Russia Is Building A Separate Military Cloud

President Putin announced in March that Russian military had created a wartime digital isolation system that allowed the military to rely and work using internal networks that keeps them electronically separate from the outside world. 

Now the Russian military is building a giant cloud, the latest improvement in its ability to keep operating if its connection to the global Internet is lost, severed, or hacked.

“Russian Armed Forces will receive a…closed ‘cloud’ storage for proprietary and confidential information,” Izvestia reported this week.

The cloud will rely on data centers, built with all-Russian hardware and software at an estimated cost of 390 million rubles (about $6 million) and slated for completion by 2020, the report said. The first center has already been established in the military’s Southern District, an area that includes the illegally annexed Crimean peninsula and portions of battle-struck eastern Ukraine. 

Russian forces have launched multiple information attacks against Ukrainian infrastructure and government since 2014, in what many see as a concerted effort to destabilise the country. The new data center makes the Russian forces operating there less susceptible to Ukrainian counter-attacks.

The cloud will connect to the Closed Transfer Segment, the Russian military’s massive internal network.  Vladimir Putin’s top IT advisor has said that in wartime, the country could disconnect entirely from the global internet and run commercial traffic on the Closed Transfer Segment.

“Russia is investing in military high-tech development, and especially in domestically produced software and hardware. The data centers working with this cloud are all made with ‘Russian components.’ 

Such an approach is key to Moscow ensuring that its key components like data are shielded from potential Western interference,” said Sam Bendett, an associate research analyst at CNA and a fellow in Russia studies at the American Foreign Policy Council. 

“Until recently, many IT components in the military and civilian sectors were Western, that is starting to change.”

The Russian military has determined that big data will be a “significant part in its ongoing modernisation drive, with various digital technologies and approaches getting incorporated and used by the Russian forces,” says Bendett. Of course, having a backup Internet of sorts would decrease the risks from attacking the larger global Internet.

Russia is also making moves to bring its trading partners along with it on its journey into Internet exile. Russia has previously said that it was creating an independent directory naming system, or DNS, in essence the massive database that connects your browser to a web server across the world, for use by Russia, Brazil, India, South Africa, and China, the BRIC countries. 

Russian Foreign Minister Sergey Lavrov recently said that Russia was pursuing an information security agreement with its BRIC counterparts for formally adoption at their July summit in Johannesburg.

Defense One:             Image: President Vladimir Putin & Defense Minister Sergei Shoigu

You Might Also Read: 

Russia Can Disconnect From The Internet:

A New Cold War Will Not Be Based On Hardware:
 

« Banking Botnet Profit Share
Cyber Thesaurus - Vocabulary Pt.1 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

ID Experts

ID Experts

ID Experts is a leading provider of identity protection and data breach services for companies and individuals throughout the USA.

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

Crashtest Security

Crashtest Security

Crashtest Security is a cyber security company that helps digital companies to continuously create secure software with the help of automated vulnerability assessments.

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.

Judy Security

Judy Security

Judy provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.