Azure Government

Updates for building solutions across Microsoft's Clouds for Government

Extract data from print and handwritten documents using Azure Form Recognizer

Now available in Azure Government, Form Recognizer is an AI-powered document extraction service that understands your forms, enabling you to extract text, tables, and key value pairs from your documents, whether print or handwritten. With just a few samples, Form Recognizer tailors its understanding to your documents, both on-premises and ...

Commercial best practices for DevSecOps in Defense

The Department of Defense has taken several measures to integrate a DevSecOps strategy across its entire organization. For example, the DoD Enterprise DevSecOps Initiative is a joint effort on behalf of the Chief Information Officer and the Office of the Undersecretary of Defense for Acquisition and Sustainment to integrate tools and services ...

With 14 new services at FedRAMP High, Azure Government continues expanding compliance coverage

Microsoft now has 116 services covered by the Federal Risk and Authorization Management Program (FedRAMP) High Provisional Authorization to Operate (P-ATO) for Azure Government. We continue to bring you more services at FedRAMP High than any other cloud provider, delivering on our ongoing investments in commercial parity and our commitment to ...

79 Azure Government services now authorized for DoD IL5 workloads

Just over a year ago, we announced the expansion of support for Department of Defense Security Requirements Guide (DoD SRG) Impact Level 5 (IL5) to all Azure Government regions – today we have 79 services authorized for IL5 workloads in Azure Government, enabling mission owners with more services at IL5 than any other cloud provider. ...

CMMC with Microsoft Azure: Security Assessment & Situational Awareness (8 of 10)

This is the eighth in a ten-part blog series where we’ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into system & communications protection and system & information integrity. In this eighth blog of the series we will explore how to ...