SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Cloud Computing for DoD
               Kevin L. Jackson
 Engineering Fellow          Founder & Editor
 NJVC, LLC              Government Cloud Computing
DISCLAIMER
The comments contained in this
presentation are the personal views of Kevin
L. Jackson and do not represent the views
or policy of NJVC or the United States
Government.
Agenda
   DoD Cloud Computing 2009
   DoD Policy and Direction
   DoD Use of Cloud Computing
   What does this mean?
Government Cloud Computing
          2009
DoD Cloud Computing 2009
DoD DISA RACE
 •Garing, CIO of the Defense Information Systems Agency (DISA), believes cloud
 computing will be a driving force in the Department of Defense (DoD). In fact, Garing
 says that although he shares some of the concerns espoused by the IT media (such
 as the danger of hosting multiple applications on a single platform), he, personally, is
 more than optimistic, calling cloud computing „something we absolutely have to do.‟”
 •CollabNet, Appistry, Apptis


DoD JFCOM Valiant Angel
 •Dr. James Heath (Senior Science Advisor to DIRNSA) intends to integrate Valiant
 Angel capabilityy into NSA‟s “Cloud Architecture” and subsequent buildout of P23 at
 Camp Slayer.
 •SAIC, LGS


Intelligence Community
 •“Develop a common “cloud” based on a single backbone network and clusters of
 servers in scalable, distributed centers where data is stored, processed and managed
 •NGA using Appistry with Geoeye for imagery processing
 • Appistry, L-3
MR. ROBERT F. LENTZ DEPUTY ASSISTANT SECRETARY OF DEFENSE,
FOR CYBER, IDENTITY AND INFORMATION ASSURANCE BEFORE THE
 U.S. HOUSE OF REPRESENTATIVES ARMED SERVICES COMMITTEE
  SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS &
                        CAPABILITIES
                         May 5, 2009
                     Cloud computing builds on these ideas to offer a virtual
                     computing fabric with almost limitless and infinitely definable
                     processing and storage capacity. In the future, many enterprises
                     will choose not to invest in their own IT departments, but will pay
                     as they go, relying on ability to access commercial computing
                     services in the cloud. For many DoD applications, the
                     commercial cloud will be too risky, but a private cloud could
                     bring us many benefits. Besides the obvious economic benefits
                     of scalable, on-demand computing, a private cloud also gives us
                     the ideal platform with which to provide the virtual monitoring
                     and provisioning described earlier. A cloud is also an ideal place
                     from which to make capabilities available to the whole
                     enterprise. While, in the DoD, we have encountered challenges
                     moving towards a service-oriented architecture (SOA), in the
                     private sector, companies like Google and Salesforce are
                     basing their business models on an insatiable public hunger for
                     software and applications as a service. Emulating their delivery
                     mechanisms within our own private cloud may be key to how we
                     realize the true potential of net-centricity.
Deputy Assistant Secretary of Defense for
Cyber, Identity, and Information Assurance
                  Strategy
 Capability 7. Mission-based Architecture
 Networks, services, and data organized and optimized for
 mission availability
 Current GIG network segmentation (e.g., NIPRNet, SIPRNet) is
 driven by information confidentiality needs, not by mission
 needs. The primary mission drivers are availability and integrity.
 As reliance on network segmentation for confidentiality
 diminishes through realization of the strategic capabilities
 described above, missions and information enterprise need to
 be co-designed to reduce the mission consequences of adverse
 cyber events. This includes the ability to:
 •Securely realize the promise of platforms, software, and
 infrastructure as services (i.e., “cloud computing”) and evolving
 software development and design methods (i.e. “Web 2.0/3.0”)
 •…
Intelligence Community Requirements



Imperatives for Change           – Discover and access information
                                   required to support our analysis and
  ICD 501
                                   collection missions “on-demand.”
                                 – Meet our objectives for information
                                   sharing.
              IC Information     – Migrate to the Shared Services
              Sharing Strategy     framework that we envision for our
                                   Intelligence Community Enterprise &
                                   Integrated Information
Joint Vison
                                   Environments.
 2015/I2M                        – Reduce costs and improve
                                   efficiencies while maintaining an
                                   agile and resilient enterprise.
US Transportation
            Command
– Amazon.com as a model for implementation of Distribution Process
  Owner (DPO) mission
– http://www.transcom.mil/pa/body.cfm?relnumber=090218-1
National Security Agency

