Risk
8/1/2013
01:11 PM
Connect Directly
RSS
E-Mail
50%
50%

Government IT Using Cloud To Manage Internet Gateways

Cloud-based managed services offer enhanced security and lower cost alternatives to managing trusted Internet connections.

5 Helpful Online Services From Uncle Sam
5 Helpful Online Services From Uncle Sam
(click image for larger view)
Cloud- and service-oriented IT providers are giving government agencies a new approach to controlling and managing their Internet gateways more securely and at lower cost.

The most recent example can be found in Australia where the Australian Federal Police (AFP) has contracted Verizon Communications Inc. to supply a managed gateway service that will boost the security, reliability and overall efficiency of the agency's IT systems. As a critical part of the contract, Verizon will reduce the number of AFP's Internet gateways to eight from 124.

Verizon's contract reflects growing demand over the past several years by governments around world for managed trusted Internet connection services, Jonathan Nguyen-Duy, director of public sector cybersecurity for Verizon, told InformationWeek Government.

[ Who are U.S. government's cloud partners? Read Amazon Cloud Gets Federal Stamp Of Approval. ]

The trend is being driven not only by the increasing volume and types of cyber threats, but by the depreciation of legacy security systems and pressure on governments to cut costs and migrate to cloud-based services, he said.

"We've seen consistent growth and we've seen it in terms of the types of orders that are now coming in from some of the larger agencies," he said. "When I first started we were seeing small orders from sub-agencies but now we're seeing whole, executive-branch agencies, like a department, for instance."

Verizon's three-year, $15 million ($14 million in U.S. dollars) agreement with the AFP is in line with the Australian government's Gateway Reduction Program, led by its Department of Finance.

"The contract is a cloud-based gateway that reduces the number of Internet connections and applies uniform security to those connections so that a number of government agencies can have a security posture and greater situational and contextual awareness of what's happening on their networks," Nguyen-Duy said.

The Gateway Reduction Program's U.S. counterpart is the General Services Administration's Managed Trusted Internet Protocol Services program (MTIPS), which offers trusted Internet connections-compliant managed security services through Networx. Verizon is a certified MTIPS industry partner along with AT&T, Qwest and Sprint. Nguyen-Duy declined to identify U.S. agencies that have signed contracts with Verizon under MTIPS.

One of the U.S. government's objectives under MTIPS is to reduce some 5,000 Internet connections to a dozen or so, Nguyen-Duy said. About 15 to 20 countries have asked Verizon to brief them on MTIPS and how they can deploy similar trusted internet connections programs, he added.

MTIPS and Australia's Gateway Reduction Program have similar goals and are structurally analogous. One difference, Nguyen-Duy said, is that the Aussie program is more "bundled."

Under the terms of the Australian gateway deal, Verizon will provide the AFP and its client agencies with intrusion detection and firewall management, anti-spam and anti-virus management, VPN management and denial of service [DOS] protection with IPv6-capable bandwidth. With management fully outsourced to Verizon, the company will also staff a local contact center that will provide 24/7support.

"MTIPS doesn't provide VPN for remote access and doesn't provide for DOS services," he said. "Those are additional services that the various U.S. agencies would procure but the Australian gateway has that all integrated, and that goes to their more specific requirements."

Australia, like most countries in the Pacific Rim, is concerned about cyber threats from inside China and from Chinese nationals, he said. In the most recent attack on Australia's networks, the blueprints for the design of the government's National Intelligence Center were compromised. Australian officials said the attack was traced back to a server in China, Nguyen-Duy said.

The Chinese threat is also a major worry for U.S. officials. "I think both [the U.S. and Australia] clearly perceive that the primary threat in terms of nation-state espionage is Chinese," he said.

The U.S. government, however, faces a greater number of threats. "The volume of generalized attacks is probably higher in the U.S. just because there are more targets," Nguyen-Duy said. "But in terms of the level of sophistication, it's the same and in many cases it's the same threat actors."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3594
Published: 2014-08-22
Cross-site scripting (XSS) vulnerability in the Host Aggregates interface in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-3 allows remote administrators to inject arbitrary web script or HTML via a new host aggregate name.

CVE-2014-4197
Published: 2014-08-22
Multiple SQL injection vulnerabilities in Bank Soft Systems (BSS) RBS BS-Client 3.17.9 allow remote attackers to execute arbitrary SQL commands via the (1) CARDS or (2) XACTION parameter.

CVE-2014-5097
Published: 2014-08-22
Multiple SQL injection vulnerabilities in Free Reprintables ArticleFR 3.0.4 and earlier allow remote attackers to execute arbitrary SQL commands via the id parameter in a (1) get or (2) set action to rate.php.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.