Microsoft Cloud Is Hosting US Spy Data

Microsoft has announced that the US Defense Department can host secret classified data in its cloud. The announcement means the Defense Department, the military services, intelligence agencies and their industry partners working within secret enclaves can host classified data in Microsoft’s Azure Government Secret cloud, where they’ll have access to new technologies like machine learning.

“This is a hyper-scale cloud with the same innovations and security you would expect, with innovation in areas like artificial intelligence, data, machine learning and of course, security,” said Tom Keane, Microsoft Azure’s head of Global Infrastructure.
 “This environment will allow some of the most secure and important data the US government holds to be realising some of the power we are making available with Azure Government,” Keane added.

The US government designates secret classified information as data that would cause “serious damage” to national security if it were publicly available and requires a secret-level security clearance to view.

Secret data is traditionally distributed through a system of computer networks managed by the Defense and State departments called the Secret Internet Protocol Router Network, or SIPRNet. Microsoft’s Azure Government Secret cloud can now host SIPRNet data, Keane said. “SIPR is the platform with which the US and coalition partners go to war,” Keane told Nextgov. “What SIPR is an example of is a secret enclave. It’s just a very, very large one. If you think about the FBI, the Department of Justice and Department of Homeland Security, all of these organisations have secret-level networks,” Keane said. “So what we’re announcing with Azure Secret is the ability for all those secret networks to be connecting in.”

Keane described Microsoft’s Secret cloud as a physically isolated infrastructure located in a secure facility operating under cleared personnel.

Microsoft is one of several companies, including IBM and Amazon Web Services, that have been beefing up the security of their cloud platforms in an effort to snag business within the Defense Department, which spends nearly $50 billion on information technology each year.

Cloud is even gaining traction in the intelligence community. The National Security Agency runs its Own private cloud and the CIA operates an Amazon-hosted cloud.

NextGov

You Might Also Read:

Cyber Security Risks Of Cloud Computing:

Microsoft Cloud Earnings Beat Expectations:

NSA Using The Cloud To Thwart The Next Snowden:

 

« Hillary Clinton’s Cyber Warfare Warning
M15 Issues A Threat Warning »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Continuum

Continuum

Continuum is the IT management platform company that allows Managed IT Services Providers to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoints

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Open Raven

Open Raven

Open Raven is the cloud native data security platform that prevents breaches driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents.

AppOmni

AppOmni

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

WinMagic

WinMagic

At WinMagic, we’re dedicated to making authentication and encryption solutions that protect data without causing user friction so that everyone can work freely and securely.

Hawk AI

Hawk AI

Hawk AI’s mission is to help financial institutions detect financial crime more effectively and efficiently using AI to enhance rules and find anomalies.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.

Gcore

Gcore

Gcore is an international leader in public cloud and edge computing, content delivery, hosting, and security solutions.