Upload
kevin-jackson
View
221
Download
0
Embed Size (px)
Citation preview
8/4/2019 NJVC Cloud Computing for Government FINAL
1/19
1NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Overview:
Implementation of Cloud
Computing Solutions in FederalAgencies
An NJVC Executive White Paper
Kevin L. JacksonGeneral Manager, Cloud Services
September 2011
8/4/2019 NJVC Cloud Computing for Government FINAL
2/19
2NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
The Obama administration has publicly identified cloud computing as a viable solution to help cut the
federal budget. The administration adopted a cloud-first policy as part of its 25-point IT reform plan
For the federal government, the evolution to the cloud is not something to consider in the future
it is something to put into operation today.
Executive Summary
Cloud computing is a game changer. The value of the new approach of cloud computing to theprovisioning and consuming information technology lies within its ability to enable more efficientand effective information sharing. Its merit is not just in cost savings, but in enhanced mission andbusiness enhancements and improved allocation of resources. Its characteristics not onlydramatically transform how an IT infrastructure is managed, but also the traditional roles ofenterprise IT professionals to a more service management orientationas they becomeresponsible for helping their internal customers better use the externally provided IT services.Building a cloud computing roadmap is essential to unlocking the value of the cloud in a predictablefashion with acceptable risk. This paper outlines the essential steps to constructing a solid cloudcomputing roadmap.
As a young approach, cloud computing is not without itschallenges. Few established tools, procedures and formats,potential risks exist. Primary challenges exist in securitycontrolsparticularly related to the protection of sensitive
datalack of federal regulations and compliance standards, anddata sovereignty.
The benefits of cloud computing are recognized by the federalgovernment, including the defense and intelligencecommunities. Dialogue on cloud computing has been ongoingwithin the government for years, but agencies are still in theearly stages of implementing and adopting this new ITapproach. The Obama administration has publicly identifiedcloud computing as a viable solution to help cut the federalbudget. The administration adopted a cloud-first policy as partof its 25-point IT reform plan, which mandates all federal
agencies to develop and implement one cloud-based solution byDecember 2011 and three such solutions by June 2012. For thefederal government, the evolution to the cloud is not somethingto consider in the futureit is something to put into operationtoday.
The government can learn many lessons from the private sector pertaining to the implementationof cloud computing solutions, as the private sector embarked on the journey to the cloud some timeago. These valuable lessons include the need to expect a multi-year transition to the cloud, use aconsistent cloud opportunity identification process to reduce the risk of project failure andformulate appropriate metrics (economic, operational and service) that are directly tied to mission.
8/4/2019 NJVC Cloud Computing for Government FINAL
3/19
3NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
For intelligence professionals, the use of cloud computing can not only make the automation of the
interpretation of documents and translation of data into operationally relevant entities and events
possible, but it enables real-time continuous processing of the now digital document flow of our
adversaries.
Use of a gate-driven cloud adoption process designed to terminate failed projects early in theproject lifecycle and deliver measurable capabilities within a quick timeframe is recommended.
The defense and intelligence communities require utility computing methods that scale on demandand enable self discovery and self-service access to secure, timely and relevant information insupport of mission. Designing software independence from the hardware through the use of cloud
computing solutions allows an operating system, applications and data to live across theenterprise and is fundamental to the transformation of compute, storage and network functionality.
Facing an estimated $178 billion in budget cuts during the next several years, the Department ofDefense is exploring a number of administrative and structural cost-cutting measuresand IT isone of the first areas for consideration. Defense Secretary Robert Gates recently stated that theagency is reviewing how to reform how it currently uses IT, which costs the agency approximately$37 billion annually. DoD is in the process of consolidating hundreds of data centers and utilizingcloud computing in this shift, and the fact that the defense community is beginning to explore cloudcomputing through various smaller-scale projects is promising to proponents.
For intelligence professionals, the use of cloud computing can not only make the automation of theinterpretation of documents and translation of data into operationally relevant entities and eventspossible, but it enables real-time continuous processing of the now digital document flow of ouradversaries. This commodity also removes the human from this tedious task, allowing intelligenceprofessionals to apply higher order professional analysis and insight.
