Close Menu
CloudSecNewsHub
  • News
  • Technologies
  • Automation
  • Updates
  • Guides
  • Tools
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

What's Hot

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025
Facebook X (Twitter) Instagram
Trending
  • Google Cloud Security Plitz attacks e -hunting, improves vision
  • How to pick up criminal evidence for Microsoft 365
  • Cloud security treatment: American federal edition
  • The most prominent report: 2025 Experience of exposure to cloud data
  • Artificial intelligence agents to convert Google Cloud Security Ops
  • The necessity of cloud security in the electronic scene today
  • Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies
  • Ransomware Spike displays cracks in cloud safety
Facebook X (Twitter) Instagram Pinterest Vimeo
CloudSecNewsHubCloudSecNewsHub
  • News

    How to pick up criminal evidence for Microsoft 365

    May 8, 2025

    The most prominent report: 2025 Experience of exposure to cloud data

    May 7, 2025

    Artificial intelligence agents to convert Google Cloud Security Ops

    May 6, 2025

    Ransomware Spike displays cracks in cloud safety

    May 5, 2025

    Sentinelone wins the best safety point and cloud security at the 2025 SC Awards

    May 1, 2025
  • Technologies

    Gartner: How to build a safe institution cloud environment

    April 21, 2025

    Promote South Korea's national security by adopting the cloud

    April 11, 2025

    “The traditional methods of cloud safety, where organizations depend on the segmented cloud safety tools, are not simply enough”

    April 3, 2025

    Stream.security The cloud solution in actual time in industry with TRP technology designed to dilute proactively from the effect of breach in the cloud

    April 1, 2025

    Skyhawk's creation platform mentioned in 2024 Gartner Emerging Tech Impact Radar: Preventive Cyber ​​Security

    March 28, 2025
  • Automation

    Cloud Security Alliance launches an initiative to automate compliance

    April 30, 2025

    The security automation market to see a great expansion

    April 25, 2025

    GSA FedRAMP '20X' rejuvenation keys to automation, to the approvals in “Weeks” – MERITALK

    April 16, 2025

    Cortex Cloud – cloud safety conversion

    April 11, 2025

    TUFIN extends the possibilities of the security of the cloud and the network with the latest version of the synchronous pavilion

    April 8, 2025
  • Updates

    Google Cloud Security Plitz attacks e -hunting, improves vision

    May 8, 2025

    April 2025 Correction Tuesday: updates and analysis

    April 15, 2025

    Google Cloud 2025: News and updates

    April 12, 2025

    5 Google Big Google Aman ads on the next 2025

    April 9, 2025

    Google offers a unified safety platform and safety agents driven by artificial intelligence

    April 9, 2025
  • Guides

    CISO guide for effective cloud security strategies

    April 30, 2025

    Singapore offers instructions to support the cloud and the elasticity of the first place

    April 29, 2025

    Singapore has new guidelines to enhance flexibility and security for cloud services and data centers

    April 5, 2025

    What is the safety of the cloud? | IBM

    April 3, 2025

    Google gets Wiz for $ 32 billion to boost cloud safety

    March 19, 2025
  • Tools

    Cloud security treatment: American federal edition

    May 7, 2025

    The necessity of cloud security in the electronic scene today

    May 6, 2025

    Crowdstrike (CRWD) launches Amnesty International Security tools to improve the cloud p

    April 30, 2025

    The 5 best CNAPP benefits that you need to know in 2025

    April 26, 2025

    The security coalition cloud launches the latest security report. Saas

    April 26, 2025
  • Compliance

    Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies

    May 5, 2025

    Ensuring commitment to international standards

    April 29, 2025

    Thales and Deloitte are an alliance to enhance the security and compliance data strategies

    April 22, 2025

    AWS security compliance is easy: IT-Magic Devops solutions for a stronger security situation

    April 21, 2025

    5 ways that banks can achieve smooth security and compliance in 2025

    April 14, 2025
Login
CloudSecNewsHub
Home»Compliance»Complying with the National Cybersecurity Strategy requires a modern cloud
Compliance

Complying with the National Cybersecurity Strategy requires a modern cloud

CloudSecNewsHubBy CloudSecNewsHubMay 22, 2024No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Complying With The National Cybersecurity Strategy Requires A Modern Cloud
Share
Facebook Twitter LinkedIn Pinterest Email

One year after the delivery of the Biden administration's National Cybersecurity Strategy, federal agencies continue to work to evolve their IT architectures to meet enhanced standards for cloud modernization. Fortunately, these new federal mandates on what were previously recommended guidelines are pushing agencies in the direction they should be going anyway — toward more optimized cloud infrastructures that enable stronger performance and better cost management.

