The US Department Of Energy Is Finally Embracing Cloud Technology

The US Department of Energy is Finally Embracing Cloud Technology

A new DOE paper explains how national labs can migrate to the cloud without compromising security.

I’m sure it won’t come as a shock to anyone in the tech industry (or outside it for that matter) that the US government can be slow to adopt new ideas, but the DOE recently released a paper pushing all of its national labs to embrace cloud technology whenever possible.

The white paper, titled Department of Energy National Laboratories and Plants: Leadership in Cloud Computing, actually puts national labs like Fermi Lab and Lawrence Livermore in the position of having to justify not using cloud computing instead of the other way around.

This is partially just getting DOE agencies in line with the federally mandated 25 Point Plan to Reform Federal Information Technology Management, which originally created the ‘cloud first’ policy. Taking a cue from private enterprise, the government realizes that they would be missing out on huge savings if they continued to do all of their IT work in-house. The report specifically says, “A public cloud provider may be the best way to quickly get services to the business without adding trained staff and infrastructure.”

But what might be a simple migration for some government agencies is quite a bit trickier for the DOE because of their highly sensitive responsibilities.

To give you just one example, the DOE is partially responsible for maintaining US nuclear missile silos. Security is more important for them than practically anyone else on the planet.

The DOE cites IT advisory firm Gartner’s list of seven key security issues that need to be taken into account before moving to the cloud:

1.privileged user access
2.regulatory compliance
3.data location
4.data segregation
5.recovery
6.investigative support
7.long-term viability

It’s a pretty thorough list, and asking each national lab and their already busy personnel to tackle security reviews from scratch would result in a lot of duplicated effort, and probably quite a few security oversights as well.

That’s why the DOE is creating E-RAMP, a common framework for evaluating security issues surrounding cloud computing that all DOE agencies can use. Even though national labs have different goals and responsibilities, they will all use E-RAMP guidelines with the assurance that they are staying in line with DOE and federal regulations and using cloud computing responsibly.

I think this is really exciting for three reasons.

First, it’s a huge boost to cloud advocates like myself who are trying to convince businesspeople that cloud computing is safe. If even national labs working with state secrets are starting to use it, surely corporations should feel confident to migrate to the cloud as well.

Second, one of the main reasons that government is slow to adapt is because bureaucrats can be more concerned with playing it safe than getting the best possible results. E-RAMP tells those bureaucrats that they had better get moving to the cloud, but it also lets them know that as long as they follow E-RAMP they aren’t putting their jobs on the line. That’s a powerful combination for getting things done.

Finally, national labs employ thousands of people working on some of the most difficult computational problems in the world. When these groups move, en masse, to cloud computing they are going to create new challenges for the cloud sector to meet.

My regular readers know that I’m mostly interested in how cloud technology impacts the business world, and that’s just as true with this paper. I’m glad that the DOE, and the rest of the federal government, is coming around to the amazing potential of cloud computing, but I’m even more excited about the business opportunities that are just around the corner.

While the white paper itself might not be the most entertaining read, this new policy is going to spur growth and innovation in our industry for years to come and it’s something we should all be happy about.

Further Reading

Department of Energy National Laboratories and Plants: Leadership in Cloud Computing

By Jan Brass

About Jan Brass

Jan is a tech industry veteran and self-described geek. An avid blogger, Jan covers cloud technology news and publishes opinion pieces on cloud computing on her blog, http://janbrass.org.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation – Protecting Advanced Threats Within The Perimeter

Micro-segmentation Changing with the times is frequently overlooked when it comes to data center security. The technology powering today’s networks has become increasingly dynamic, but most data center admins still employ archaic security measures to protect their network. These traditional security methods just don’t stand a chance against today’s sophisticated attacks. That hasn’t stopped organizations…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Monstrous IoT Connected Cloud Market

The Monstrous IoT Connected Cloud Market

What’s Missing in the IoT? While the Internet of Things has become a popular concept among tech crowds, the consumer IoT remains fragmented. Top companies continue to battle to decide who will be the epicenter of the smart home of the future, creating separate ecosystems (like the iOS and Android smartphone market) in their wake.…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

15 Cloud Data Performance Monitoring Companies

15 Cloud Data Performance Monitoring Companies

Cloud Data Performance Monitoring Companies (Updated: Originally Published Feb 9th, 2015) We have decided to put together a small list of some of our favorite cloud performance monitoring services. In this day and age it is extremely important to stay on top of critical issues as they arise. These services will accompany you in monitoring…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…

Cukes and the Cloud

Cukes and the Cloud

The Cloud, through bringing vast processing power to bear inexpensively, is enabling artificial intelligence. But, don’t think Skynet and the Terminator. Think cucumbers! Artificial Intelligence (A.I.) conjures up the images of vast cool intellects bent on our destruction or at best ignoring us the way we ignore ants. Reality is a lot different and much…