Using Microsoft Azure U.S. Government Cloud for Security & Compliance

Overview of the Microsoft Azure U.S. Government Cloud

Microsoft Azure U.S. Government Cloud (Azure Government) is designed specifically for the U.S. government (USG). It adheres to federal and state policies, and provides a secure, compliant infrastructure-as-a-service (IaaS) for federal information systems. It offers several security levels to align with standardized government information classification levels, keeps data within U.S. boundaries, and ensures U.S. citizens staff any related facilities.

Azure Government also offers a government approved “marketplace” of cloud services (PaaS/SaaS), allowing government entities to leverage its’ underlying infrastructure and cloud services without having to create their own. With this type of shared services delivered in a subscription model, come shared responsibilities between the infrastructure provider, application owner, and end-user. Contractually, customers are strictly responsible for the security, recovery, and portability of their own data, not Azure Government as the cloud provider. This is where Veeam can help (more later).

In short, entities can tap into Azure Government’s scalability, security, and guaranteed infrastructure and application uptime for accelerated compliance with continuous Authority to Operate (cATO) requirements. 

Who is Eligible to Use Azure Government?

Azure Government saves public sector entities the cost and time involved in building their own government compliant infrastructure and applications. But not just anyone can use this IaaS/PaaS/SaaS platform. Only Microsoft authorized government and cloud service provider (CSP) partners serving US federal, state, and local government entities can use Azure Government. Microsoft has a strict validation program to determine eligibility. To qualify, an organization must prove they regularly work with government customers as a Cloud Service Provider or hold a General Services Administration (GSA) or other government contract. Types of proof can include, but are not limited to, government contract numbers and a letter of sponsorship from a government customer.

Basic eligibility criteria for partners and customers seeking approval to use Azure Government per Microsoft are below.

Security & Compliance in Azure Government Cloud

For optimal security and compliance, Azure Government services for the public sector operate on a physically isolated instance of Microsoft Azure. This provides segmentation and the world-class security services critical to US government systems, as well as the secure, compliant cloud applications built on its architecture.

As shown below, Azure Government, Azure Government Secret, and Azure Government Top Secret enclaves are designed for differing security classification levels. Operated by screened and cleared US persons, Azure Government supports various scenarios for building, deploying, and managing cloud-based and cloud-native infrastructure and applications. Azure Government already has the required formal credentials and authorizations in place and is supporting thousands of public sector customers, eliminating the need for a customer to obtain similar certifications via a long, complicated process.

According to Microsoft’s Azure Government website, authorizations and credentials listed below make compliance much easier and more efficient for government entities and contractor customers.

As shown in the chart, Azure Government provides a secure and compliant environment for U.S. government entities, offering different levels of security depending on the classification and sensitivity of data. Each level supports various compliance standards and offers dedicated security functions to ensure data integrity and sovereignty within U.S. borders.

Ask how Veeam can help Azure Government customers meet data and application security, recovery, and portability compliance needs related to cATO.

Risk Management: Continuous Authority to Operate (cATO)

With this basic understanding of Azure Government and how it helps public sector customers meet compliance requirements more quickly, let’s turn to Continuous Authority to Operate (cATO) certification requirements. First, a little background.

In 2022, the U.S. Department of Defense (DoD) issued a  on Continuous Authority to Operate (cATO) certification requirements for DevOps organizations. The goal of cATO, as with more recent zero trust architecture requirements, is to standardize acceptable cybersecurity risk levels for government agencies and contractors per DoD, Risk Management Framework (RMF), and FedRAMP standards.  per DoD, Risk Management Framework (RMF), and FedRAMP standards.

cATO certification requires the software development and operations efforts of agencies and USG DevOps contractors to be continuously monitored. Continuous monitoring of DevOps infrastructure and application environments helps proactively (not reactively) identify and mitigate potential risks and vulnerabilities in real-time. cATO also requires a government approved third party regularly conduct security and compliance assessments on the organization. Then, if a product and organization’s risk posture is deemed acceptable by the DoD CISO, a cATO certification is awarded. Once awarded, there is no expiration date for a cATO. It remains in effect as long as the organization’s real time risk posture is maintained.

According to the DoD memo, “cATOs are a privilege and represent the gold standard for cybersecurity risk management for systems. They represent a raise the bar effort for system risk monitoring and management.” If through continuous monitoring and regular external assessments an organization is deemed to have inadequate cybersecurity, suffers a major breach, or there is a change in risk tolerance, its’ cATO can be suspended until the issues are addressed.

Ask us how Veeam can help you leverage another agency’s ATO or gain certain required competencies for your own cATO certification.

Azure Government Certifications vs. cATO Certification

Microsoft works closely with agencies like the Defense Information Systems Agency (DISA) and the General Services Administration (GSA), ensuring that Azure Government meets evolving federal standards. This close collaboration can help agencies in their cATO journey by ensuring their cloud provider is well-aligned with accrediting processes.

The USG is using Azure Government as part of a larger USG government risk management strategy. Similar to Azure Government, cATO certification also helps continuously manage risk but it applies specifically to the DevOps processes and activities conducted by government entities and contractors (e.g. develop, update, migrate or modernize software). If you are a USG entity or commercial contractor DevOps organization doing business with the USG and want to continue doing so, you need to apply for a cATO.

USG agencies can get certified themselves or use another cATO certified entity like Azure Government. Without cATO certification, DevOps contractors and agencies can face these and other challenges:

Since Azure Government already has numerous USG approved security capabilities and certifications, organizations can leverage its infrastructure to obtain portions of cATO certification for their cloud services and applications faster and more efficiently. Leveraging Azure Government shortens the organization’s time to 1) compliance and 2) offer digital services that can be used by other agencies and the public (e.g. lower cost, increase fees).