– National Security Agency is taking a cloud computing approach in
  developing a new collaborative intelligence gathering system that will
  link disparate The intelligence agency is using the Hadoop file
  system, an implementation of Google‟s MapReduce parallel
  processing system, to make it easier to “rapidly reconfigure data” and
  for Hadoop‟s ability to scale.MapReduce to address enterprise large
  data problems
– http://www.darkgovernment.com/news/nsa-embraces-cloud-computing/
US Army
– Through a simulated deployment of the 18th Fires Brigade out of Fort
  Bragg, N.C., the NSC seamlessly transferred all of the 18th's data,
  information and services from their home station into a virtual deployed
  environment. Once they hit the ground and plugged into the network,
  they were able to immediately enter the fight with the same systems and
  information that they had trained on at their home base. In the past, units
  would enter a deployed environment and have to operate on a different
  network with different applications, which caused a learning curve and
  delay in that unit's effectiveness.
– fcw.com/Articles/2009/07/08/Army-PEO-EIS-Gary-Winkler.aspx


                                Austere Challenge - Global Network Enterprise
                                Construct (GNEC)
National Geospatial
        Intelligence Agency
– The National Geospatial-Intelligence Agency envisions establishing a
  GEOINT distributed computing cloud, contained within a larger, high-
  performance cloud, to achieve many of the architectural objectives in
  the Department of Defense and intelligence community missions.
– http://www.geospatial-intelligence-forum.com/mgt-archives/94-mgt-
  2009-volume-7-issue-1/716-computing-clouds-cast-geospatial-
  vision.html
US Air Force
– The 10-month project will introduce cybersecurity and analytics
  technologies developed by IBM Research into a cloud computing
  architecture. "Our goal is to demonstrate how cloud computing can be a
  tool to enable our Air Force to manage, monitor and secure the
  information flowing through our network," said Lt. Gen. William Lord, chief
  information officer and chief of warfighting integration for the Air Force.
– http://www.defensesystems.com/Articles/2010/02/04/Air-Force-IBM-
  Cloud-Computing.aspx
US Navy / DISA RACE
                   HADR in Haiti

– INrelief is a US Navy effort that is managed by San
  Diego State University (Registered NGO) to promote
  better interactions and results when disasters strike.
  INrelief is a based primarily on Google technologies.
– https://sites.google.com/a/inrelief.org/about/Home
– http://www.inrelief.org/
Federal Cloud Computing
                     Certification
" [C]loud customers must be able to easily store,
access, and process data across multiple clouds;
weave together a mesh of different services to
meet their needs; and have a way to collaborate
with business partners around the globe.
Federated clouds – networks of interoperable
clouds that work together – will give rise to service
grids which can harmonize technologies, business
processes and policies to provide support across
multiple businesses, industries, and levels of
government. Through such a "network of
networks" the true potential of cloud computing
will be realized.

This is why National Institute of Standards and
Technology (NIST) is charged with leading our
efforts on standards for data portability, cloud
interoperability, and security."

 - Vivek Kundra, April 8, 2010
What Does This All Mean?

 Cloud computing in the DoD and the Intelligence
  Community is REAL !!
 Federal policies and processes to enable rapid
  adoption of cloud computing are being put in place
 Applicable use cases and proof points that extend into
  the operational domain exist.
 System integrators are rapidly building their skills and
  offerings in the area.
 Benefits appear to outweigh security concerns so
  adoption has been relatively rapid.
Thank You !!




http://kevinljackson.blogspot.com           http://govcloud.ulitzer.com
                             Kevin L. Jackson
                           kvjacksn@gmail.com
                              (703) 335-0830

Más contenido relacionado

La actualidad más candente

Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to BottomIstiyak Siddiquee
 
Impact of cloud computing to Asian IT Industry
Impact of cloud computing  to Asian IT IndustryImpact of cloud computing  to Asian IT Industry
Impact of cloud computing to Asian IT IndustryThanachart Numnonda
 
How would cloud computing Effect to Software Industry?
How would cloud computing  Effect to Software Industry?How would cloud computing  Effect to Software Industry?
How would cloud computing Effect to Software Industry?Thanachart Numnonda
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
 
Ventana Research Presents: Best Practices with Hadoop - Real World Data
Ventana Research Presents:  Best Practices with Hadoop - Real World DataVentana Research Presents:  Best Practices with Hadoop - Real World Data
Ventana Research Presents: Best Practices with Hadoop - Real World DataCloudera, Inc.
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]KVH Co. Ltd.
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTAngelo Corsaro
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
 
The Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameThe Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameJanine Anthony Bowen, Esq.
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingCloud Legal Project
 
"Engineering implications of the cloud when applied to the Media" - Mesclado'...
"Engineering implications of the cloud when applied to the Media" - Mesclado'..."Engineering implications of the cloud when applied to the Media" - Mesclado'...
"Engineering implications of the cloud when applied to the Media" - Mesclado'...Mesclado
 
Cloud Computing Building A Framework For Successful Transition Gtsi
Cloud Computing   Building A Framework For Successful Transition   GtsiCloud Computing   Building A Framework For Successful Transition   Gtsi
Cloud Computing Building A Framework For Successful Transition Gtsijerry0040
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & ratingAmit Puri
 

La actualidad más candente (20)

Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to Bottom
 
Impact of cloud computing to Asian IT Industry
Impact of cloud computing  to Asian IT IndustryImpact of cloud computing  to Asian IT Industry
Impact of cloud computing to Asian IT Industry
 
How would cloud computing Effect to Software Industry?
How would cloud computing  Effect to Software Industry?How would cloud computing  Effect to Software Industry?
How would cloud computing Effect to Software Industry?
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 
Virtual Instruments Presentation
Virtual Instruments PresentationVirtual Instruments Presentation
Virtual Instruments Presentation
 
Ventana Research Presents: Best Practices with Hadoop - Real World Data
Ventana Research Presents:  Best Practices with Hadoop - Real World DataVentana Research Presents:  Best Practices with Hadoop - Real World Data
Ventana Research Presents: Best Practices with Hadoop - Real World Data
 
Dispelling the vapor around cloud computing
Dispelling the vapor around cloud computingDispelling the vapor around cloud computing
Dispelling the vapor around cloud computing
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoT
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
CLOUD COMPUTING_proposal
CLOUD COMPUTING_proposalCLOUD COMPUTING_proposal
CLOUD COMPUTING_proposal
 
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENTA REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
 
The Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the GameThe Complexities of Cloud Computing - The Rules are New, But is the Game
The Complexities of Cloud Computing - The Rules are New, But is the Game
 
Cloud versus cloud
Cloud versus cloudCloud versus cloud
Cloud versus cloud
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
 
Serenus White Paper
Serenus White PaperSerenus White Paper
Serenus White Paper
 
"Engineering implications of the cloud when applied to the Media" - Mesclado'...
"Engineering implications of the cloud when applied to the Media" - Mesclado'..."Engineering implications of the cloud when applied to the Media" - Mesclado'...
"Engineering implications of the cloud when applied to the Media" - Mesclado'...
 
Cloud Computing Building A Framework For Successful Transition Gtsi
Cloud Computing   Building A Framework For Successful Transition   GtsiCloud Computing   Building A Framework For Successful Transition   Gtsi
Cloud Computing Building A Framework For Successful Transition Gtsi
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & rating
 

Destacado

Feedback From Federal C I O On Cloud Computing Issues
Feedback From  Federal  C I O On  Cloud  Computing  IssuesFeedback From  Federal  C I O On  Cloud  Computing  Issues
Feedback From Federal C I O On Cloud Computing IssuesGovCloud Network
 
IT-AAC Cloud Acquisition Roadmap
IT-AAC Cloud Acquisition RoadmapIT-AAC Cloud Acquisition Roadmap
IT-AAC Cloud Acquisition RoadmapGovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
25 point-implementation-plan-to-reform-federal it
25 point-implementation-plan-to-reform-federal it25 point-implementation-plan-to-reform-federal it
25 point-implementation-plan-to-reform-federal itGovCloud Network
 
Gov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGovCloud Network
 
Input Fed Focus 2010 Presentation
Input Fed Focus 2010 PresentationInput Fed Focus 2010 Presentation
Input Fed Focus 2010 PresentationGovCloud Network
 
Value Of Cloud Computing For Fed Governmen Oct 8
Value Of Cloud Computing For Fed Governmen Oct 8Value Of Cloud Computing For Fed Governmen Oct 8
Value Of Cloud Computing For Fed Governmen Oct 8GovCloud Network
 
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayValue Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayGovCloud Network
 
Nils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic SlidesNils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic SlidesGovCloud Network
 
NJVC-Virtual Global PaaS white paper
NJVC-Virtual Global PaaS white paperNJVC-Virtual Global PaaS white paper
NJVC-Virtual Global PaaS white paperGovCloud Network
 
Privacy Threshold Analysis
Privacy Threshold AnalysisPrivacy Threshold Analysis
Privacy Threshold AnalysisGovCloud Network
 