The human-based documentation exploitation process has led to a reliance on operationallyproven processes and filters. Instantiated by the use of multi-page structure query language (e.g.,Boolean) and the ubiquitous goal of obtaining an appropriate working set of data, these processeswere born from the need to meet critical decision timelines within a computationally inadequateenvironment. Cloud techniques and technologies can now be used to work on all the data. And withan ability to leverage the power of a supercomputer at will, the working set requirement is now ananachronism and critical decision timelines can now be more easily met.
Cloud computing can uniquely address important issues associated with mission supportparticularly related to its ability to remove information silos among various organizations that have
joined forces on the same mission. Moving IT operations to the cloud assists in enhancedcollaboration to meet mission needs. It is critical to our national defense. As a bonus, cloudcomputing also can improve IT enterprise efficiencies and incur marked cost savings during projectlifecycles to alleviate some of the pressure of budget reductions for the defense and intelligenceagencies.
8/4/2019 NJVC Cloud Computing for Government FINAL
4/19
4NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Different cloud computing deployment models are actually changing what it means to be an IT
professional This transition puts the enterprise IT professional into a service management role,
responsible for helping his or her internal customers better use externally provided IT services.
Introduction
Cloud computing is a new approach in the provisioning and consumption of information technology(IT). While technology is a crucial component, the real value of cloud computing lies in its ability toenable new capabilities or in the execution of current capabilities in more efficient and effectiveways.
Although the current hype around cloud computing has focused on expected cost savings, the truevalue is really found in the mission and business enhancements these techniques can provide.When properly deployed, the cloud computing model provides greatly enhanced mission andbusiness capability without a commensurate increase in resource (time, people or money)expenditures.
Cloud Computing: Changing the Game
The use of commodity components, coupled with highly automated controls, enable cloudcomputing.1 These characteristics also enable the economic model that makes it so disruptive to the
status quo. As an example, the software-as-a-service cloud delivery model typically does notrequire any advance usage commitment or long-term contractual arrangements. SaaS not onlychanges the typical software vendor business model, but also radically changes the strategy,budgeting, buying and management options for the buyer. When Salesforce.com proved theviability of SaaS, the software subscription model was instantly endangered as a profitable businessmodel. Amazon Web Services is similarly attacking data center hosting with its Virtual PrivateDatacenter Infrastructure as a Service (IaaS) offering.
Looking at this phenomenon from another angle, different cloud computing deployment models areactually changing what it means to be an IT professional. Since the days of the first computer, ITworkers have prided themselves in their ability to design, build, operate and fix the enterprisehardware and software components that comprise the IT lifeblood of organizationsboth in thepublic and private sectors. These tightly knit teams worked hard to keep these custom-madeplatforms updated, patched and ready to meet daily business and mission requirements. In thecloud computing world, IT infrastructure that is not delivering differentiating value is viewed asworthless cost. Critical business applications like email, Customer Resource Management (CRM),
Human Resource Management and Enterprise Resource Planning are being routed to more capablecloud providers of these same services. This transition puts the enterprise IT professional into aservice management role, responsible for helping his or her internal customers better useexternally provided IT services. The new enterprise IT department is more a services organizationthan the traditional delivery organization.
8/4/2019 NJVC Cloud Computing for Government FINAL
5/19
5NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
The new cloud economic model also radically changes the view of whats actually possible.Traditional IT procurement and provisioning processes have historically driven timelinesassociated with the delivery or fielding of improved information and data processing capabilities.Multiple threads of development, test, training and maintenance can also tax an organizationsshort- and long-term financial resources. IaaS and Platform as a Service options can not onlyeliminate or limit capital expenditures, but can reduce or eliminate the expectation of operations
and sustainment costs. The time required to realize mission or business value also is substantiallyreduced. With these differences, the impossible can suddenly become not only possible, but oftencan lead to new mission capabilities or brand-new cloud-enabled, revenue-generating businesses.
Challenges of Cloud Computing
Despite the myriad benefits of cloud computing solutions, several challenges still exist. Being ayoung industry, there are few tools, procedures or standard data formats or service interfaces inplace to guarantee data, computer application and service portability. As evidenced with the recentsituation involving the services failure of Amazons Elastic Compute Cloud, outages can be apotential riskand can have widespread implications for consumers of cloud services. This risk
becomes even more severe if a mission-critical environment could be impacted.
