Single Standard For Cloud-Computing Services The Federal Risk and Authorization Management Program, also known as FedRAMP, is adopting a “cloud-first” policy that will standardize the basic security requirements that cloud-computing providers, such as Google and Microsoft, will have to meet before receiving government contracts. Third-party assessment organizations will be hired to verify whether companies meet the basic security requirements. This change is aimed to improve IT procurement and comes as the government is in the process of transferring computer services, such as e-mails, to cloud-based systems. Technology programs have been shut down in the last months because they have been running
Department of Homeland Security
Sometime back I had written an article on how US government officials had expressed reservations on adopting cloud computing (See: Does Moving to the Cloud work for the US Federal Government?). However, as per the testimonies from several Federal officials before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, it would seem that, in spite of cloud proponent former CIO Vivek Kundra’s departure (See: Will Vivek Kundra’s Departure Affect Government’s Flight to the Clouds?), cloud computing will continue to find favor in the official administration. There have been concerns about security on the cloud, especially in the light of
Department of Homeland Security Licenses TIBCO Software in Multimillion Dollar Deal Palo Alto, CA, October 26, 2011 - TIBCO Software Inc. (NASDAQ: TIBX) today announced a multimillion dollar transaction by the Department of Homeland Security (DHS) for TIBCO software products. TIBCO technology will be used by DHS’s National Protection and Programs Directorate’s National Cyber Security Division to protect and defend the federal executive branch civilian networks – also referred to as the dot-gov domain. DHS efforts are focused on enhancing the cyber security posture of the nation by improving their capacity to prevent, identify, respond to and recover from cyber threats.