Opinion: The CIA and the Cloud

Amazon Web Services will help the intelligence agency build a private Cloud infrastructure

If your company mistrusts the security of the Cloud, it might want to take a look at what The Company is doing.

"The Company" is a term that insiders have long used to refer to the CIA. Is there any organization that takes security more seriously? Perhaps, but probably not within the Fortune 500. And yet the CIA appears to be moving to the Cloud.

Seriously. According to FCW, a publication that tracks the intersection of government and technology, the CIA has agreed to a Cloud computing contract with Amazon that may be worth up to $US600 million over 10 years. Specifically, Amazon Web Services will help the intelligence agency build a private Cloud infrastructure.

What? You expected the CIA to put its secrets on the Amazon EC2? I don't think so!

But get this: One reason the CIA started moving to Cloud-based computing in 2009 was that it saw the Cloud as being more secure than conventional IT systems. Back then, Jill Tummler Singer, who was the CIA's deputy CIO at the time, said, "By keeping the Cloud inside your firewalls, you can focus your strongest intrusion-detection and -prevention sensors on your perimeter, thus gaining significant advantage over the most common attack vector - the Internet."

While we don't know exactly how the CIA will be using Amazon's services, it's a safe bet that it will be creating its own private Clouds. But the hardware used for those Clouds might not be hosted on the grounds of the CIA's Langley, Va., headquarters. Instead, the agency's Cloud hardware may well end up hiding out somewhere in Amazon's mammoth U.S. East data center, located in nearby Ashburn, Va. Why? Well, just like any other government agency or private business, the CIA wants to save money in its IT budget.

Now, I'd have to say that if the CIA trusts the Cloud, just about anyone can trust it -- provided, of course, that you always keep your eye on security and make sure you and your vendor are taking the steps necessary to safeguard your data. As Michael McConnell, former director of the National Security Agency, said last year, "The economics of the cloud are so compelling they can't be denied. [But] we have to get the security aspects right."

How do you do that? The CIA isn't likely to tell you, or to leak its Cloud plans in the next season of Homeland. But there are guidelines from groups such as the European Network and Information Security Agency on how IT shops should handle public cloud vendors and monitor their security measures.

Don't treat moving to the Cloud as some kind of commodity purchase. You are always going to need to do your homework to make sure that your cloud-based services are properly kept up to date and use best security practices.

As Mark Gilmore, president and co-founder of Wired Integrations, a California-based technology consulting firm, recently observed, if your "people fail to meet security standards, such as using complex passwords, and leave machines running for days on end, the likelihood of intrusion is going to increase and eventually resources will be hacked." In short, security basics remain the same, whether you use cloud-based systems or have an in-house client/server setup.

The Company knows that, and so should your company.

Steven J. Vaughan-Nichols has been writing about technology and the business of technology since CP/M-80 was cutting-edge and 300bps was a fast Internet connection -- and we liked it! He can be reached at sjvn@vna1.com.

Read more about cloud computing in Computerworld's Cloud Computing Topic Center.

Join the CSO newsletter!

Error: Please check your email address.

Tags Amazon Web Servicessecuritycloud computingCIOinternet

More about Amazon Web ServicesEUNational Security AgencyNSARSATopic

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Steven J. Vaughan-Nichols

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place