A benefit as well as a challenge, security concerns have also slowed the widespread adoption ofcloud computing. A variety of security concerns exist. According to the article, Three CloudComputing Risks to Consider, in Information Security Magazine(June 2009), the logging andauditing controls provided by some [cloud] vendors are not yet as robust as the logging providingwithin enterprises and enterprise applications, which can put critical and sensitive data andinformation at risk. Security, of course, becomes increasingly critical in defense and intelligence ITenvironments.
For the government market, the lack of regulations and compliance standards are also cause forconcern. Currently, no federal regulations are in place to govern cloud computing, and according to
an April 2011 Information Systems Audit and Control Association survey of 1,800 Chief InformationOfficers (CIOs), compliance is a top risk. Approximately 30 percent of the CIOs surveyed said thatcompliance projects are the biggest driver for IT risk-related projectsparticularly in publicclouds. Specific to federal environments, data sovereignty is a challenge. According to a speechgiven by former Federal CIO Vivek Kundra at an April 7, 2010, National Institute of Standards andTechnology (NIST) forum," [Data sovereignty] is not going to be a question of technology. [Datasovereignty] is going to be a question of international law, and treaties that we will need to engagein the coming years. CIO Kundra later added: We've got a very diverse interpretation and a verydiverse perspective when it comes to privacy or international security, if you look at ourneighborsCanada or Mexicoversus what's happening in the European Union.
8/4/2019 NJVC Cloud Computing for Government FINAL
6/19
6NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Source: 25-Point Implementation Plan to Reform Federal
Information Technology Management, February 2009
Cloud Computing and the Federal Government
The Obama administration has identified cloud computing as a means to achieve savings in ITbudgets across federal agenciesacross the boardand to address various other challenges (e.g.,delays to capabilities and other inefficiencies) that have negatively impacted IT implementations. In
his Fiscal Year (FY) 2011 budget, President Barack Obama ordered a three-year freeze in spendingfor non-defense, intelligence and national security programs and the trimming of the budgets ofsome federal agencies by five percent. At a July 1, 2010, House subcommittee hearing, CIO Kundratestified: To do more than less [in terms for federal spending], we need game changingtechnologies. Cloud computing is one such technology.
The federal government is in the early stages of a decade-long process to move to the cloud, buthas taken definitive steps in its adoption. Several key milestones have been achieved during thepast two years in support of this effort:
2009: Establishment of the General Services Administration (GSA) Cloud ComputingProgram Office to coordinate the governments cloud computing efforts; assembly of apublic-private sector Industry Summit to discuss the benefits and risks of cloud computing;
and creation of Security and Standards Working Groups to encourage collaboration anddiscussion on cloud computing by federal agencies 2010: Commencement of the development of federal security certification and
accreditation processes for cloud services; convening of a NIST-hosted, public-privatesector Cloud Computing Forum and Workshop to collaboratively develop cloud standards;release of 25-point federal IT reform plan; announcement by GSA and Federal ChiefInformation Officers Council on the requirements for the Federal Risk and AuthorizationManagement Program, a standard approach for the federal government to access andauthorize secure cloud-computing services and products
2011: Release of the Federal Cloud Computing Strategy (per the Obama administrations25-point IT reform plan) and award of 12 GSA IaaS blanket purchase agreements
The Obama administrationadopted a cloud-first policy aspart of its earlier referenced 25-point federal IT reform plan. Thisplan was developed afterextensive review of federal ITprojects with a particularly hardeye on 26 large-scale projects atrisk due to being over budget andbehind schedule. This policy is partof the 2012 budget process.
One of the first steps in the cloud-firstadoption is the requirement for everyfederal agency to develop and implement one cloud-based solution by December 2011 and threecloud-based solutions by June 2012. As of April 2011, agencies are making progress in thisendeavor.
8/4/2019 NJVC Cloud Computing for Government FINAL
7/19
7NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Source: Federal Cloud Computing Strategy,Office of t
Chief Information Officer, Executive Office of the Presiden
United States, Feb. 14, 2011
During a special White House event, CIO Kundra said that CIOs from 15 agencies have alreadyinformed the Office of Management and Budget that they will evolve to cloud-based email solutionsby the December 2011 deadline.
