'); } -->
WASHINGTON The Defense Departments information technology infrastructure is on a journey of consolidation, standardization, security and access, the Defense Departments principal deputy chief information officer told attendees at a cloud computing panel discussion recently.
The department is reducing the number of data centers from about 1,500 to a number far below that, Robert J. Carey said, and is implementing a coherent and consistent architecture across thousands of computing environments.
This process is taking place in part because of the current era of fiscal austerity, but also because it makes sense when it comes to securing data within the network, Carey said.
In addition, DOD, along with much of industry, is shifting toward a cloud computing posture: the collection of data and use of related computing services via remote servers accessed through the Internet. Cloud computing isnt without its risks, Carey said, but the department is moving the paradigm of security from the infrastructure to the data layer. This includes continuous monitoring and cryptography, he said.
Concentrating on securing data, rather than an entire network, is a big shift for a big engine like DOD, Carey said.
As the department implements the joint information environment and delivers a consistent computing architecture which Carey noted the department does not yet have security becomes the discriminating factor, he said.
Were moving at a very deliberate pace, Carey said. We have lots of (pilot programs) going on to evaluate these kinds of things and to make sure we understand both the pros, cons and risks of moving into the cloud space. We have to take advantage of what commercial technology is bringing us, but at the same time, make sure that the people that actually ... acquire it for us are able to do so, Carey said.
Measuring risk in the cloud and the costs of risk response is a difficult task, Carey said.
At the end of the day, the metrics of cloud security are, at best, nebulous, he said. It isnt easy to balance risk reduction and purchasing, but its important for the IT community to try.