Risk
8/1/2013
01:11 PM
50%
50%

Government IT Using Cloud To Manage Internet Gateways

Cloud-based managed services offer enhanced security and lower cost alternatives to managing trusted Internet connections.

5 Helpful Online Services From Uncle Sam
5 Helpful Online Services From Uncle Sam
(click image for larger view)
Cloud- and service-oriented IT providers are giving government agencies a new approach to controlling and managing their Internet gateways more securely and at lower cost.

The most recent example can be found in Australia where the Australian Federal Police (AFP) has contracted Verizon Communications Inc. to supply a managed gateway service that will boost the security, reliability and overall efficiency of the agency's IT systems. As a critical part of the contract, Verizon will reduce the number of AFP's Internet gateways to eight from 124.

Verizon's contract reflects growing demand over the past several years by governments around world for managed trusted Internet connection services, Jonathan Nguyen-Duy, director of public sector cybersecurity for Verizon, told InformationWeek Government.

[ Who are U.S. government's cloud partners? Read Amazon Cloud Gets Federal Stamp Of Approval. ]

The trend is being driven not only by the increasing volume and types of cyber threats, but by the depreciation of legacy security systems and pressure on governments to cut costs and migrate to cloud-based services, he said.

"We've seen consistent growth and we've seen it in terms of the types of orders that are now coming in from some of the larger agencies," he said. "When I first started we were seeing small orders from sub-agencies but now we're seeing whole, executive-branch agencies, like a department, for instance."

Verizon's three-year, $15 million ($14 million in U.S. dollars) agreement with the AFP is in line with the Australian government's Gateway Reduction Program, led by its Department of Finance.

"The contract is a cloud-based gateway that reduces the number of Internet connections and applies uniform security to those connections so that a number of government agencies can have a security posture and greater situational and contextual awareness of what's happening on their networks," Nguyen-Duy said.

The Gateway Reduction Program's U.S. counterpart is the General Services Administration's Managed Trusted Internet Protocol Services program (MTIPS), which offers trusted Internet connections-compliant managed security services through Networx. Verizon is a certified MTIPS industry partner along with AT&T, Qwest and Sprint. Nguyen-Duy declined to identify U.S. agencies that have signed contracts with Verizon under MTIPS.

One of the U.S. government's objectives under MTIPS is to reduce some 5,000 Internet connections to a dozen or so, Nguyen-Duy said. About 15 to 20 countries have asked Verizon to brief them on MTIPS and how they can deploy similar trusted internet connections programs, he added.

MTIPS and Australia's Gateway Reduction Program have similar goals and are structurally analogous. One difference, Nguyen-Duy said, is that the Aussie program is more "bundled."

Under the terms of the Australian gateway deal, Verizon will provide the AFP and its client agencies with intrusion detection and firewall management, anti-spam and anti-virus management, VPN management and denial of service [DOS] protection with IPv6-capable bandwidth. With management fully outsourced to Verizon, the company will also staff a local contact center that will provide 24/7support.

"MTIPS doesn't provide VPN for remote access and doesn't provide for DOS services," he said. "Those are additional services that the various U.S. agencies would procure but the Australian gateway has that all integrated, and that goes to their more specific requirements."

Australia, like most countries in the Pacific Rim, is concerned about cyber threats from inside China and from Chinese nationals, he said. In the most recent attack on Australia's networks, the blueprints for the design of the government's National Intelligence Center were compromised. Australian officials said the attack was traced back to a server in China, Nguyen-Duy said.

The Chinese threat is also a major worry for U.S. officials. "I think both [the U.S. and Australia] clearly perceive that the primary threat in terms of nation-state espionage is Chinese," he said.

The U.S. government, however, faces a greater number of threats. "The volume of generalized attacks is probably higher in the U.S. just because there are more targets," Nguyen-Duy said. "But in terms of the level of sophistication, it's the same and in many cases it's the same threat actors."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.