Cloud computing also has been identified by the Obamaadministration as a viable solution to the administrations
challenge to cut the federal budget via the consolidation of800 of the governments 2,094 data centers by 2015. CIOKundra has specifically identified cloud computing as acentral measure to reduce the costs and increase theefficiencies of federal data centers. Cost savings are alreadybeing achieved. At an April 12, 2011 Senate subcommitteehearing, Dave McClure, Associate Administrator, GSA Officeof Citizen Services and Innovative Technologies, testified thatthe consolidation of just 12 data centers to three will save $2million a year. Mr. McClure also testified that GSAs move to acloud-based email system will save $15 million over thenext five years.
So, whether or not federal agency CIOs support cloudcomputing, the evolution to the cloud in their specific IT environments is not something to considerin the future: it is something to undertake todayand is mandated. Therefore, the way the federalgovernment conceives of IT operations must change from traditional practices and operatingsystems to new enterprise resource controls, standards and business processes and operations.With the computing stacks functioning as a utility within the infrastructure as a platform and newbusiness processes in place, highly automated resources provide the extensible platform needed tomeet agency or mission needs.
Cloud Transition Lessons Learned
While the benefits and value of the federal cloud computing policy can be debated, the worldstransition to cloud computing as an integral component of any IT infrastructure cannot be denied.The prudent government executive should, therefore, heed the lessons learned from the manyprivate industry corporations that already have miles behind them on this journey.
When identifying a potential cloud computing project, one should always count on a multi-yeartransition. Organizations should always use a consistent cloud opportunity identification process toreduce the risk of project failure by leveraging data from successful cloud implementations. Clientsneed to determine set metrics (economic, operational and service) with direct linkage to specificmission requirement(s). Use of a gate-driven cloud adoption process designed to terminate failedprojects early in the project lifecycle and deliver measurable capabilities within a quick timeframe
(weeksnot years) is highly recommended.
8/4/2019 NJVC Cloud Computing for Government FINAL
8/19
8NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Frequently observed signs for failure should be avoided
Lack of formal planning process
Missing or poor IT governance
Poor or missing responsibility matrix
Neglecting the human resource management challenges
No established program/project management office
Missing inventory of assets
A risk mitigation plan also must be formalized that addresses each of the following concerns:2 Loss of Governance. When moving to a cloud environment, clients relinquish control to the
CP on a number of security-related issues. A gap in security defenses may also exist asservice level agreements may not adequately address CP-related security requirements.
Portability. Issues related to provider lock in are outlined in the Challenges section of thiswhite paper on page 5.
Isolation Failure. Multi-tenancy and collaboration are at the core of cloud computing.Resource isolation failure addresses mechanisms separating storage, memory, routing andreputation among different clients on the same cloud (e.g., guest-hopping attacks).However, it must be noted that attacks on these mechanisms are not as pervasive and muchmore difficult to attempt versus attacks on traditional operating systems.
Compliance Risks. Investments in certifications (e.g., industry standard or regulatoryrequirements) may be compromised or lost when moving to the cloud.
Management Interface Compromise. Security is an issue with client managementinterfaces with the public cloud provider. The reason? These services are provided via theinternet and permit access to a larger set of resources than traditional operating systems.Security risk can dramatically increase when this is combined with remote access and webbrowser vulnerabilities.
Data Protection. It may be difficult for clients to effectively check the data-handlingpractices of their CPs to ensure critical and sensitive data is handled lawfully and ethically.This problem can be aggravated in cases of multiple transfers of data (e.g., betweenfederated clouds). However, it must be noted that some CPs share information on theirdata-handling practices with clients and others offer certification summaries on their dataprocessing and data security activities and their various security controls (e.g., Statementon Auditing Standards 70 Certification.
Insecure or Incomplete Data Deletion. As with most operating systems, when a requestto remove a cloud resource is made, a true erase of data may not happen. Adequate ortimely data deletion also may not be feasible (or undesirable from a client perspective)because extra copies of data are stored but not readily available or the disk to be destroyed
also houses other data from other clients. When multi-tenancies and the reuse of hardwareresources are added to the mix, this risk can increase. Malicious Insider. Cloud architectures necessitate the creation of certain staff positions
(e.g., CP system administrators and managed security service providers) that can beextremely high risk in terms of internal security threats.
