Azure Government

Insights, how-tos and updates for building solutions on Microsoft's cloud for US government

Application Security Groups now generally available in Azure Government

We are pleased to announce general availability of Application Security Groups (ASG) in all Azure regions including Azure Government. This feature provides security micro-segmentation for your virtual networks in Azure. The detailed announcement can be viewed here: https://azure.microsoft.com/en-us/blog/applicationsecuritygroups/ ASGs ...

Federal agencies continue to advance capabilities with Azure Government

We’re continuing to see agencies advance their capabilities using Azure Government. Two agencies have recently issued new Authority to Operate (ATO) designations for Azure Government: the U.S. Air Force with a DoD Impact Level 4 ATO for its Common Computing Environment (CCE) and U.S. Immigration and Customs Enforcement (ICE) with a FedRAMP ...

Microsoft Azure Enables NIST CSF Compliance: Respond Function

Today, as part of our ongoing support of the Cybersecurity Executive Order, I am pleased to announce the second release in a series of documents on enabling compliance with the NIST Cybersecurity Framework (CSF) through Microsoft Azure services. This release specifically outlines how to implement the Respond function requirements using the ...

Criminal Justice Information Services – What’s new in v5.6 and being considered for v5.7

Microsoft helping agencies prepare for regulatory revisions As part of Microsoft's commitment to meet the applicable requirements of the Criminal Justice Information Services (CJIS) Security Policy, it is critical to prepare in advance for future requirements as well. With law enforcement deploying innovative solutions for camera technology, ...

How to prepare for one – The CJIS Security Audit

In Microsoft's continuous effort to provide resources and guidance to agencies to help them meet their CJIS regulatory requirements, Microsoft collaborated with Alan Ferretti, CJIS Security Analyst and Subject Matter Expert of the CJIS ACE Division at Diverse Computing and former CJIS Information Security Officer (ISO), to ponder the following...

The CJIS Security Policy – Analyzing the 13 Policy Areas: Part III

Better than a sleeping pill or a riveting read? Welcome back to the third and final post in this series on the CJIS Security Policy. Our last post ended with Policy Area 7 of section 5 concerning Network Diagrams. Policy Area 8 covers Media Protection and how to protect it both in transit and at rest. It also covers the proper way to dispose...

The CJIS Security Policy – Analyzing the 13 Policy Areas: Part II

 Better than a sleeping pill or a riveting read? In our last blog post, Alan Ferretti, CJIS Security Analyst and Subject Matter Expert of the CJIS ACE Division at Diverse Computing, and I covered the first four sections of the CJIS Security Policy. We will continue with Section 5 and its thirteen Policy areas and how they impact you and your...

The CJIS Security Policy – Analyzing the 13 Policy Areas: Part I

Better than a sleeping pill or a riveting read? Recently Alan Ferretti and I were talking about compliance for agencies and lamented on the fact that most people malign  the CJIS Security Policy as a good cure for insomnia. It seems you can’t attend a conference where a speaker doesn’t make a joke about it. When in fact, the Policy is ...

Feedback usabilla icon