cloud security


A new model for government cloud security

Over the past several years, the federal government has embraced the cloud as a way to manage IT assets and operations. Yet while today's leading cloud platforms adhere to the specific federal access and usage regulations, agencies must still be vigilant about monitoring their security and compliance.

With the proper cloud solution, agencies can take advantage of automatic compliance with critical requirements like the International Traffic in Arms Regulations and Federal Risk and Authorization Management Program and leverage built-in controls and compliance automation for National Institute of Standards and Technology Security Publication (SP) 800-53, Department of Defense Security Requirements Guide IL4 and both physical and technical security.

To get the most out of such solutions, however, agencies must take a thoughtful and judicious approach to managing security in the cloud.

A new model for security

Public clouds operate according to a shared responsibility model for security in which cloud service providers implement security of the cloud, while customers are responsible for security in the cloud. Agencies, therefore, must first understand that their security now has two levels. First, they have to secure their own “stuff” -- everything related to the data they work with --whether that's data in their own repositories or transactions conducted through application programming interfaces and connectors. It also includes the platforms, applications and access/authorization of any aspect of their IT landscape. Second, agencies must monitor the compute, storage, database and networking services of their cloud provider. The cloud environment contains an agency's most valuable assets, and it is very clearly the agency's responsibility to manage and secure it.

Security insight means constant awareness not just of data and applications but also how they are functioning within the cloud environment. In other words, it's about the data, but it's also about how the data is being treated in the cloud. Hackers don't care where data resides, they just want an easy way to get in and access it. When sensitive, confidential or even classified data and assets are at stake, as they will be for government agencies, cloud managers must provide assurances that they can identify issues before they become disasters. Even with rigorous security management from the CSP, agencies must automate their view into, and plans for fixing, risks that arise in their cloud infrastructure.

Increased visibility

A study sponsored by the SANS Institute, Orchestrating Cloud Security, surveyed almost 500 enterprise IT department employees about their cloud infrastructures. It discovered that while 40 percent of organizations said they store or process sensitive data in the cloud, fully one-third of the survey participants said they do not have enough visibility into their public cloud providers’ operations. Cloud providers can demonstrate excellent track records, but agencies cannot presume that a CSP can monitor their intellectual property as well as they can.

A lack of clarity prevents some agencies from being able to fully use their cloud for fear of vulnerabilities. The inability to continuously monitor the state of their data and operations is a major cause of concern among IT leaders because they are on the hook for reducing vulnerabilities of their resources. If they can't spot potential problems or know how a CSP is affecting them, they are failing in their role as protector of their organization’s assets.

Malicious cyber behavior and inadvertent non-malicious mistakes are difficult to anticipate or change, so agencies have to treat security and compliance as a continuously critical priority. Threat intelligence, through monitoring and automated solutions, is the most effective weapon at thwarting the work of hackers, and cloud users have to embrace this mindset and assign corresponding activity to this task.

Embedding security into operations

Federal cloud users that want to increase delivery speed, quality assurance and overall operations have benefitted from a DevOps approach. Although it can help them quickly achieve service mandates, in too many organizations adherence to DevOps has the undesired effect of shortchanging security. For a team dedicated to quick development, detailed security work often gets bypassed in favor of shortcuts and quick fixes that can unfortunately lead to major vulnerabilities. Security, both as an approach and as a tactical activity, must be embedded into the DevOps process. It is important to be specific about security requirements so the DevOps group will be more inclined to adopt it.

Cloud users must take care to assess all new data and application connectors within the context of controls and compliance requirements that were addressed at initial development. As the development is iterative, so too must be security practices that keep the environment safe and compliant. For agencies using a cloud service, this means updating their defense strategy with the limitations and requirements needed to operate in the cloud. It also means that if they adapt both their development and security operations, they can take advantage of continuous monitoring and automated remediation.

Although the cloud can be an essential tool for federal agencies in terms of operations and efficiency, there are still many compliance and security requirements they must meet. Organizations using the cloud should be thoughtful in adopting security solutions that surround their cloud engagement.

About the Author

Sebastian Taphanel is a principal solutions architect with


  • Records management: Look beyond the NARA mandates

    Pandemic tests electronic records management

    Between the rush enable more virtual collaboration, stalled digitization of archived records and managing records that reside in datasets, records management executives are sorting through new challenges.

  • boy learning at home (Travelpixs/

    Tucson’s community wireless bridges the digital divide

    The city built cell sites at government-owned facilities such as fire departments and libraries that were already connected to Tucson’s existing fiber backbone.

Stay Connected