8/4/2019 NJVC Cloud Computing for Government FINAL
9/19
9NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
1. Can compliance requirements be balanced with other IT
prioirities?
2. Is this an IT function or service the agency has
mastered?
3. Can the agency use a standardized service?
4. Is the test case easily implementable?
Creating a Cloud Computing Roadmap for Federal Agencies
First Steps
According to, GovCloud: Cloud Computing for the Business of Government, when a government
agency is ready to undertake the implementation of a cloud-based solution, it must determinewhich IT services, business functions and processes to deploy in the cloud environment. A five-yearroadmap should be created that includes the desired order to move each of the services to the cloudfor each year during that time period.3 Requirements for each service to be deployed in the cloudshould be developed and a cost/benefits analysis performed to establish the rationale why eachtargeted service should move to the cloud.
Implementation of a Low-Risk Test Case
A low-risk test case should be implemented prior to undertaking a wholesale transfer of services tothe cloud.4 This is harder than it may sound as some IT services that may seem simple to deploy tothe cloud are not so easy. Four questions should be asked (and answered) to decide which IT
services are best suited to live in the cloud5:
A misconception may exist that just because an application or service being deployed to the cloudisnt mission critical, the process will be simple and straightforward. This is not always true. If theagency is new to the cloud and wishes to establish a private cloud it will take time to determine theappropriate split of responsibilities between the service provider and the agencys IT team.6Compliance and liability issues can also be tricky, as defining compliance conditions andestablishing liability for intellectual property protection with cloud vendors reach well beyond theIT worldand, as such, with so many moving parts may take time to properly address andresolved.7 NIST has launched the U.S. Government Cloud Computing Business Case Working Groupto assist agencies with the development of cloud-compatible user cases. Email, geospatial dataexchange and services management are among the first user cases currently in development.
8/4/2019 NJVC Cloud Computing for Government FINAL
10/19
10NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Additional Recommendations
The authors ofGovCloud: Cloud Computing for the Business of Governmentalso offer sevenrecommendations that must be considered during the development and implementation of anagencys cloud roadmap:
Own the information, even if you own nothing else. An agency must claim its right toown the information even if it doesnt own the infrastructure, application or serviceassociated with that information. Any agency is liable for its informationregardless ofwhere it livesand some education will likely be needed about this fact among its IT team.While it may be unrealistic to prevent departments from provisioning their own cloudapplication, the agency must institute policies and procedures to ensure it can monitor howinformation deployed to the cloud is managed. As it is often hard to envision future uses ofinformation, it also is recommended that agencies make sure cloud-dwelling data can bebrought back into the enterprise if needed.
Dont take terminology for granted. It is vital to ensure that important terminology isdefined in the same way by the agency and the cloud service providerroom for different
interpretation always exists. A review of information governance policies must take place toidentify the areas of highest risk so authoritative definitions for vocabulary in these areascan be developed and adopted.
Hope for standards, but prepare to integrate. In short, the cloud is young and isntestablished enough to have developed standard specifications for platform interoperabilityand data exchange. Strategic groundwork for future data integration needs to be laid in theearly stages of any movement to the cloud. Agencies must insist that their cloud serviceproviders provide clear documentation on the data formats and schemas used forinformation storage in their systems.
Control cloud platform proliferation. Agencies should minimize the number of differentcloud platforms that require support to limit information fragmentation and decrease thechance of a future huge integration effort. To the greatest extent possible, an agencys IT
team should help departments look for shared requirements in standardized businessfunctions. The team can identify cloud platforms that meet these needs and consolidate theagencys services on them, when possible. Not only will the ability to share informationincrease, this will result in greater leverage when negotiating contract terms and pricing.
Make the information cloud ready.Agencies that organize their data sets well enoughfor use across multiple platforms will be best positioned to take advantage of cloud services,and will be better able to deploy enterprise information to the cloud more easily.IT teamsneed to get into the habit of encrypting data into one common format (probably XML)aprocess even more important if data moves through externally operated resources to thecloud.
Master solution integration. The shift to the cloud requires IT professionals to changetheir focus from owning and operating enterprise systems to becoming master information
service integrators. In addition to linking legacy databases to SaaS, IT teams need to connecttheir private and public clouds to create a seamless technology environment that works likea single cloud custom-made for their specific enterprises.
