Azure Government

Updates for building solutions across Microsoft's Clouds for Government

Register now: Cyber Agility with the Cloud webinar

Cloud enables an ever-accelerating pace of innovation and change. At the same time, cloud architecture challenges fundamental assumptions of on-premises cybersecurity practices; existing security and compliance frameworks simply can't keep up. The next evolution of cybersecurity is a transition away from "best practice" models of security to a...

Federal agencies continue to advance capabilities with Azure Government

We’re continuing to see agencies advance their capabilities using Azure Government. Two agencies have recently issued new Authority to Operate (ATO) designations for Azure Government: the U.S. Air Force with a DoD Impact Level 4 ATO for its Common Computing Environment (CCE) and U.S. Immigration and Customs Enforcement (ICE) with a FedRAMP ...

Optimize Uptime While Staying Secure

With the recent announcement of the industry-wide, hardware-based CPU vulnerability, organizations must ensure they have appropriately updated their infrastructure to secure their environment. Microsoft Azure Government customer environments were patched prior to the public announcement. Additionally, Microsoft publicly announced the patching ...

Unlock data insights to drive agency mission

(image) Now more than ever, federal CIOs can leverage business intelligence (BI) and advanced analytics to simplify data management, unlock valuable insights, and use these insights to improve operations across their agencies. Advanced analytics allows CIOs to connect available data to their agency’s larger mission. Sophisticated tools ...

Azure Security and Compliance Blueprint – Web Applications for FedRAMP

Today we are pleased to announce the general availability of a new Azure Security and Compliance Blueprint - Web Applications for FedRAMP. This solution deploys and configures Azure resources in a simple reference architecture and implements a subset of controls from the FedRAMP High baseline, based on NIST SP 800-53. Deploying the solution ...

Utilizing the cloud for greater security everywhere

(image) In my day-to-day work, I help government agencies implement initiatives to protect, detect and respond to breaches. You've likely heard statistics - on average globally, it takes 191 days to identify a data breach and that the median number of days an attacker stays dormant within a network before detection is over 200. To put that in ...