safeguarding, and disseminating information designated as CUI. The memorandum’s purpose is to standardize practices and thereby improve the sharing of information, not to classify or declassify new or additional information.”

DHS has been working hard to develop and execute the appropriate business processes and associated workflows across multiple federal, state and local government information walls. Since the department inherited its IT portfolio from it’s many predecessor organizations, virtualization of their infrastructure into a cloud seems to be a option worthy of study. Server and storage virtualiztion, however, is only the first step. Data and applications must also be virtualized through the adoption of a department-wide services oriented approach. A cloud platform with the appropriate embedded security capabilities seems appropriate.

In this secure cloud computing environment, access management, device management and user management will also be critical deployment aspect.

Follow me at https://Twitter.com/Kevin_Jackson

G C Network

1 Comments

  1. OCHomeTheater on July 5, 2008 at 4:44 am

    cloud computing can play enormous role in national security