8/4/2019 NJVC Cloud Computing for Government FINAL
11/19
11NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Designing software independence from the hardware allows an operating system, applications and
data to live across the enterprise and is fundamental to the transformation of compute, storage
and network functionality.
Cloud Computing for Defense and Intelligence
The defense and intelligence communities are not immune to cloud computing. Arguably more thanany other government agencies, their missions require a fabric of utility computing that scales ondemand and enables self discovery and self-service access to secure, timely and relevantinformation in support of mission: individual or shared. The traditional IT model requires systemengineering that binds most software to the hardware and does not provide an enterprise suite offunctionality or allow for increased flexibility and a governed lifecycle of services. Designingsoftware independence from the hardware allows an operating system, applications and data tolive across the enterprise and is fundamental to the transformation of compute, storage andnetwork functionality.
Defense is dealing with a $78 billion budget cutthe first since September 11, 2001and another$100 billion in other cost-cutting measures over a five-year period commencing in FY 2012.Defense Secretary Robert Gates is directing that the budget be cut from agency administrative andstructural areas (e.g., the Office of the Assistant Secretary of Defense for Network Intelligence andInformation, the Business Transformation Agency, and the Joint Forces Command are in the processof being eliminated or disestablished with some essential functions transferred to otherorganizations with the Pentagon).
In an official statement on the proposed budget costs provided on January 6, 2011, Secretary Gatessaid: First, reforming how the department uses information technology, which costs us about $37
billion a year. At this time all of our bases and headquarters have their own separate ITinfrastructure and processes, which drive up costs and create cyber vulnerabilities. The departmentis planning to consolidate hundreds of data centers and move to a more secure enterprise system,which we estimate could save more than $1 billion a year. Department of Defense ChiefInformation Officer Terry Takai also publically commented about the potential IT budget cuts at anApril 21, 2011, INPUT event, stating DoDs support of the move of some of its IT operations to thecloudparticularly data centers.
DoD has begun to explore cloud computing through several smaller-scale projects; some of theseare outlined in the Examples of Successful Federal Cloud Solution Implementations on page 13.
8/4/2019 NJVC Cloud Computing for Government FINAL
12/19
12NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Source: United States Army Intelligence and Security Command
Cloud Computing and Mission Support
Information is often the decisive discriminator in modern conflict. Studies of recent mission failureshighlighted this fact, finding that many of these failures were caused by:
Existence of data silos Human-based document exploitation process Reliance on operationally proven processes and filters typically used to address the lack of
computational power or decision time
Also disturbing is that in most of these cases, the critical piece of information necessary for missionwas in possession. The failure wasnt in obtaining the information, but in locating and applying it tothe mission at hand. Cloud computing uniquely addresses all of these important issues.
Data silos evolved from a system-centric IT procurement policy and an almost reflexive reliance onrelational database technology. In developing early data processing systems, the high cost ofmemory and storage led to a premium being placed on the efficiency of application data access andretrieval. Relational database technology effectively addressed this need, which in turn led to its
pervasive use across government. In modern IT system development, memory and storage arecheapand getting cheaperwhich has led to internet-scale storage and search paradigms thatare the stuff of everyday use today. The worlds largest databases cannot, in fact, be searchedquickly using a relational database management approach. Todays ability to search multi-petabytedata stores in milliseconds virtually eliminates the need for data silos. This capability is realized incloud-based storage.
8/4/2019 NJVC Cloud Computing for Government FINAL
13/19
13NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Source: United States Army Intelligence and Security Command
Documents are the persistent records of human activity. As such, they are used to provide insightinto the societal structure and processes of our opponents. Conflict, however, is entity and eventcentric. The intelligence professional must, therefore, interpret documents and translate that datainto operationally relevant entities and events. The time and resource intensive nature of thisskillcraft is perfectly suited for the precision search and analytic capabilities of the moderncompute cloud. The use of highly standardized and virtualized commodity infrastructure, not only
make the automation of this function possible, but it enables real-time continuous processing of thenow digital document flow of our adversaries. This commodity also removes the human from thistedious task, allowing intelligence professionals to apply higher order professional analysis andinsight.