Teresa Westfall - DoDIIS Worldwide 2010
Teresa Westfall - DoDIIS Worldwide 2010Teresa Westfall - DoDIIS Worldwide 2010
Teresa Westfall - DoDIIS Worldwide 2010GovCloud Network
 
GSAW Presentation on Cloud Security V2.1
GSAW Presentation on Cloud Security V2.1GSAW Presentation on Cloud Security V2.1
GSAW Presentation on Cloud Security V2.1GovCloud Network
 
Military cloud computing 2011 kevin jackson
Military cloud computing 2011 kevin jacksonMilitary cloud computing 2011 kevin jackson
Military cloud computing 2011 kevin jacksonGovCloud Network
 
NIST Cloud Computing Standards
NIST Cloud Computing StandardsNIST Cloud Computing Standards
NIST Cloud Computing StandardsGovCloud Network
 

Destacado (18)

Feedback From Federal C I O On Cloud Computing Issues
Feedback From  Federal  C I O On  Cloud  Computing  IssuesFeedback From  Federal  C I O On  Cloud  Computing  Issues
Feedback From Federal C I O On Cloud Computing Issues
 
IT-AAC Cloud Acquisition Roadmap
IT-AAC Cloud Acquisition RoadmapIT-AAC Cloud Acquisition Roadmap
IT-AAC Cloud Acquisition Roadmap
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
25 point-implementation-plan-to-reform-federal it
25 point-implementation-plan-to-reform-federal it25 point-implementation-plan-to-reform-federal it
25 point-implementation-plan-to-reform-federal it
 
Gov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_final
 
Sun Cloud Chalk Talk
Sun Cloud Chalk TalkSun Cloud Chalk Talk
Sun Cloud Chalk Talk
 
Input Fed Focus 2010 Presentation
Input Fed Focus 2010 PresentationInput Fed Focus 2010 Presentation
Input Fed Focus 2010 Presentation
 
Yongsan presentation 1
Yongsan presentation 1Yongsan presentation 1
Yongsan presentation 1
 
Value Of Cloud Computing For Fed Governmen Oct 8
Value Of Cloud Computing For Fed Governmen Oct 8Value Of Cloud Computing For Fed Governmen Oct 8
Value Of Cloud Computing For Fed Governmen Oct 8
 
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayValue Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
 
Nils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic SlidesNils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic Slides
 
NJVC-Virtual Global PaaS white paper
NJVC-Virtual Global PaaS white paperNJVC-Virtual Global PaaS white paper
NJVC-Virtual Global PaaS white paper
 
Privacy Threshold Analysis
Privacy Threshold AnalysisPrivacy Threshold Analysis
Privacy Threshold Analysis
 
Dataline SOA-R
Dataline SOA-RDataline SOA-R
Dataline SOA-R
 
Teresa Westfall - DoDIIS Worldwide 2010
Teresa Westfall - DoDIIS Worldwide 2010Teresa Westfall - DoDIIS Worldwide 2010
Teresa Westfall - DoDIIS Worldwide 2010
 
GSAW Presentation on Cloud Security V2.1
GSAW Presentation on Cloud Security V2.1GSAW Presentation on Cloud Security V2.1
GSAW Presentation on Cloud Security V2.1
 
Military cloud computing 2011 kevin jackson
Military cloud computing 2011 kevin jacksonMilitary cloud computing 2011 kevin jackson
Military cloud computing 2011 kevin jackson
 
NIST Cloud Computing Standards
NIST Cloud Computing StandardsNIST Cloud Computing Standards
NIST Cloud Computing Standards
 

Similar a Cloud Computing Adoption by DoD and IC Agencies

Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
Three Strategies to Accelerate Your Agency's Migration to the Cloud
Three Strategies to Accelerate Your Agency's Migration to the CloudThree Strategies to Accelerate Your Agency's Migration to the Cloud
Three Strategies to Accelerate Your Agency's Migration to the CloudGov BizCouncil
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Adoption of CC Mid Term Presentation.pptx
Adoption of CC Mid Term Presentation.pptxAdoption of CC Mid Term Presentation.pptx
Adoption of CC Mid Term Presentation.pptxEr. Bharat Dankoti
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingGovCloud Network
 
Client presentation ibm private modular cloud_082013
Client presentation ibm private modular cloud_082013Client presentation ibm private modular cloud_082013
Client presentation ibm private modular cloud_082013jimmykibm
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 

