Russia Is Building A Separate Military Cloud

President Putin announced in March that Russian military had created a wartime digital isolation system that allowed the military to rely and work using internal networks that keeps them electronically separate from the outside world. 

Now the Russian military is building a giant cloud, the latest improvement in its ability to keep operating if its connection to the global Internet is lost, severed, or hacked.

“Russian Armed Forces will receive a…closed ‘cloud’ storage for proprietary and confidential information,” Izvestia reported this week.

The cloud will rely on data centers, built with all-Russian hardware and software at an estimated cost of 390 million rubles (about $6 million) and slated for completion by 2020, the report said. The first center has already been established in the military’s Southern District, an area that includes the illegally annexed Crimean peninsula and portions of battle-struck eastern Ukraine. 

Russian forces have launched multiple information attacks against Ukrainian infrastructure and government since 2014, in what many see as a concerted effort to destabilise the country. The new data center makes the Russian forces operating there less susceptible to Ukrainian counter-attacks.

The cloud will connect to the Closed Transfer Segment, the Russian military’s massive internal network.  Vladimir Putin’s top IT advisor has said that in wartime, the country could disconnect entirely from the global internet and run commercial traffic on the Closed Transfer Segment.

“Russia is investing in military high-tech development, and especially in domestically produced software and hardware. The data centers working with this cloud are all made with ‘Russian components.’ 

Such an approach is key to Moscow ensuring that its key components like data are shielded from potential Western interference,” said Sam Bendett, an associate research analyst at CNA and a fellow in Russia studies at the American Foreign Policy Council. 

“Until recently, many IT components in the military and civilian sectors were Western, that is starting to change.”

The Russian military has determined that big data will be a “significant part in its ongoing modernisation drive, with various digital technologies and approaches getting incorporated and used by the Russian forces,” says Bendett. Of course, having a backup Internet of sorts would decrease the risks from attacking the larger global Internet.

Russia is also making moves to bring its trading partners along with it on its journey into Internet exile. Russia has previously said that it was creating an independent directory naming system, or DNS, in essence the massive database that connects your browser to a web server across the world, for use by Russia, Brazil, India, South Africa, and China, the BRIC countries. 

Russian Foreign Minister Sergey Lavrov recently said that Russia was pursuing an information security agreement with its BRIC counterparts for formally adoption at their July summit in Johannesburg.

Defense One:             Image: President Vladimir Putin & Defense Minister Sergei Shoigu

You Might Also Read: 

Russia Can Disconnect From The Internet:

A New Cold War Will Not Be Based On Hardware:
 

« Banking Botnet Profit Share
Cyber Thesaurus - Vocabulary Pt.1 »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

Devo Technology

Devo Technology

Devo Security Operations is a next-gen cloud SIEM that enables you to gain complete visibility, reduce noise, and focus on the threats that matter most to the business.

CybelAngel

CybelAngel

CybelAngel is a leading digital risk protection platform that detects and resolves external threats before these wreak havoc.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

Samoby

Samoby

Samoby provide a subscription solution for Mobile Threat Protection and usage control on Android and iOS devices.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

Point Wild

Point Wild

Point Wild is a holding company that acquires, integrates and manages a diverse portfolio of best-in-class cybersecurity brands for consumers and enterprises.

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

NCIIPC's mission is to protect the Critical Information Infrastructure of India, from unauthorized access, modification, use, disclosure, disruption, incapacitation or destruction.

Security Mind

Security Mind

Security Mind is an innovative Cyber Security Awareness program that aims to increase the awareness of each member of the organization and develop the ability to recognize potential cyber threats.