The human-based documentexploitation process led directly to aninstitutional reliance on theaforementioned operationallyproven processes and filters.Instantiated by the use of multi-pagestructure query language and theubiquitous goal of obtaining anappropriate working set of data,these time-honored processes wereborn from the need to meet criticaldecision timelines within acomputationally inadequateenvironment. Cloud techniques andtechnologies can now be used to workon all the data. And with an ability toleverage the power of asupercomputer at will, the working
set requirement is now ananachronism and critical decisiontimelines can now be more easily met.
Cloud computing is unique in its ability to address these critical defense and intelligence missionneeds. Thats why cloud computing is critical to our national defense. As a bonus, cloud computingoffers defense and intelligence agencies the ability to increase efficiencies and incur marked costsavings during their lifecycles to alleviate some of the pressure of budget reductions. Moving IToperations to the cloud also will assist in enhanced collaboration.
8/4/2019 NJVC Cloud Computing for Government FINAL
14/19
14NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Solution Benefits
Fewer recruiters required to
handle the workload of the fivetraditional recruiting centers
that the AEC replaced
Faster application upgrades
Dramatic reduction in hardware
and IT staff expenses
Significant increase in staff
productivity
Solution Benefits
Avoidance of high start-up costs and
additional ROI through software reuse
Savings of between $200,000 and $500,000
per project due to rapid project start-ups at
lower costs
An estimated $15 million in cost avoidance
by using open source software that provides
for software reuse and collaborative
developmentin addition to lower funds for
licensing and support
Improved software for agency users by
providing version control and traceability
Examples of Successful Cloud Implementations
Army Experience Center Pilot Program, United States
Army
Two years ago, the United States Army initiated a pilotprogram to explore how to better utilize new technologiesin support of its marketing and recruiting work. The ArmyExperience Center (AEC) in Philadelphia, PA, uses a varietyof exciting technologytouch-screen career explorationkiosks, virtual reality simulators and social networkingtools to educate potential recruits about the Army and helpthem make informed decisions about enlisting. As part ofthe center operations, the Army needed a customerrelationship management system to track prospect engagement (virtual and in person) to helppersonnel better manage the recruitment and enlistment process.
Despite constant updates over the years, the Armys legacy data system could not be modified tomeet the new requirements of the AEC, specifically social networking and other web 2.0applications, data access from multiple platforms including mobile devices, the tracking of AECvisitor information and the amalgamation of marketing and recruiting data. After reviewing bidsfrom both traditional and non-traditional IT vendors, the Army chose a customized version ofSalesforce for the pilot program. The annual cost of the pilot is only $54,000compared to theproposed operational costs from traditional vendors of $500,000 to $1 million a year.
This cloud-based, mobility solution CRM tool allows the Army to track potential recruits as theyparticipate in the different virtual activities in the AEC, and recruits can remain engaged withrecruiters after they leave the center through social media and email. Due to the mobility of theplatform, recruiters also can access potential recruit information anytime and anywhere.
Rapid Access Computing Environment, Defense
Information Systems Agency
The Defense Information Systems Agency made the leapto the cloud by establishing the Rapid Access ComputingEnvironment in 2008. RACE is the agencys secure,stable, private cloud that utilizes virtual servertechnology to provide on-demand server space fordevelopment teams. RACE is made up of several virtualservers co-located in a single physical server.
8/4/2019 NJVC Cloud Computing for Government FINAL
15/19
15NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Solution Benefits
Cost savings by dividing the costs of
provisioning and operating one
physical server among several
virtual servers
Rapid provisioning of functionalserver space to users (24 hours),
compared to a traditional dedicated
server environment (three to six
weeks)
Improved security through built-in
application separation controls so
all applications, databases and web
servers are separated, and a strict
data cleaning process
Solution Benefits:
Savings of $4 million annually
Seventy percent increase in
customer engagement in the
knowledge base
Reduction on the time required for
customers to find answers from
more than 15,000 documents on
file: from 20 minutes to only two
minutes.
RACE, which uses virtual server technology to provide on-demand server space for developmentteams, aims to be more secure and stable than a traditional public cloud. RACE consists of manyvirtual servers inside a single physical server. Within this virtual environment that meets DoDsecurity standards, customers use a self-service portal to provision computing resources in 50 GBincrements. The cost for RACE access is reasonable and can be established with an approvedgovernment-issued credit card.
