Risk
8/1/2013
01:11 PM
50%
50%

Government IT Using Cloud To Manage Internet Gateways

Cloud-based managed services offer enhanced security and lower cost alternatives to managing trusted Internet connections.

5 Helpful Online Services From Uncle Sam
5 Helpful Online Services From Uncle Sam
(click image for larger view)
Cloud- and service-oriented IT providers are giving government agencies a new approach to controlling and managing their Internet gateways more securely and at lower cost.

The most recent example can be found in Australia where the Australian Federal Police (AFP) has contracted Verizon Communications Inc. to supply a managed gateway service that will boost the security, reliability and overall efficiency of the agency's IT systems. As a critical part of the contract, Verizon will reduce the number of AFP's Internet gateways to eight from 124.

Verizon's contract reflects growing demand over the past several years by governments around world for managed trusted Internet connection services, Jonathan Nguyen-Duy, director of public sector cybersecurity for Verizon, told InformationWeek Government.

[ Who are U.S. government's cloud partners? Read Amazon Cloud Gets Federal Stamp Of Approval. ]

The trend is being driven not only by the increasing volume and types of cyber threats, but by the depreciation of legacy security systems and pressure on governments to cut costs and migrate to cloud-based services, he said.

"We've seen consistent growth and we've seen it in terms of the types of orders that are now coming in from some of the larger agencies," he said. "When I first started we were seeing small orders from sub-agencies but now we're seeing whole, executive-branch agencies, like a department, for instance."

Verizon's three-year, $15 million ($14 million in U.S. dollars) agreement with the AFP is in line with the Australian government's Gateway Reduction Program, led by its Department of Finance.

"The contract is a cloud-based gateway that reduces the number of Internet connections and applies uniform security to those connections so that a number of government agencies can have a security posture and greater situational and contextual awareness of what's happening on their networks," Nguyen-Duy said.

The Gateway Reduction Program's U.S. counterpart is the General Services Administration's Managed Trusted Internet Protocol Services program (MTIPS), which offers trusted Internet connections-compliant managed security services through Networx. Verizon is a certified MTIPS industry partner along with AT&T, Qwest and Sprint. Nguyen-Duy declined to identify U.S. agencies that have signed contracts with Verizon under MTIPS.

One of the U.S. government's objectives under MTIPS is to reduce some 5,000 Internet connections to a dozen or so, Nguyen-Duy said. About 15 to 20 countries have asked Verizon to brief them on MTIPS and how they can deploy similar trusted internet connections programs, he added.

MTIPS and Australia's Gateway Reduction Program have similar goals and are structurally analogous. One difference, Nguyen-Duy said, is that the Aussie program is more "bundled."

Under the terms of the Australian gateway deal, Verizon will provide the AFP and its client agencies with intrusion detection and firewall management, anti-spam and anti-virus management, VPN management and denial of service [DOS] protection with IPv6-capable bandwidth. With management fully outsourced to Verizon, the company will also staff a local contact center that will provide 24/7support.

"MTIPS doesn't provide VPN for remote access and doesn't provide for DOS services," he said. "Those are additional services that the various U.S. agencies would procure but the Australian gateway has that all integrated, and that goes to their more specific requirements."

Australia, like most countries in the Pacific Rim, is concerned about cyber threats from inside China and from Chinese nationals, he said. In the most recent attack on Australia's networks, the blueprints for the design of the government's National Intelligence Center were compromised. Australian officials said the attack was traced back to a server in China, Nguyen-Duy said.

The Chinese threat is also a major worry for U.S. officials. "I think both [the U.S. and Australia] clearly perceive that the primary threat in terms of nation-state espionage is Chinese," he said.

The U.S. government, however, faces a greater number of threats. "The volume of generalized attacks is probably higher in the U.S. just because there are more targets," Nguyen-Duy said. "But in terms of the level of sophistication, it's the same and in many cases it's the same threat actors."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice post
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1750
Published: 2015-07-01
Open redirect vulnerability in nokia-mapsplaces.php in the Nokia Maps & Places plugin 1.6.6 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the href parameter to page/place.html. NOTE: this was originally reported as cross-sit...

CVE-2014-1836
Published: 2015-07-01
Absolute path traversal vulnerability in htdocs/libraries/image-editor/image-edit.php in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the image_path parameter in a cancel action.

CVE-2015-0848
Published: 2015-07-01
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.

CVE-2015-1330
Published: 2015-07-01
unattended-upgrades before 0.86.1 does not properly authenticate packages when the (1) force-confold or (2) force-confnew dpkg options are enabled in the DPkg::Options::* apt configuration, which allows remote man-in-the-middle attackers to upload and execute arbitrary packages via unspecified vecto...

CVE-2015-1950
Published: 2015-07-01
IBM PowerVC Standard Edition 1.2.2.1 through 1.2.2.2 does not require authentication for access to the Python interpreter with nova credentials, which allows KVM guest OS users to discover certain PowerVC credentials and bypass intended access restrictions via unspecified Python code.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report