As the name suggests, the main objective of the National Cybersecurity Strategy is to enhance cybersecurity across the government. However, these new rules also directly impact how cloud architectures are updated and configured. For example, cloud infrastructures capable of doing this must support more robust digital identity solutions to promote a “secure and efficient digital economy.” As another example, new regulations for managing the Internet of Things require more traceability and control for sensors and other devices, including better automated systems for patching and updating.

These and other imperatives will make up the to-do list of federal cloud development teams for years to come as they strive to evolve their architectures to be more agile, interconnected, and automated. While some agencies are choosing to modernize by relying on hybrid environments, such as cloud-native networks that work with on-premises storage and compute architectures, other agencies have already made significant progress moving assets to the cloud.

For example, the Defense Logistics Agency has moved the majority of its assets to the cloud in recent years, leaving only two on-premises applications.

Whatever the specific IT landscape, the transformation imperative is for agencies to ensure compliance, security, observability, maximum ROI, and efficiency as they move data and applications to and from the cloud. Of course, this is easier said than done. First, there is a need to blend legacy standards and practices with modern components to ensure that all systems can communicate effectively.

There is also a need for greater cross-government consensus on zero trust, a key element of the strategy whose parameters can vary in focus and level of centralization, depending on the agency.

Additionally, cost management remains an issue, especially given the number of non-strategic migrations public and private sector organizations have undertaken in the hectic pandemic era to adapt to remote work scenarios quickly. Consider the impact of dual infrastructure costs for an application whose front-end is moved to the cloud, leaving the back-end in place, for example.

Ensure compliance with the correct strategy

Solving the above challenges requires cloud modernization teams to conduct comprehensive research and planning from a performance and cost standpoint. The best methodologies take a cloud-first approach to developing software, organizing data, and rebuilding applications – regardless of whether these activities occur in the cloud or on-premise, and regardless of the direction in which the migration process between these destinations may go.

To support this approach, agencies must ensure strong data, audit and availability standards are in place across the IT sector; They must take full advantage of containers, microservices, and other cloud-native DevOps technologies – not just in the cloud, but also initially and even with support from SaaS providers, MSPs, or other third-party partners. Furthermore, the likelihood of success can be increased by adopting four key priorities in the planning and implementation phases:

– Adopt a results-focused mindset: Conduct a comprehensive analysis that includes both technical and field specialists to clarify the desired outcome of the modernization task, and then plan to achieve this outcome using only the data and tools necessary to achieve it.

Enforce open standards and interoperability: No single technology solves all problems. This places great importance on interoperability across many best-in-class technologies. Open standards and common protocols for ITSM, log and patch management, and other important functions are essential to enable this interoperability.

– Take an agnostic approach to migration: The cost management examples mentioned above emphasize that migration is not a one-way path to the cloud. Rationalizing your IT investment based on the destination – cloud, on-premises, a third-party SaaS vendor or MSP – is the best candidate for solving a performance, security, or cost issue.

– Ensure that automation is grounded in knowledge management: Automating an application or function without proper business context applied to the underlying processes can limit the effectiveness of the tool at scale. Ensure knowledge management is part of the process by bringing in domain experts and validating the business context before automating and scaling.

Cloud certification requirements emerging from the National Cybersecurity Strategy provide federal agencies with an important opportunity to improve their cloud configurations as they work to comply with mandates. While each agency must customize its approach to fit its unique environment and mission objectives, a strong modernization strategy can ensure compliance through better visibility and management across all IT assets, processes and systems.

Lee Copping is a senior public sector technologist at ScienceLogic

cloud Complying Cybersecurity modern National requires Strategy
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCloud security incidents that organizations suffer from
Next Article A guide to cloud security for K-12 schools
admin
CloudSecNewsHub
  • Website

Related Posts

Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025
Tools

Cloud security treatment: American federal edition

May 7, 2025
News

The most prominent report: 2025 Experience of exposure to cloud data

May 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

CloudSecNewsHubMay 8, 2025
News

How to pick up criminal evidence for Microsoft 365

CloudSecNewsHubMay 8, 2025
Tools

Cloud security treatment: American federal edition

CloudSecNewsHubMay 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Most Popular

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Don't Miss

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
© 2025 CloudSecNewsHub. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?