Microsoft Cloud Is Hosting US Spy Data

Microsoft has announced that the US Defense Department can host secret classified data in its cloud. The announcement means the Defense Department, the military services, intelligence agencies and their industry partners working within secret enclaves can host classified data in Microsoft’s Azure Government Secret cloud, where they’ll have access to new technologies like machine learning.

“This is a hyper-scale cloud with the same innovations and security you would expect, with innovation in areas like artificial intelligence, data, machine learning and of course, security,” said Tom Keane, Microsoft Azure’s head of Global Infrastructure.
 “This environment will allow some of the most secure and important data the US government holds to be realising some of the power we are making available with Azure Government,” Keane added.

The US government designates secret classified information as data that would cause “serious damage” to national security if it were publicly available and requires a secret-level security clearance to view.

Secret data is traditionally distributed through a system of computer networks managed by the Defense and State departments called the Secret Internet Protocol Router Network, or SIPRNet. Microsoft’s Azure Government Secret cloud can now host SIPRNet data, Keane said. “SIPR is the platform with which the US and coalition partners go to war,” Keane told Nextgov. “What SIPR is an example of is a secret enclave. It’s just a very, very large one. If you think about the FBI, the Department of Justice and Department of Homeland Security, all of these organisations have secret-level networks,” Keane said. “So what we’re announcing with Azure Secret is the ability for all those secret networks to be connecting in.”

Keane described Microsoft’s Secret cloud as a physically isolated infrastructure located in a secure facility operating under cleared personnel.

Microsoft is one of several companies, including IBM and Amazon Web Services, that have been beefing up the security of their cloud platforms in an effort to snag business within the Defense Department, which spends nearly $50 billion on information technology each year.

Cloud is even gaining traction in the intelligence community. The National Security Agency runs its Own private cloud and the CIA operates an Amazon-hosted cloud.

NextGov

You Might Also Read:

Cyber Security Risks Of Cloud Computing:

Microsoft Cloud Earnings Beat Expectations:

NSA Using The Cloud To Thwart The Next Snowden:

 

« Hillary Clinton’s Cyber Warfare Warning
M15 Issues A Threat Warning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

TokenOne

TokenOne

TokenOne is a Cyber Security software company that makes it easy to replace passwords, tokens and other forms of authentication with a more secure solution.

Avira

Avira

Avira provide a portfolio of antivirus, security and performance applications for Windows, Android, Mac, and iOS.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

Monegasque Digital Security Agency (AMSN)

Monegasque Digital Security Agency (AMSN)

AMSN is the national authority in charge of the security of information systems in Monaco.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Baker Donelson

Baker Donelson

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity.

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM) is engaged by law enforcement in the UK and overseas to advise on establishing and developing Cyber Resilience Centres (CRCs) for business.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

Exterro

Exterro

Exterro is a leading provider of e-discovery and information governance software specifically designed for in-house legal, privacy and IT teams at Global 2000 and Am Law 200 organizations.

Enginsight

Enginsight

Enginsight provides a comprehensive solution for monitoring and securing your servers and clients.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

Edge Security

Edge Security

Edge Security is an information security research and consulting firm of expert hackers.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.