The US Pentagon Is Speeding-Up Its Cloud Strategy

Amid two high-profile, multibillion cloud procurements, the Defense Department has released its military cloud strategy this month, laying a path forward for how the military branches and Pentagon components will adopt cloud technology.

Key aspects of the strategy are the Pentagon’s desire for both speed in adopting cloud and support from multiple cloud providers. The strategy also takes a “warfighter first” approach, cloud solutions must be built “in a manner that never puts the warfighter at risk”, and emphasises lethality.

The department will embrace a few types of clouds: general purpose clouds, fit-for-purpose clouds and internal clouds. The department’s Joint Enterprise Defense Infrastructure program, for example, will serve as a general cloud available for large-scale computing.

MilCloud 2.0 is considered a fit-for-purpose cloud, though the strategy states such clouds will need authorisation and to operate with the department’s general purpose clouds. Internal clouds would host items such as office tools.  

“At all times, the Defense Department needs to ensure that cloud is addressing the needs of improving military lethality,” the strategy states. “By constantly challenging itself around lethality with red teams, the Defense Department can ensure that the cloud will be positioned to support the challenges of the global environment.”

The strategy makes clear that while the Pentagon will retain some traditional data centers, only cloud computing will “enable the department to harness the full power of its data and information systems.”

Cloud will be the default for storing, accessing and processing data, apps, programs and other IT services, and will “lay the foundation for the Defense Department to accelerating AI and machine learning capabilities,” according to a Pentagon press statement.

“This marks a milestone in our efforts to adopt the cloud and also in our larger efforts to modernise information technology across the Defense Department enterprise,” Defense Department Chief Information Officer Dana Deasy said in a statement.

“A modern digital infrastructure is critical to support the warfighter, defend against cyberattacks and enable the department to leverage emerging technologies like machine learning and artificial intelligence.”

Cloud will be more important than ever in the coming year for the Pentagon. The Pentagon recently released a draft solicitation for its multibillion Defense Enterprise Office Solutions contract, while bids for its $10 billion JEDI contract are under evaluation.

Contracting experts at Deltek also predict 2019 will be the first year the Defense Department spends more than $2 billion on cloud computing.

DefenseOne

You Might Also Read:

Microsoft, Amazon CEOs Vow To Continue Defense Work:

« Russia May Disconnect From The Internet
Will Blockchain Change the World? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Six Degrees

Six Degrees

Six Degrees is a leading secure, integrated cloud services provider. We protect UK organisations and help them thrive in the cloud by giving them secure platforms to innovate and grow.

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

The mission of the PNP Anti-Cybercrime Group is to implement and enforce pertinent laws on cybercrime and other cyber related crimes and pursue an effective anti-cybercrime campaign.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

DigitalWell

DigitalWell

DigitalWell provide fully managed IT and communications solutions for a truly innovative end-to-end experience - for your customers and teams.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Cyro Cyber

Cyro Cyber

Cyro Cyber is a collective of some of the UK’s most experienced and savvy cybersecurity, information assurance, data protection, IT governance and compliance experts.