Look forward, not back, in response to cyber threats
The U.S. government is seeing increasing cyber and physical threats targeting the critical infrastructure Americans rely on every day, including federal systems. Just last month, U.S. officials issued an emergency directive ordering federal agencies to defend their networks against hackers exploiting flaws in Cisco’s software. In July, an investigation revealed that engineers based in China were given indirect access to the cloud platform used by multiple federal agencies. And last year, a Chinese espionage group targeted at least 200 U.S. organizations, including the Army National Guard, in an operation known as Salt Typhoon.
Cyberthreats to U.S. government systems are a significant national security risk that expose the country to spying, sabotage and more. In light of these threats, it might be tempting for federal agencies and other recently-hacked government organizations to hunker down or seek refuge in a traditional GovCloud. Doing so may give the illusion of a quick fix, but will ultimately undermine President Trump’s priorities and U.S. national security, and is a step backwards technologically.
To understand why a return to GovClouds is such a bad idea, it is worth revisiting the history behind why the government has shifted from GovClouds to commercial clouds in the first place. The emergence of modern cloud technology in the early 2000s fundamentally changed enterprise IT, including how the U.S. government operates. For decades prior, federal agencies relied on government-owned servers to store data and run their networks. Taking advantage of the cloud, however, meant relocating those functions to off-site data centers managed by private companies and, as a result, relinquishing some control over who managed and accessed their information.
In 2011, the U.S. government started the Federal Risk and Authorization Management Program (FedRAMP) to safely accelerate federal agencies’ adoption and secure use of cloud services. To sell cloud products to the government, companies had to prove that any personnel handling federal data had the proper authorizations and background screenings. The approach made sense at the time, because the goal was to provide a standardized approach to security assessments and authorizations as this new technology was adopted.
However, FedRAMP — and the Defense Information Systems Agency, which manages the evaluation and authorization of cloud services for the Defense Department — led many cloud providers to create separate cloud environments dedicated to serving federal agencies, GovClouds, rather than running government workloads in their commercial cloud environments. While this made compliance with the assessments and authorizations easier, it came at a cost: GovClouds badly lagged behind commercial cloud in terms of capacity, performance and security, with less than 5% of government cloud environments possessing the full characteristics of current cloud computing.
GovClouds are isolated environments and are slow to roll out security updates and new features, including AI, therefore limiting the public sector’s access to rapidly advancing technologies. Isolation may seem like a good idea that reduces external threats, but it does little to eliminate insider threats — which account for the majority of data breaches — and it deprives government customers of the constant learning and adaptation of commercial technology.
Over time, these problems pushed federal agencies away from GovClouds in favor of the evident security and performance advantages of commercial cloud: continuous roll out of new features and updates, consolidated security operations that take advantage of economies of scale and scope, and lower cost.
GovClouds are also very expensive to build and operate, and those costs are passed onto American taxpayers. These are among the reasons why President Donald Trump issued an executive order tasking federal agencies to adopt commercial solutions for federal contracts wherever possible.
In light of recent events, it would be a colossal mistake for the government to retreat to GovClouds now — especially as it increasingly looks to adopt AI. President Trump’s AI Action Plan put forward an ambitious strategy to ensure American AI leadership abroad, but also to use AI to transform the federal government. The computing power necessary for that transformation will be immense and only increase year after year — and a GovCloud will not be able to keep up. Following through on the President’s AI Action Plan will simply require more than what GovClouds can offer.
As the U.S. government faces increasingly severe cyber threats, let’s not forget the lessons of the past. GovClouds are the technological equivalent of the Maginot Line: expensive, easy to quantify and seemingly impregnable, but unable to defend against modern attacks. The federal government needs to look forward, not back, to secure its systems and push toward President Trump’s vision for the future.
Andrew Grotto founded and directs the program on geopolitics, technology and governance at Stanford University’s Center for International Security and Cooperation. He serves as the faculty lead for the cyber policy and security specialization in Stanford’s master’s in international policy program, where he teaches courses on cyber policy and economic statecraft. He is also a visiting fellow at the Hoover Institution. He was the senior director for cyber policy on the National Security Council in the Obama and Trump administrations.
The post Look forward, not back, in response to cyber threats first appeared on Federal News Network.

© Getty Images/iStockphoto/KanawatTH