Similar a Cloud Computing Adoption by DoD and IC Agencies (20)

Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
Three Strategies to Accelerate Your Agency's Migration to the Cloud
Three Strategies to Accelerate Your Agency's Migration to the CloudThree Strategies to Accelerate Your Agency's Migration to the Cloud
Three Strategies to Accelerate Your Agency's Migration to the Cloud
 
cloudcomputing(bashu).ppt
cloudcomputing(bashu).pptcloudcomputing(bashu).ppt
cloudcomputing(bashu).ppt
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Social Media Jamaica
Social Media JamaicaSocial Media Jamaica
Social Media Jamaica
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Adoption of CC Mid Term Presentation.pptx
Adoption of CC Mid Term Presentation.pptxAdoption of CC Mid Term Presentation.pptx
Adoption of CC Mid Term Presentation.pptx
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Cloud.ppt
Cloud.pptCloud.ppt
Cloud.ppt
 
Chapter1
Chapter1Chapter1
Chapter1
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud Computing
 
Client presentation ibm private modular cloud_082013
Client presentation ibm private modular cloud_082013Client presentation ibm private modular cloud_082013
Client presentation ibm private modular cloud_082013
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
G0314043
G0314043G0314043
G0314043
 

Más de GovCloud Network

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmarkGovCloud Network
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for meGovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeGovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in CyberspaceGovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessGovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture GovCloud Network
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin JacksonGovCloud Network
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanGovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefGovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 

Más de GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 
Cloud computing-made-easy
Cloud computing-made-easyCloud computing-made-easy
Cloud computing-made-easy
 

Último

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Cloud Computing Adoption by DoD and IC Agencies

