The US Pentagon Is Speeding-Up Its Cloud Strategy

Amid two high-profile, multibillion cloud procurements, the Defense Department has released its military cloud strategy this month, laying a path forward for how the military branches and Pentagon components will adopt cloud technology.

Key aspects of the strategy are the Pentagon’s desire for both speed in adopting cloud and support from multiple cloud providers. The strategy also takes a “warfighter first” approach, cloud solutions must be built “in a manner that never puts the warfighter at risk”, and emphasises lethality.

The department will embrace a few types of clouds: general purpose clouds, fit-for-purpose clouds and internal clouds. The department’s Joint Enterprise Defense Infrastructure program, for example, will serve as a general cloud available for large-scale computing.

MilCloud 2.0 is considered a fit-for-purpose cloud, though the strategy states such clouds will need authorisation and to operate with the department’s general purpose clouds. Internal clouds would host items such as office tools.  

“At all times, the Defense Department needs to ensure that cloud is addressing the needs of improving military lethality,” the strategy states. “By constantly challenging itself around lethality with red teams, the Defense Department can ensure that the cloud will be positioned to support the challenges of the global environment.”

The strategy makes clear that while the Pentagon will retain some traditional data centers, only cloud computing will “enable the department to harness the full power of its data and information systems.”

Cloud will be the default for storing, accessing and processing data, apps, programs and other IT services, and will “lay the foundation for the Defense Department to accelerating AI and machine learning capabilities,” according to a Pentagon press statement.

“This marks a milestone in our efforts to adopt the cloud and also in our larger efforts to modernise information technology across the Defense Department enterprise,” Defense Department Chief Information Officer Dana Deasy said in a statement.

“A modern digital infrastructure is critical to support the warfighter, defend against cyberattacks and enable the department to leverage emerging technologies like machine learning and artificial intelligence.”

Cloud will be more important than ever in the coming year for the Pentagon. The Pentagon recently released a draft solicitation for its multibillion Defense Enterprise Office Solutions contract, while bids for its $10 billion JEDI contract are under evaluation.

Contracting experts at Deltek also predict 2019 will be the first year the Defense Department spends more than $2 billion on cloud computing.

DefenseOne

You Might Also Read:

Microsoft, Amazon CEOs Vow To Continue Defense Work:

« Russia May Disconnect From The Internet
Will Blockchain Change the World? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Landry & Associates

Landry & Associates

Landry & Associates is a multidisciplinary firm specializing in risk management, performance and technology management.

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

Cybercrime Support Network (CSN)

Cybercrime Support Network (CSN)

CSN is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

Assured Clarity

Assured Clarity

Assured Clarity are a global consultancy, specialising in Risk Management and Data Privacy, through Education, Awareness and Training, throughout an organisation.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.

Code First Girls

Code First Girls

Code First Girls are on a mission to close the gender gap in the tech industry by providing employment through free education.

Career Smarter

Career Smarter

Career Smarter offers accredited online courses in cybersecurity and other sectors, helping learners gain industry-recognised certifications.

Socket

Socket

Socket protects software applications and critical services from malware and security threats originating in open source code.