Cloud Computing on Capitol Hill

Cloud Computing on Capitol Hill

Wars. Feuds between world leaders. The frozen-in-motion bull of Wall Street, and the solemn Washington Mall on Capitol Hill. Clouds from nature elegantly rise above it all. They’re too occupied with floating to tend to the political dramas taking place beneath them.

For better or worse, the cloud formed by gifted human ingenuity might be lassoed down to Earth’s governmental concerns sooner than we think.

The White House’s current Chief Information Officer, Steven VanRoekel, has spearheaded Washington’s move into the assets of cloud computing. On December 8, VanRoekel announced the Obama Administration’s plans to integrate substantially more cloud-computing services into standard governmental operations.

This move to the cloud is happening via FedRAMP, or the Federal Risk and Authorization Management Program, described as a “government-wide program” whose aim is the constant “monitoring of cloud products and services.”

It looks as if Congress is also on board with VanRoekel’s dreams to enter the cloud. It passed a 2012 defense bill this past week, which will require the Pentagon to form a plan of action to shift the majority of its data to cloud-computing resources, in the spirit of condensing and fortifying its information. Such consolidation will need to happen by the 1st of April.

The controversy of involving the government in the cloud begins with issues of security. As professionals well versed in the cloud community deeply understand, cloud computing has yet to completely evade any and all threats of security breaches. That holds true for those of us whose data is not even nearly as sensitive or impactful as, say, the storied files of the Pentagon.

Yet this unprecedented gesture of welcome to cloud computing, on behalf of the government, could also reverberate into the goings-on of several of the cloud’s most elite juggernaut organizations. The Big Three — Microsoft, Amazon, and Google — may eventually be approached by Uncle Sam with a cloud supply contract that Capitol Hill initiates.

Such a move could be interpreted as a formal shaking of the hands from one powerful entity in the world, Washington and its representatives of the American public, to another, cloud computing and its equally sizable reach to the people in this country.

Yet the government’s increasing surveillance and interaction with cloud computing could also spell trouble for the freedom inherent to the technology. Political maneuverings are the bread and butter of Capitol Hill. It’s likely that Amazon and the like have already been approached by zealous lobbyists to forge some pork-lined alliance. If the government started to regulate the cloud to ward off such interactions, could cloud computing withstand the blow?

I’m getting ahead of myself, however. For now, the cloud is only serving as a polite, expansive gatekeeper for governmental data. We’ll keep you readers updated on how this development progresses, with fingers crossed for the cloud’s best interest.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…