Risk
8/29/2012
12:25 PM
50%
50%

U.S. Intelligence Agencies Seek A Private Cloud OS

CIA's investment arm has partnered with Adaptive Computing to develop a cloud OS for agencies' use. OpenStack platform may be used.

Defense Tech: 20 War-Fighting Innovations
Military Transformers: 20 Innovative Defense Technologies
(click image for larger view and for slideshow)
In-Q-Tel, the investment arm of the CIA, has partnered with cloud management specialist Adaptive Computing to develop a "cloud operating system" for use by U.S. intelligence agencies.

Adaptive will integrate its Moab cloud management suite with an unspecified open source cloud platform--potentially OpenStack, CloudStack, or another alternative--to create the cloud OS.

Adaptive's Moab Cloud Suite provides service provisioning, service catalogs, and policy management in cloud environments. The company holds patents in areas such as multi-tier applications, time-based policy enforcement, and hybrid and multi-tenant clouds.

In a written announcement on the partnership, Robert Ames, senior VP of In-Q-Tel's information and communication technologies practice, cited Adaptive's experience in cloud management software and its development capabilities in deciding to work with the company. The company's customers include the National Security Agency, national laboratories, the National Oceanic and Atmospheric Administration, and the U.S. military.

[ The feds are embracing new technologies to prepare for the digital age. Read DARPA Seeks 'Plan X' Cyber Warfare Tools. ]

U.S. director of national intelligence James Clapper said at an industry conference last year that the Intelligence Community (comprised of 17 federal agencies and departments) would be moving to the cloud model as a way of meeting budget reductions. Given the security requirements of intelligence agencies, private clouds may be the preferred way of doing that.

CIA CTO Gus Hunt, speaking at InformationWeek's GovCloud conference last year, said cloud computing, because if its virtual, dynamic nature, could potentially be more secure than traditional IT approaches. "I've created a world in which my workloads are constantly fresh and clean, and I have created a shell game by turning myself into a polymorphic attack service," he said. (InformationWeek Government's GovCloud 2012 conference will be held Oct. 17 in Washington, D.C)

The non-profit Intelligence and National Security Alliance earlier this year released a white paper that identified issues around cloud adoption, including security and the suitability of various cloud environments (public, private, or hybrid). At the same time, the INSA concluded that agencies stand to benefit from an increased ability to share and analyze large quantities of data.

Adaptive Computing, previously known as Cluster Resources, has a background in managing high-performance computing clusters, which it is applying to the supervision of x86 servers in private clouds. The company's Moab technology employs a multi-dimensional "intelligence engine" to the management and allocation of IT resources.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8370
Published: 2015-01-29
VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file.

CVE-2015-0236
Published: 2015-01-29
libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.

CVE-2015-1043
Published: 2015-01-29
The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors.

CVE-2015-1044
Published: 2015-01-29
vmware-authd (aka the Authorization process) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allows attackers to cause a host OS denial of service via unspecified vectors.

CVE-2015-1422
Published: 2015-01-29
Multiple cross-site scripting (XSS) vulnerabilities in Gecko CMS 2.2 and 2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) horder[], (2) jak_catid, (3) jak_content, (4) jak_css, (5) jak_delete_log[], (6) jak_email, (7) jak_extfile, (8) jak_file, (9) jak_hookshow[], (10) j...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.