Welcome!

Government Cloud Authors: Elizabeth White, Liz McMillan, Pat Romanski, Dana Gardner, Gopala Krishna Behara

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Agile Computing, Cloud Security, Government Cloud

@CloudExpo: Blog Feed Post

Government SaaS Entrepreneur

What are these high security standards, where and how are they defined?

As the name suggests our Government SaaS Entrepreneur program tailors their venture accelerator for apps for the public sector.

Examples of apps that have already gone through this process include Huddle IL3, referring to it being suitable for the UK’s information security classification IL3. This has resulted in the Huddle app grabbing the lions share of the G-Cloud market.

In this interview with Dave Nicholl, CIO for Ontario Province, talks about how they would consider this type of service for key requirements like their Drivers Licence applications, with a critical point about security:

“Typically, software as a service providers don’t create applications tailored for governments, he said. That said, “if we could find a drivers [licence] system that was software as a service we’d absolutely look at it,” he added – if it had adequate security.”

Secure Government SaaS – Specifications

So what are these high security standards, where and how are they defined?

This is the purpose of our new OASIS open standards group, called PACR, read more here in the launch briefing. This encompasses:

  • Cloud Security Alliance best practices - The CSA provides a comprehensive framework for securing Cloud environments, the backbone of which is the use of encryption at different levels: Encrypting VMs, data at rest and also in transit from the Cloud to the corporate data centre.
  • Cloud Identity Ecosystem - In the USA the NSTIC experts are pioneering the ‘Identity Ecosystem‘, where online service access is streamlined for citizens through “Social sign-on”. Microsoft provides a thorough expanation of how Government can apply these principles and technologies in this PPT presentation (42-page PDF)
  • Cloud Archiving and Compliance – A critical piece for governments is the Cloud Providers ability to meet their compliance needs. In line with standards like ISO 27037 this encompasses being able to verify digital evidence-ready record keeping, implementing litigation holds, maintaining an always-on irrefutable record of all transactions and other chain-of-custody features required for e-discovery.

Service Innovation and Solution Accelerators

The above technical capabilities are enabled by an ecosystem of vendor partners offering new technology products, that can be adopted by Cloud Providers and integrated into their environments to achieve a Government Secure SaaS platform.

This opens up opportunities for new service innovations, which can be pre-packaged into Solution Accelerators that helps entrepreneurs fast-track their venture

Guardtime – Keyless Signatures

This solution development process provides a context for the innovations that our Vendor partners are creating.

For example Guardtime has invented ‘Keyless Signatures’ that can play a major role in securing the integrity of information, the fundamental requirement for legally admissible materials.

It can be built into Cloud environments, as described here, and enable a variety of new services relevant to government. For example cMail, for Certified Email, that could be used for financial transactions through to doctors eReferals.

Read the original blog entry...

More Stories By Cloud Best Practices Network

The Cloud Best Practices Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net

IoT & Smart Cities Stories
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
After years of investments and acquisitions, CloudBlue was created with the goal of building the world's only hyperscale digital platform with an increasingly infinite ecosystem and proven go-to-market services. The result? An unmatched platform that helps customers streamline cloud operations, save time and money, and revolutionize their businesses overnight. Today, the platform operates in more than 45 countries and powers more than 200 of the world's largest cloud marketplaces, managing mo...
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
Apptio fuels digital business transformation. Technology leaders use Apptio's machine learning to analyze and plan their technology spend so they can invest in products that increase the speed of business and deliver innovation. With Apptio, they translate raw costs, utilization, and billing data into business-centric views that help their organization optimize spending, plan strategically, and drive digital strategy that funds growth of the business. Technology leaders can gather instant recomm...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams t...
The graph represents a network of 1,329 Twitter users whose recent tweets contained "#DevOps", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 10 January 2019 at 23:50 UTC. The tweets in the network were tweeted over the 7-hour, 6-minute period from Thursday, 10 January 2019 at 16:29 UTC to Thursday, 10 January 2019 at 23:36 UTC. Additional tweets that were mentioned in this...