Cloud

Public or Private Cloud? The Decision Comes Down to Risk, DISA CIO Says

jules2000/Shutterstock.com

For federal agencies, deciding whether information, data or applications belong in a public or private government cloud or a hybrid combination of the two is no easy feat.

Myriad factors play into these decisions – projected cost savings, information sensitivity and availability, to name a few – but according to U.S. Defense Information Systems Agency Chief Information Officer David Bennett, the single most important element continues to be risk.

DISA recently rolled out a government-operated cloud computing services portfolio called milCloud that was designed to attract Defense Department customers who seek the cloud’s promise of cost reductions combined with increased control, flexibility and mission security necessary for classified and controlled unclassified information.

“You have to understand risk and the data you’re dealing with,” said Bennett, speaking at a Nextgov event Tuesday. “As you look at those things, you have to ask questions like, ‘What controls do I have in place?’ We want to leverage commercial opportunities and reap the benefits of doing that, but we also want to verify and make certain what’s out there and that we’re able to understand and monitor that.”

Defense customers now have an increasing number of commercial cloud service solutions to choose from, at least for their least-sensitive data. Thus far, Autonomic Resources Cloud Platform (ARC-P), CGI Federal's IaaS solution and Amazon Web Services' Government Community Cloud and East/West US Public Cloud have achieved provisional authorization from DISA to handle information at Impact Level 1 and 2, which comprise DoD’s unclassified public and unclassified private information.

Commercial CSPs will begin to be assessed against Impact Levels 3-5, which cover higher-risk unclassified data, in the second quarter of 2014. While draft standards for Impact Level 6 – designated for Defense’s classified data – have not been formally released, it’s clear that CSPs are quickly sailing into the department’s otherwise uncharted cloud territory.  

Bennett stopped short of endorsing DISA’s internal cloud platform over public cloud providers.

“I’m not making a pitch one way or another – I’m not trying to drive you one way or another,” Bennett said, responding to a question from a DoD cybersecurity executive.

“On the government side, there’s been a lot of focus and effort being placed on a highly-secure, well-understood, well-monitored environment,” Bennett said.

The commercial side, Bennett said, probably wasn’t at the “same level of thought and experience from a DoD perspective” in some facets, like how to support a forward-deployed mission in a remote area.

“Going to the commercial cloud is new for us, and we as application owners have to make conscious decisions” of what applications are better suited for public or government cloud, Bennett said. “I don’t think there is any right answer, you have to look at a variety of factors.”

(Image via jules2000/Shutterstock.com)

Threatwatch Alert

Network intrusion / Stolen credentials

Catch of the Day comes clean on 2011 breach of customer data

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
// 5:49 PM ET