Enterprise Cloud Service Broker

FREQUENTLY ASKED QUESTIONS

PRINT PAGE Add This
  1. Can I bypass Information Assurance activities by leveraging non-cloud, as opposed to cloud, services or by acquiring services myself rather than going through the Broker? [Answer]
  2. Is there any guidance that applies specifically to use of commercial cloud services? [Answer]
  3. Are there any considerations related to commercial cloud services that preclude me from doing a full and open acquisition? [Answer]
  4. Are there any special considerations related to use of Software as a Service? [Answer]
  5. What policy and other documents are relevant to Information Assurance and use of cloud services by DoD? [Answer]

Can I bypass Information Assurance activities by leveraging non-cloud, as opposed to cloud, services or by acquiring services myself rather than going through the Broker?

No. DoD Information Assurance, NetOps, and Computer Network Defense policies apply to operation and use of all cloud and non-cloud IT infrastructure, platform, and software services and applications and apply regardless of how the acquisition is accomplished.

Is there any guidance that applies specifically to use of commercial cloud services?

Yes. Per the 9 December 2011 "Interim Guidance Memorandum on Use of Commercial Cloud Computing Services", "...use of third party, off-premises cloud services will require a waiver from the GIG Waiver Panel in order to preserve the security of DoD data and mission assurance in the face of persistent cyber threats from capable adversaries”.

Are there any considerations related to commercial cloud services that preclude me from doing a full and open acquisition?

There are no considerations that preclude such an acquisition. However, you should take the required certification and accreditation activities into account in your acquisition planning. Based on current policies, it may take considerable time and effort for a vendor to get the required support infrastructure in place to meet the monitoring and reporting requirements for Controlled Unclassified Data (including Personally Identifiable Information and Protected Health Information).

Are there any special considerations related to use of Software as a Service?

Yes. For Software as a Service (SaaS), the entire stack (infrastructure, platform, and software) must be accredited before implementation. If the SaaS is going to operate on a previously accredited infrastructure, the timeline for certification and accreditation may be shorter than if the entire stack is being assessed for the first time.

What policy and other documents are relevant to Information Assurance and use of cloud services by DoD?