Common Threats To Cloud Computing

Common Threats To Cloud Computing

The core agencies of the US government have a central plan, Cloud First, which aims to shift the majority of their operations to the cloud. Before the plan can be implemented, it must go through a process of evaluation by the agencies concerned. In December 2010, a Cloud First policy was released by the Office Of Management and Budget so that federal agencies could implement the shift to cloud computing services if such agencies could find a cost-effective, reliable, and secure cloud computing service. The target was to move three of the core agencies’ technology services by June of the following year.

The Government Accountability Office recently released an overall progress report on the implementation plan. It reported that the Office found common challenges which the organization feels represent a hindrance to the Cloud First initiative. According to the report, one of the common threats is that cloud computing providers must first meet federal security requirements. Each of the government’s core agencies has their own security requirements, which cloud computing suppliers must satisfy first before such suppliers can be provided with a service contract. The problem is that most of these agencies have very strict requirements which suppliers find hard to meet.

Another problem is the incompleteness or insufficiency of current federal guidance for the use of cloud computing services. Guidelines such as assessment of security levels and purchasing must be created in order to hasten cloud computing implementation. A third problem is the acquisition of expertise and knowledge. Most of these agencies may not have the necessary staff, resources, or tools needed to deploy cloud computing services. Such agencies sometimes find it difficult to instruct their staff with the cloud computing tools and processes. Thus, some agencies are reluctant to implement the Cloud First Initiative.

Also, core government agencies have difficulties with the certifications and accreditations of cloud computing suppliers. This is partly because the first operational capabilities of the Federal Risk and Authorization Management Program have not been reached. Another common challenge is that these government agencies must search for cloud computing vendors who can assure interoperability and data portability so that these offices can change suppliers in the future. These core agencies must be able to determine if these vendors have a lock-in with a certain product technology or platform.

There are also cultural barriers within a government agency which must be overcome. Cloud computing may pave the way for leaks of sensitive information to the public. Thus, government agencies are reluctant to move their operations to the cloud. Finally, due to the scalable and on-demand nature of cloud computing solutions, budgeting and contracting may face constraints. It will be difficult to budget for cloud computing services because of the fluctuating costs due to the on-demand and scalable nature of the service. According to the General Accountability Office report, cloud implementations must be planned wisely, and old systems must be retired in order for each government agency to enjoy the benefits of cloud computing, such as the improvement of operational efficiencies and reduction of costs.

By Florence de Borja

Sorry, comments are closed for this post.

Conquering Disease with Artificial Intelligence and IBM Watson

Conquering Disease with Artificial Intelligence and IBM Watson

Artificial Intelligence and IBM Watson Artificial Intelligence, or AI, is growing increasingly pervasive in today’s modern world. Perhaps the most publicized and recognizable application of AI to date, IBM’s Jeopardy-winning computer, Watson, is now being used to help cure cancer. IBM announced the development of Watson for Genomics on Wednesday at the National Cancer Moonshot…

The Fundamentals of Predictive Analysis

The Fundamentals of Predictive Analysis

Predictive Analysis  Article sponsored by SAS Software and Big Data Forum Analytics is playing an increasingly important role in our lives thanks in large part to internet of things (IoT) developments and a greater appreciation of Big Data. With solutions that range across business productivity, health care, individual and national security, new insights are regularly…

Clouding Around With The Unicorns

Clouding Around With The Unicorns

The Social Unicorn Early investors and technology consumers alike love the poignantly named “Unicorn” companies, or private startups that reach the $1 billion valuation. The most recent unicorn spotting is social media game-changer Snapchat, which was recently valued at $16 billion. According to a recent infographic from Alexa discovered via Adweek, Snapchat also proves to…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Increasing Efficiency and Reducing Cost with Managed Printing Services

Increasing Efficiency and Reducing Cost with Managed Printing Services

Managed Printing Services This is a sponsored post written on behalf of HP MPS.  Today’s business leaders recognize the value of shared services, significantly providing a wide range of enterprises with the sophisticated tools they need to compete with big business, while additionally driving costs down. But an area often overlooked in our tech-savvy world…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

The Internet of Things Lifts Off To The Cloud

The Internet of Things Lifts Off To The Cloud

The Staggering Size And Potential Of The Internet of Things Here’s a quick statistic that will blow your mind and give you a glimpse into the future. When you break that down, it translates to 127 new devices online every second. In only a decade from now, every single vehicle on earth will be connected…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help offer you a solution, we’ve compiled a list of 12 Business Intelligence companies…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…