Making the cloud safe for intel
The intelligence community's tech think tank wants a new model for keeping data safe in the cloud.
The intelligence community’s research organization is seeking ideas on how to make virtual computing environments more secure.
The Intelligence Advanced Research Projects Activity is planning a broad agency announcement for September for a project that could enhance data protection in the intelligence community's private cloud and have larger ramifications for unclassified government data stored on public clouds.
The project, dubbed Virtuous User Environment (VirtUE), was inspired by the long-running shift from desktop boxes to virtual computing, IARPA Program Manager Kerry Long said.
Speaking at FCW's Cloud Summit on Aug. 10, Long said one of the flaws of virtualization is that it is almost too exact. It "copied all the problems" found in traditional desktops, he said, and security measures designed to segregate data on a virtual machine are potentially vulnerable.
IARPA is seeking a computing environment that can run on a cloud or other virtualized infrastructure without interfering with internal operations, collect log data on users and act as a sensor for threat detection. A "virtue" could also surround individual applications or computing roles to, for example, segregate email from the wider internet with the goal of making phishing attacks less threatening or to govern the activities of a router or peripheral device.
Additionally, it must run on an Amazon Web Services hypervisor -- as Amazon is the cloud platform of choice for the intelligence community.
Long said he hopes the ideas from researchers and academics will yield a new approach that will reduce the amount of log data generated and collected in the intelligence community. For instance, improved sensor capabilities would mean that a "virtue" could collect log data only in response to certain suspicious activity rather than collecting data on every event. That approach could enhance the use of analytics to process insider threat data.
Officials envision having a three-phase program. A formal announcement for the first phase is expected next month.
NEXT STORY: How the Pentagon can help federal buying power