The US Pentagon Is Speeding-Up Its Cloud Strategy

Amid two high-profile, multibillion cloud procurements, the Defense Department has released its military cloud strategy this month, laying a path forward for how the military branches and Pentagon components will adopt cloud technology.

Key aspects of the strategy are the Pentagon’s desire for both speed in adopting cloud and support from multiple cloud providers. The strategy also takes a “warfighter first” approach, cloud solutions must be built “in a manner that never puts the warfighter at risk”, and emphasises lethality.

The department will embrace a few types of clouds: general purpose clouds, fit-for-purpose clouds and internal clouds. The department’s Joint Enterprise Defense Infrastructure program, for example, will serve as a general cloud available for large-scale computing.

MilCloud 2.0 is considered a fit-for-purpose cloud, though the strategy states such clouds will need authorisation and to operate with the department’s general purpose clouds. Internal clouds would host items such as office tools.  

“At all times, the Defense Department needs to ensure that cloud is addressing the needs of improving military lethality,” the strategy states. “By constantly challenging itself around lethality with red teams, the Defense Department can ensure that the cloud will be positioned to support the challenges of the global environment.”

The strategy makes clear that while the Pentagon will retain some traditional data centers, only cloud computing will “enable the department to harness the full power of its data and information systems.”

Cloud will be the default for storing, accessing and processing data, apps, programs and other IT services, and will “lay the foundation for the Defense Department to accelerating AI and machine learning capabilities,” according to a Pentagon press statement.

“This marks a milestone in our efforts to adopt the cloud and also in our larger efforts to modernise information technology across the Defense Department enterprise,” Defense Department Chief Information Officer Dana Deasy said in a statement.

“A modern digital infrastructure is critical to support the warfighter, defend against cyberattacks and enable the department to leverage emerging technologies like machine learning and artificial intelligence.”

Cloud will be more important than ever in the coming year for the Pentagon. The Pentagon recently released a draft solicitation for its multibillion Defense Enterprise Office Solutions contract, while bids for its $10 billion JEDI contract are under evaluation.

Contracting experts at Deltek also predict 2019 will be the first year the Defense Department spends more than $2 billion on cloud computing.

DefenseOne

You Might Also Read:

Microsoft, Amazon CEOs Vow To Continue Defense Work:

« Russia May Disconnect From The Internet
Will Blockchain Change the World? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

Security Research Labs (SRLabs)

Security Research Labs (SRLabs)

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

Flix11

Flix11

Flix11 is a Cyber Security & ICT Solutions focused company. We provide a range of products and services in Cyber Security, Internet of Things (IoT) and infrastructure solutions.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

Telit Cinterion

Telit Cinterion

Telit Cinterion is a global enabler of the intelligent edge providing highly secure IoT solutions, modules and services.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.