Microsoft Cloud Is Hosting US Spy Data

Microsoft has announced that the US Defense Department can host secret classified data in its cloud. The announcement means the Defense Department, the military services, intelligence agencies and their industry partners working within secret enclaves can host classified data in Microsoft’s Azure Government Secret cloud, where they’ll have access to new technologies like machine learning.

“This is a hyper-scale cloud with the same innovations and security you would expect, with innovation in areas like artificial intelligence, data, machine learning and of course, security,” said Tom Keane, Microsoft Azure’s head of Global Infrastructure.
 “This environment will allow some of the most secure and important data the US government holds to be realising some of the power we are making available with Azure Government,” Keane added.

The US government designates secret classified information as data that would cause “serious damage” to national security if it were publicly available and requires a secret-level security clearance to view.

Secret data is traditionally distributed through a system of computer networks managed by the Defense and State departments called the Secret Internet Protocol Router Network, or SIPRNet. Microsoft’s Azure Government Secret cloud can now host SIPRNet data, Keane said. “SIPR is the platform with which the US and coalition partners go to war,” Keane told Nextgov. “What SIPR is an example of is a secret enclave. It’s just a very, very large one. If you think about the FBI, the Department of Justice and Department of Homeland Security, all of these organisations have secret-level networks,” Keane said. “So what we’re announcing with Azure Secret is the ability for all those secret networks to be connecting in.”

Keane described Microsoft’s Secret cloud as a physically isolated infrastructure located in a secure facility operating under cleared personnel.

Microsoft is one of several companies, including IBM and Amazon Web Services, that have been beefing up the security of their cloud platforms in an effort to snag business within the Defense Department, which spends nearly $50 billion on information technology each year.

Cloud is even gaining traction in the intelligence community. The National Security Agency runs its Own private cloud and the CIA operates an Amazon-hosted cloud.

NextGov

You Might Also Read:

Cyber Security Risks Of Cloud Computing:

Microsoft Cloud Earnings Beat Expectations:

NSA Using The Cloud To Thwart The Next Snowden:

 

« Hillary Clinton’s Cyber Warfare Warning
M15 Issues A Threat Warning »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

Alliance for Cyber Security (ACS)

Alliance for Cyber Security (ACS)

An alliance of all major players in the field of cyber security in Germany with a mission to strengthen Germany’s resistance to cyber-attacks.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

National Forensic Sciences University (NFSU) - India

National Forensic Sciences University (NFSU) - India

National Forensic Sciences University is the world’s first and only University dedicated to Digital Forensic and allied Sciences.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

HolistiCyber

HolistiCyber

HolistiCyber provide state-of-the art consulting, services, and solutions to help proactively and holistically defend against a new era of constantly evolving cyber threats.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

Bastion Security Group

Bastion Security Group

Bastion Security combines the skills, expertise and leadership from Quantum Security, ZX Security, Helix Security and Cassini.