When we think of cloud
computing in the traditional sense, we usually think of public cloud offerings
like Google Apps, Office365, Salesforce.com, Rackspace and Amazon Web Services.
The government does use these services but more often than not, they shy away
from most public cloud offerings. I will talk about why in this post and
explain some alternatives. First let’s have a quick civics lesson.
We don’t give government organizations business models, we give them missions. Most government agencies act as agents for jobs the public has decided are important. I won’t debate the politics of whether this is always true or who decides what is important. We just need to understand that government agencies aren’t deciding what missions they have, they are being told what their mission parameters are and usually these mandates are funded with strict constraints on what the agency can and cannot do to accomplish the mission. Many jobs we’ve given the government involve life and death and require execution of a clearly defined mission that isn’t profitable. Grandma getting her social security check is just as much a life or death mission as foiling a terrorist attack in Washington DC or shooting down a Scud-D aimed at NATO troops.
Commercial entities have
different drivers. They may have other objectives besides profit but businesses
succeed or fail based on the execution of a sound business model. Investment in
the business has to balance with value the business is providing. This usually
means, "are they making a profit?". Government agencies might have a business model
that describes what they do but their success or failure is more likely to be
defined by winning or losing wars, negative media attention, budget pressures,
public and political opinion, congressional oversight, international
relationships, etc. This isn’t to say that there are not hundreds of thousands
of military and government employees who are trying to do the right thing; it’s
just that they are working in a greater construct that is top down driven and
measured by accountability.
This idea of centralized power and the culture of accountability in government affects how agencies procure IT, including cloud computing, and means there are rules for everything. Some rules come from the agencies themselves, other rules are inherited from higher levels. These rules come in the form of policy, recommendations, regulations, mandates, standards, even laws. Generally, the idea is that these rules benefit the public by ensuring things are done securely, with accountability and that goods are fairly procured at the lowest cost. Unfortunately, these rules sometime conflict with one another, are difficult and expensive to implement, and generate requirements that have not been budgeted. The bottom line is that agencies are rarely free to implement IT functions any way they please and are intensely scrutinized on how they do things.
Many of the rules
government IT contends with have to do with regulation of security. We see
regulated IT security controls in the corporate world around things like credit
card processing and medical information but in government it touches every
aspect of IT. Most agencies have always had their own rules for IT security but
in 2002 the Federal Information Security Management Act (FISMA) was signed into law and requires every
government agency to have a formal plan for IT and information security.
Following FISMA a number of information processing standards were published
that further define the security controls that must be in place for any IT
function. Agencies have to reconcile these information processing standards
with their own internal rules for security. Compliance activities usually
result in agency specific hardening procedures, approved product lists and
patch sets that don’t always keep up with the latest technology. In some cases
the security controls become so complex and ingrained in the system that IT
becomes quite rigid. Concepts like cloud and virtualization weren’t even around
when many of the security standards and process were defined so there is no
option to “certify” a system that isn’t based on old technology.
Let’s get back to cloud
computing. Imagine you are the CIO of an agency that supports military air
bases all over the world. The agency’s mission isn’t IT; it’s keeping military
aircraft supplied with fuel and parts, scheduling aircrews, maintaining online
maintenance manuals, guarding the perimeter, shoveling snow, etc. IT isn’t your
business but today you run small data centers worldwide to support your
mission. You pay power bills, buy servers, storage and networks and maintain an
IT Staff. You see the benefits of cloud computing and want to make IT cheaper,
better and faster for your customers. You want to get your organization out of
the business of running IT. Can you move your applications over to a public
cloud provider?
Probably not, government
agencies, especially the military, are constantly under surveillance and attack
by adversaries and the shared nature of public cloud environments present too
many attack vectors. It’s a little like leaving your Wi-Fi open or your laptop
in a public place. Passwords and firewalls can only do so much, if bad people
have access to your system, they will get in. This doesn’t mean sensitive
government workloads can’t benefit from cloud computing. It means we have to
think about building the cloud behind the fence. In the next post I’ll talk
about three types of private cloud.
No comments:
Post a Comment