Executive Gov
  • Home
  • Acquisition & Procurement
  • Agencies
    • DoD
    • Intelligence
    • DHS
    • Civilian
    • Space
  • Cybersecurity
  • Technology
  • Executives
    • Profiles
    • Announcements
    • Awards
  • News
  • Articles
  • About
  • Wash100
  • Contact Us
    • Advertising
    • Submit your news
    • Jobs
No Result
View All Result
SUBSCRIBE
Executive Gov
  • Home
  • Acquisition & Procurement
  • Agencies
    • DoD
    • Intelligence
    • DHS
    • Civilian
    • Space
  • Cybersecurity
  • Technology
  • Executives
    • Profiles
    • Announcements
    • Awards
  • News
  • Articles
  • About
  • Wash100
  • Contact Us
    • Advertising
    • Submit your news
    • Jobs
No Result
View All Result
Executive Gov
No Result
View All Result
Home Cloud

Pentagon Issues Cloud Security Playbook

by Jane Edwards
March 3, 2025
in Cloud, News
Pentagon Issues Cloud Security Playbook

The Department of Defense has released a playbook designed to help software development managers, mission owners and developers improve the cybersecurity of applications hosted in cloud environments.

Table of Contents

    • You might also like
    • Daniel Morgan Named DOT Chief Product & Technology Officer
    • Aretum’s Rohit Gupta Soars as Northrop Grumman’s Kathy Warden Gains Ground in Wash100 Popular Vote
    • Army Expands Use of Enterprise Contracts to Streamline Procurement
  • Preparing Organizations for Cloud Adoption
  • Implementing Secure Identity, Credential & Access Management
  • Cloud Security Playbook Volume 2

You might also like

Daniel Morgan Named DOT Chief Product & Technology Officer

Aretum’s Rohit Gupta Soars as Northrop Grumman’s Kathy Warden Gains Ground in Wash100 Popular Vote

Army Expands Use of Enterprise Contracts to Streamline Procurement

The Cloud Security Playbook, cleared for public release on Feb. 26, seeks to address the most common cloud security vulnerabilities and threats and intends to help mission owners hosting software in the cloud quickly achieve an Authorization to Operate, or ATO.

The document comes in two volumes. The first volume aims to prepare organizations for using a cloud and intends to enable users to understand key concepts, such as the shared responsibility model, the impact level and the requirement of a DOD provisional authorization or ATO for cloud services.

Preparing Organizations for Cloud Adoption

The playbook suggests several actions to prepare an organization for using a cloud, such as setting up a cloud governance team, developing a cloud migration strategy and establishing a budget to implement the cloud migration strategy.

Other measures outlined in the document are developing organizational policies on cloud usage, creating a cloud exit strategy, defining the roles and responsibilities of those who will have cloud access and training the workforce on cloud security.

Implementing Secure Identity, Credential & Access Management

The document calls for the implementation of identity, credential and access management, or ICAM.

Recommended actions under this section include implementing and enforcing the principle of least privilege, or PoLP; implementing PoLP for each cloud resource; requiring phishing-resistant multifactor authentication; using context-based access control policies and review policies prior to deployment and periodically after deployment to identify potential gaps; and considering requiring administrators to access cloud resources using privileged access workstations.

The initial volume also covers other key plays, such as establishing secure network access, deploying with infrastructure as code, using a cloud-native application protection platform, employing defensive cyberspace operations and deploying user and entity behavior analytics.

Cloud Security Playbook Volume 2

The playbook’s second volume addresses ways to secure containers and microservices, defend DevSecOps pipelines, mitigate third-party risks and ensure the security of artificial intelligence systems and application programming interfaces.

To defend DevSecOps pipelines, recommended actions include adopting a zero-trust approach, using encryption with a FIPS 140-2 approved algorithm, minimizing the use of long-term credentials, implementing endpoint detection and response tools and integrating security testing into the pipeline.

Share30Tweet19

Recommended For You

Daniel Morgan Named DOT Chief Product & Technology Officer

by Jane Edwards
March 12, 2026
Daniel Morgan Named DOT Chief Product & Technology Officer

Daniel Morgan, the Department of Transportation's inaugural chief data officer, has been appointed as DOT's chief product and technology officer and has joined the Senior Executive Service. 

Read moreDetails

Aretum’s Rohit Gupta Soars as Northrop Grumman’s Kathy Warden Gains Ground in Wash100 Popular Vote

by Neel Mehta
March 12, 2026
Aretum’s Rohit Gupta Soars as Northrop Grumman’s Kathy Warden Gains Ground in Wash100 Popular Vote

Industry and government leaders are neck-and-neck in the 2026 Wash100 Popular Vote. Aretum President Rohit Gupta climbed into the top 10 while Northrop Grumman CEO Kathy Warden advanced...

Read moreDetails

Army Expands Use of Enterprise Contracts to Streamline Procurement

by Jane Edwards
March 12, 2026
Army Expands Use of Enterprise Contracts to Streamline Procurement

The U.S. Army is expanding its use of enterprise contracts to streamline procurement and leverage enterprisewide buying power as part of efforts to modernize acquisition. Leonel Garciga, the...

Read moreDetails

DOW, ODNI Seek Proposals for AI Evaluation Harness & Benchmark Framework

by Miles Jamison
March 12, 2026
DOW

The Department of War, in coordination with the Office of the Director of National Intelligence, is seeking industry proposals for an evaluation harness and government-defined benchmarks that would enable...

Read moreDetails

DHA Introduces Data & Innovation Strategy to Support Military Health Operations

by Elodie Collins
March 12, 2026
DHA Introduces Data & Innovation Strategy to Support Military Health Operations

The Defense Health Agency launched a Data and Innovation Strategy to improve warfighter readiness. Jesus Caban, DHA's chief data and analytics officer, said the strategy will help build...

Read moreDetails
Wash100 Vote Now
Executive Gov

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

CATEGORIES

  • Acquisition & Procurement
  • Announcements
  • Articles
  • Artificial Intelligence
  • Awards
  • Big Data & Analytics News
  • C4ISR
  • Civilian
  • Cloud
  • Contract Awards
  • Cybersecurity
  • Defense And Intelligence
  • DHS
  • Digital Modernization
  • DoD
  • Events
  • Executive Moves
  • Executive Spotlights
  • Federal Civilian
  • Financial Reports
  • General News
  • GovCon Expert
  • Government Technology
  • GSA
  • Healthcare IT
  • Industry News
  • Intelligence
  • Legislation
  • M&A Activity
  • News
  • Press Releases
  • Profiles
  • Space
  • Videos
  • Wash100

BROWSE BY TAG

5G/Future G Acquisition & Procurement Air Force Army Artificial Intelligence Civilian Cloud Cyber DOD/Defense Executive Mosaic Healthcare Multi-Domain/JADC2 Navy Quantum Space Unmanned Systems

© 2026 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • 2FA Activation
  • About
  • Add new author
  • Advertising
  • All posts for lastweek
  • All posts for this week
  • All posts for yesterday
  • Archive Days
  • Archive Months
  • Archives
  • Become an ExecutiveGov Insider
  • Contact Us
  • Daily Posts
  • ExecutiveGov News Feed
  • Full Statistics
  • GovCon news videos
  • Home
  • Latest News
  • Posts for today
  • Sign Up
  • Submit your news
  • Test Page
  • Thank you

© 2026 JNews - Premium WordPress news & magazine theme by Jegtheme.