Microsoft Cloud Is Hosting US Spy Data

Microsoft has announced that the US Defense Department can host secret classified data in its cloud. The announcement means the Defense Department, the military services, intelligence agencies and their industry partners working within secret enclaves can host classified data in Microsoft’s Azure Government Secret cloud, where they’ll have access to new technologies like machine learning.

“This is a hyper-scale cloud with the same innovations and security you would expect, with innovation in areas like artificial intelligence, data, machine learning and of course, security,” said Tom Keane, Microsoft Azure’s head of Global Infrastructure.
 “This environment will allow some of the most secure and important data the US government holds to be realising some of the power we are making available with Azure Government,” Keane added.

The US government designates secret classified information as data that would cause “serious damage” to national security if it were publicly available and requires a secret-level security clearance to view.

Secret data is traditionally distributed through a system of computer networks managed by the Defense and State departments called the Secret Internet Protocol Router Network, or SIPRNet. Microsoft’s Azure Government Secret cloud can now host SIPRNet data, Keane said. “SIPR is the platform with which the US and coalition partners go to war,” Keane told Nextgov. “What SIPR is an example of is a secret enclave. It’s just a very, very large one. If you think about the FBI, the Department of Justice and Department of Homeland Security, all of these organisations have secret-level networks,” Keane said. “So what we’re announcing with Azure Secret is the ability for all those secret networks to be connecting in.”

Keane described Microsoft’s Secret cloud as a physically isolated infrastructure located in a secure facility operating under cleared personnel.

Microsoft is one of several companies, including IBM and Amazon Web Services, that have been beefing up the security of their cloud platforms in an effort to snag business within the Defense Department, which spends nearly $50 billion on information technology each year.

Cloud is even gaining traction in the intelligence community. The National Security Agency runs its Own private cloud and the CIA operates an Amazon-hosted cloud.

NextGov

You Might Also Read:

Cyber Security Risks Of Cloud Computing:

Microsoft Cloud Earnings Beat Expectations:

NSA Using The Cloud To Thwart The Next Snowden:

 

« Hillary Clinton’s Cyber Warfare Warning
M15 Issues A Threat Warning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

Altaro Software

Altaro Software

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package.

iHLS Startups Accelerator

iHLS Startups Accelerator

iHLS Accelerator is the first startup accelerator in the world in the security and homeland security field.

Monster Jobs

Monster Jobs

Monster is a global leader in connecting people to jobs, wherever they are. Monster covers all job sectors including cybersecurity in locations around the world.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

Realsec

Realsec

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Reco AI

Reco AI

Reco is an identity-centric SaaS security solution that empowers organizations with full visibility into every app, identity, and their actions to control risk in their SaaS ecosystem.

BlackSignal Technologies

BlackSignal Technologies

BlackSignal Technologies provides cybersecurity, digital signal processing and electronic warfare products to help DOD and IC agency customers counter near-peer threats and security challenges.