In summary, Azure Government simplifies the cATO certification process by providing pre-validated, compliant cloud infrastructure; advanced security tools for monitoring and threat detection; robust access management; and continuous monitoring/reporting tools. This infrastructure and toolset allow government organizations to maintain high levels of security and demonstrate compliance more easily, supporting both initial and continuous ATO processes.

Industry Migration to Kubernetes Virtualization

You may be wondering how Kubernetes fits with Azure Government and cATO certification. Let’s first dive into the details of what Kubernetes is and why industry is migrating to it.

Kubernetes is an industry standard container orchestration technology that manages and organizes standardized containers of data. Kubernetes helps manage or “orchestrate” the deployment, scaling, and operation of applications via containers. Kubernetes’ underlying philosophy revolves around the concept of “Immutable Infrastructure.” Immutable infrastructure is a model that mandates that no updates, security patches, or configuration changes happen in-place on production workloads. Instead, when a change is needed, the application is built on new temporary virtual infrastructure and tested in a staging or sandbox environment. Only when validated as meeting compliance requirements is it then deployed into production (e.g. Crowdstrike outage). Automation of this process helps maintain consistent highly available system and application processes avoiding configuration or compliance problems.

Given that Kubernetes has robust built-in automation capabilities, it becomes easier to scale applications up or down as required, ensuring that all the rules assigned to the parent application apply to each of its replicas automatically. This attribute ensures that your application environment remains compliant irrespective of scalability.

Azure Kubernetes Service (AKS) on Azure Government

Azure Kubernetes Service (AKS) is a Microsoft service provided in Azure Government. Using AKS within the Azure Government Cloud has multiple benefits. It provides application scalability, seamless automated integration with other Azure services, and supports a microservices architecture, multi-region availability, and adherence to strict security and compliance requirements.

Kubernetes-native tools and plugins can make achieving compliance much easier. One such tool is Open Policy Agent (OPA), which allows an authorized user to enforce fine-grained, context-aware access policies across the Kubernetes environment. By putting detailed controls over who can do what in the Azure Cloud environment, you help maintain compliance for access control policies per FIPS, NIST, FedRAMP, and others compliance requirements.

Reducing Risk with AKS on Azure Government Cloud

When it comes to DevOps shops getting cATO certification, cloud native agnostic container technologies like Kubernetes enable consistent deployment, management, and dynamic scaling of any type of applications in any technical environment (i.e. agnostic). The inherent security and isolation provided by Kubernetes for DevOps means that each application can run in a contained environment that is automatically spun up and down only as needed (impermanent), minimizing the risk of vulnerabilities spreading across applications.

Azure Government incorporates Kubernetes technology (AKS), enabling continuous integration and deployment (CI/CD) for mission-critical software pipelines, yet ensures modifications are traceable, replicable, and compliant. cATO requires this tracking and validation for all changes in the DevOps environmentAzure Government provides the built-in tools below to help agencies monitor, maintain, and demonstrate continuous, zero trust security to reduce overall risk:

cATO certification can be facilitated using Azure Government because it uses cloud-native agnostic container technologies that allow for uniform management and deployment of applications across different technical environments. With Azure Government implementing Kubernetes technology, agencies can ensure continuous integration/continuous delivery (CI/CD) for critical software, and that modifications are traceable and compliant. Additionally, Azure Government provides numerous tools, like Azure Security Center and Azure Active Directory, to monitor and maintain security for achieving cATO.

AKS on Azure Government Cloud provides a powerful and scalable platform to develop and deploy applications swiftly and effectively — all while prioritizing data security and regulatory compliance.

Running VMWare on Azure Government Cloud or moving to a new hyper visor? Consult with a Veeam subject matter expert on how migrate VMware-based workloads to Azure Government with AKS, or to modernize disaster recovery and business continuity strategies, without changing existing workflows.

Better Together Solutions Leverage Best-in-Class Partners

Utilizing technologies such as Kubernetes, Microsoft Azure, and Veeam under the umbrella of Azure Government Cloud offers “better together” solutions to meet requirements while facilitating compliance. The containerization provided by Kubernetes segregates application environments, thus reducing potential breaches exponentially. Kubernetes also supports automated deployment and management of applications, thereby accelerating compliance.

Azure Kubernetes Service (AKS) is a fully managed container orchestration service provided by Azure Government. AKS orchestrates and automates deployment, scaling, and management of containerized applications to simplify it. Then developers can focus on creating needed applications instead of managing infrastructure. In the context of Azure Government Cloud, AKS offers the following features:

Fortunately, in this era of zero trust, strategic partners Veeam and Microsoft Azure Government Cloud offer modern “better together” solutions for the USG. These best-in-class solutions leverage Veeam and ProPartner products/services for a commercial-off-the-shelf (COTS) solution that delivers application and data resiliency:

Veeam with partners Microsoft Azure and Red Hat, can help you modernize to meet and maintain continuity of operations (COOP) requirements, moving you one step closer to a Continuous Authority to Operate (cATO) certification.

Modernization efforts for government IT systems are well underway. DevOps processes, applications, and data protection methods/tools are also getting modernized due primarily to VMware price hikes. These changes are accelerating the migration of legacy virtual machines (VMs) to other hypervisors like Microsoft Hyper-V or Proxmox VE, and newer cloud native platforms such as RedHat OpenShift and Rancher Harvester.

When undergoing IT and application modernization, be sure to update and create new continuity of operations (COOP) and incident response plans. When implemented, you will comply with standards and DoD mandates such as cATO and zero trust.

Exit mobile version