  • 1. Cloud Computing for DoD Kevin L. Jackson Engineering Fellow Founder & Editor NJVC, LLC Government Cloud Computing
  • 2. DISCLAIMER The comments contained in this presentation are the personal views of Kevin L. Jackson and do not represent the views or policy of NJVC or the United States Government.
  • 3. Agenda  DoD Cloud Computing 2009  DoD Policy and Direction  DoD Use of Cloud Computing  What does this mean?
  • 5. DoD Cloud Computing 2009 DoD DISA RACE •Garing, CIO of the Defense Information Systems Agency (DISA), believes cloud computing will be a driving force in the Department of Defense (DoD). In fact, Garing says that although he shares some of the concerns espoused by the IT media (such as the danger of hosting multiple applications on a single platform), he, personally, is more than optimistic, calling cloud computing „something we absolutely have to do.‟” •CollabNet, Appistry, Apptis DoD JFCOM Valiant Angel •Dr. James Heath (Senior Science Advisor to DIRNSA) intends to integrate Valiant Angel capabilityy into NSA‟s “Cloud Architecture” and subsequent buildout of P23 at Camp Slayer. •SAIC, LGS Intelligence Community •“Develop a common “cloud” based on a single backbone network and clusters of servers in scalable, distributed centers where data is stored, processed and managed •NGA using Appistry with Geoeye for imagery processing • Appistry, L-3
  • 6. MR. ROBERT F. LENTZ DEPUTY ASSISTANT SECRETARY OF DEFENSE, FOR CYBER, IDENTITY AND INFORMATION ASSURANCE BEFORE THE U.S. HOUSE OF REPRESENTATIVES ARMED SERVICES COMMITTEE SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS & CAPABILITIES May 5, 2009 Cloud computing builds on these ideas to offer a virtual computing fabric with almost limitless and infinitely definable processing and storage capacity. In the future, many enterprises will choose not to invest in their own IT departments, but will pay as they go, relying on ability to access commercial computing services in the cloud. For many DoD applications, the commercial cloud will be too risky, but a private cloud could bring us many benefits. Besides the obvious economic benefits of scalable, on-demand computing, a private cloud also gives us the ideal platform with which to provide the virtual monitoring and provisioning described earlier. A cloud is also an ideal place from which to make capabilities available to the whole enterprise. While, in the DoD, we have encountered challenges moving towards a service-oriented architecture (SOA), in the private sector, companies like Google and Salesforce are basing their business models on an insatiable public hunger for software and applications as a service. Emulating their delivery mechanisms within our own private cloud may be key to how we realize the true potential of net-centricity.
  • 7. Deputy Assistant Secretary of Defense for Cyber, Identity, and Information Assurance Strategy Capability 7. Mission-based Architecture Networks, services, and data organized and optimized for mission availability Current GIG network segmentation (e.g., NIPRNet, SIPRNet) is driven by information confidentiality needs, not by mission needs. The primary mission drivers are availability and integrity. As reliance on network segmentation for confidentiality diminishes through realization of the strategic capabilities described above, missions and information enterprise need to be co-designed to reduce the mission consequences of adverse cyber events. This includes the ability to: •Securely realize the promise of platforms, software, and infrastructure as services (i.e., “cloud computing”) and evolving software development and design methods (i.e. “Web 2.0/3.0”) •…
  • 8. Intelligence Community Requirements Imperatives for Change – Discover and access information required to support our analysis and ICD 501 collection missions “on-demand.” – Meet our objectives for information sharing. IC Information – Migrate to the Shared Services Sharing Strategy framework that we envision for our Intelligence Community Enterprise & Integrated Information Joint Vison Environments. 2015/I2M – Reduce costs and improve efficiencies while maintaining an agile and resilient enterprise.
  • 9. US Transportation Command – Amazon.com as a model for implementation of Distribution Process Owner (DPO) mission – http://www.transcom.mil/pa/body.cfm?relnumber=090218-1
  • 10. National Security Agency – National Security Agency is taking a cloud computing approach in developing a new collaborative intelligence gathering system that will link disparate The intelligence agency is using the Hadoop file system, an implementation of Google‟s MapReduce parallel processing system, to make it easier to “rapidly reconfigure data” and for Hadoop‟s ability to scale.MapReduce to address enterprise large data problems – http://www.darkgovernment.com/news/nsa-embraces-cloud-computing/
  • 11. US Army – Through a simulated deployment of the 18th Fires Brigade out of Fort Bragg, N.C., the NSC seamlessly transferred all of the 18th's data, information and services from their home station into a virtual deployed environment. Once they hit the ground and plugged into the network, they were able to immediately enter the fight with the same systems and information that they had trained on at their home base. In the past, units would enter a deployed environment and have to operate on a different network with different applications, which caused a learning curve and delay in that unit's effectiveness. – fcw.com/Articles/2009/07/08/Army-PEO-EIS-Gary-Winkler.aspx Austere Challenge - Global Network Enterprise Construct (GNEC)
  • 12. National Geospatial Intelligence Agency – The National Geospatial-Intelligence Agency envisions establishing a GEOINT distributed computing cloud, contained within a larger, high- performance cloud, to achieve many of the architectural objectives in the Department of Defense and intelligence community missions. – http://www.geospatial-intelligence-forum.com/mgt-archives/94-mgt- 2009-volume-7-issue-1/716-computing-clouds-cast-geospatial- vision.html
  • 13. US Air Force – The 10-month project will introduce cybersecurity and analytics technologies developed by IBM Research into a cloud computing architecture. "Our goal is to demonstrate how cloud computing can be a tool to enable our Air Force to manage, monitor and secure the information flowing through our network," said Lt. Gen. William Lord, chief information officer and chief of warfighting integration for the Air Force. – http://www.defensesystems.com/Articles/2010/02/04/Air-Force-IBM- Cloud-Computing.aspx
  • 14. US Navy / DISA RACE HADR in Haiti – INrelief is a US Navy effort that is managed by San Diego State University (Registered NGO) to promote better interactions and results when disasters strike. INrelief is a based primarily on Google technologies. – https://sites.google.com/a/inrelief.org/about/Home – http://www.inrelief.org/
  • 15. Federal Cloud Computing Certification " [C]loud customers must be able to easily store, access, and process data across multiple clouds; weave together a mesh of different services to meet their needs; and have a way to collaborate with business partners around the globe. Federated clouds – networks of interoperable clouds that work together – will give rise to service grids which can harmonize technologies, business processes and policies to provide support across multiple businesses, industries, and levels of government. Through such a "network of networks" the true potential of cloud computing will be realized. This is why National Institute of Standards and Technology (NIST) is charged with leading our efforts on standards for data portability, cloud interoperability, and security." - Vivek Kundra, April 8, 2010
  • 16. What Does This All Mean?  Cloud computing in the DoD and the Intelligence Community is REAL !!  Federal policies and processes to enable rapid adoption of cloud computing are being put in place  Applicable use cases and proof points that extend into the operational domain exist.  System integrators are rapidly building their skills and offerings in the area.  Benefits appear to outweigh security concerns so adoption has been relatively rapid.
  • 17. Thank You !! http://kevinljackson.blogspot.com http://govcloud.ulitzer.com Kevin L. Jackson kvjacksn@gmail.com (703) 335-0830