RACE offers the same level service and availability as a traditional server environment. Since RACEwas implemented, hundreds of military applications, including command and control systems,convoy control systems and satellite programs have been developed and tested on this cloud-basedsolution.
Forge.mil Program, DISA
Forge.mil is the secure software developmentenvironment established by DISA designed to provideDoD with tools and services to rapidly develop, test and
deploy new software and systems. CollabNet providedDISA with a cloud-based software development platformto allow customers to reuse and collaborate on softwarecode. To date, forge.mil manages more than 5,000 userswith more than 300 open source projects, 500 filerelease posts and 30,000 downloads.
Forge.mil hosts an array of projects for different DoDagencies, including the Army, Navy, Air Force, MarineCorps and the Joint Chiefs of Staff.
Personnel Services Delivery Transformation, Air Force
Personnel Center
Due to the mandated manpower reduction initiative, theAir Force Personnel Center had to find a new, viable way todeliver human resource tools and services, whileimproving customer experiences by providing self-servicesolutions and the ability to track customer needs. AFPCdecided that the SaaS solution by RightNow was thesolution necessary for improved knowledge management,case and contact center tracking and the ability to meetclient survey mission requirements.
After implementation of the RightNow solution, customersearches on the knowledge base have risen to nearly 2million per week. This cloud-based platform also provides the ability to scale services to meetfluctuating demand without any impact to customer experience.
8/4/2019 NJVC Cloud Computing for Government FINAL
16/19
8/4/2019 NJVC Cloud Computing for Government FINAL
17/19
17NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Appendix 2: Cloud Computing Resources
Info.apps.gov (http://www.info.apps.gov/node/19)
Federal Cloud Computing Initiative (http://www.info.apps.gov/node/2)
Federal Risk and Authorization Management Program (FedRAMP) (http://www.info.apps.gov/content/federal-risk-and-authorization-management-program-fedramp)
Cloud Computing Resources (http://www.info.apps.gov/node/14)
Cloud Musings by Kevin L. Jackson (http://kevinljackson.blogspot.com/)
Cloud Musings on Forbes (http://blogs.forbes.com/kevinjackson/)
Government Cloud Computing on Ulitzer(http://govcloud.ulitzer.com/)
NIST Business Use Case Template (https://collaborate.nist.gov/twiki-cloud-computing/bin/view/cloudcomputing/businessusecasescall03)
NIST Computer Security Division, Computer Security Resource Center, Cloud Computing(http://csrc.nist.gov/groups/SNS/cloud-computing/)
8/4/2019 NJVC Cloud Computing for Government FINAL
18/19
18NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
About the Author
Kevin Jackson is General Manager, Cloud Services, at NJVC. Before joining the company, Mr. Jacksonserved in various senior management positions with Dataline, LLC; Cryptek, Inc.; IBM; and JPMorgan Chase. Recently, he was named a Cyber Security Visionary by U.S. Black Engineer andInformation Technologymagazine. Mr. Jackson is the founder and author of Cloud Musings(http://kevinljackson.blogspot.com) and Cloud Musings on Forbes(http://blogs.forbes.com/kevinjackson), a Forbes magazine online blog dedicated to public sectorcloud computing. He is also founder and editor of Government Cloud Computing on Ulitzerelectronic magazine (http://govcloud.ulitzer.com ). His first book, GovCloud: Cloud Computing forthe Business of Governmentwas released in spring 2011. Mr. Jackson has been deeply involved inthe broad collaborative effort between industry and the U.S. National Institute of Standards andTechnology on the federal governments adoption of cloud computing technologies. He is theNetwork Centric Operations Industry Consortiums Cloud Computing Working Group Chairman.
About NJVC
NJVC is one of the largest information technology solutions providers supporting the U.S.Department of Defense. We provide innovative and high-quality IT solutions to the government andcommercial organizations, and specialize in supporting highly secure IT enterprises, particularly forthe intelligence and defense communities. To learn more, visit www.njvc.com.
8/4/2019 NJVC Cloud Computing for Government FINAL
19/19
19NJVC and Driven by Your Mission are registered trademarks of NJVC, LLC. 2011 NJVC, All Rights Reserved
Headquarters
8614 Westwood Center DrSuite 300
Vienna, VA 22182
703.556.0110
www.njvc.com