Collaboration Can Boost Government Cloud Security, VA and Army Leaders Say
Members of the Cloud Safe Task Force say retaining data can also help protect systems from future attacks.
Securing government cloud systems is necessary to prevent future attacks, emphasized cyber policy experts from the Cloud Safe Task Force, a group working to assess and enhance the security of government cloud infrastructure, on July 1.
Cloud systems are the next targets for adversaries who recently attacked the country’s critical infrastructure, said Cyber Warfare Office for the United States Cyber Command Maj. Julian Petty.
Collaboration and improving partnerships can boost national security, he said.
“It’s a unified data approach with same data tagging, logging, length and duration,” said Petty. “The adversaries are spending upwards of 365 days in our terrain. Why are we keeping only 90 days of retained data?”
The Cloud Safe Task Force consists of four non-profit corporations: MITRE, the Cloud Security Alliance, the Advanced Technology Academic Research Center, and the IT Acquisition Advisory Council. The task force holds semi-regular events and meetings with government and industry leaders examining cloud security.
Officials can feel safer by defining what they are sharing, said Google’s Director for Continuous Assurance Engineering Vikram Khare.
“I think it’s probably the ability to anonymize certain parts of the data sets,” he said. “It’s also going to be on nomenclature and schema. I think that’s really going to be driven by a consensus on what do we actually need to be sharing in addition to what we’re currently sharing.”
Considerations should be made when disclosing information, especially about vulnerabilities, using cloud technology provided by communications service providers (CSP).
“CSPs have a proprietary interest in their competitive advantages and also in protecting their processes and procedures,” said Dave Catanoso, director of Application Hosting, Cloud, and Edge Solutions for the U.S. Department of Veterans Affairs. “Other federal agencies, for example, also protect their internal processes and want to share vulnerabilities to their particular system. So, I think it’s a balancing act of how much information you share, and how you summarize it in a way that doesn’t disclose anything that will give an adversary a chance to act on it or a competitor an opportunity to exploit that against another competitor.”
According to Catanoso, accessing CSPs’ data could lead to improvements across government cloud systems.
“How can they feed us telemetry that would be standardized so that we can consume it and whatever tools we are using for each of our missions, and then get it in a way that is summarized by some form of AI,” he said. “We want to find a way to get telemetry we don’t normally get in a summarized way, telling us what’s happening outside of our space and what’s happening at the layer below our space that we typically don’t operate.”
Catanoso said he believes that one way the CSPs can work with agencies is by providing activity data.
“CSPs can provide a weather map of how much activity is out there in the world,” he said. “What is the source of it, what types of traffic is flowing, and what are the targets? Where are they surging and where are they not active?”
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
Outgoing OPM CIO Reflects on Two-Year Cloud Sprint
Guy Cavallo reflects on his tenure at OPM, where he migrated legacy data centers to the cloud and advanced the agency's tech workforce.
5m watch -
Biden Signs New Tech Executive Orders Before Departing Office
Joe Biden signed two new executive orders this week promoting future cyber and AI priorities before Donald Trump takes office Monday.
5m read -
DODIN Strategy Aims to Outpace Cyber Threats
JFHQ-DODIN Commander Lt. Gen. Paul Stanton says the new "How We Prevail" plan moves from reactive defense to proactive threat mitigation.
4m read -
Preparing for the Future Cyber Landscape
CISA and Rubrik discuss how they’re building cybersecurity best practices and developing their workforces to prepare for the future attack landscape and bolster cyber resilience.
30m watch