Welcome!

@CloudExpo Authors: Elizabeth White, Yeshim Deniz, Zakia Bouachraoui, Liz McMillan, Pat Romanski

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Agile Computing, Cloud Security, Government Cloud

@CloudExpo: Blog Feed Post

Government SaaS Entrepreneur

What are these high security standards, where and how are they defined?

As the name suggests our Government SaaS Entrepreneur program tailors their venture accelerator for apps for the public sector.

Examples of apps that have already gone through this process include Huddle IL3, referring to it being suitable for the UK’s information security classification IL3. This has resulted in the Huddle app grabbing the lions share of the G-Cloud market.

In this interview with Dave Nicholl, CIO for Ontario Province, talks about how they would consider this type of service for key requirements like their Drivers Licence applications, with a critical point about security:

“Typically, software as a service providers don’t create applications tailored for governments, he said. That said, “if we could find a drivers [licence] system that was software as a service we’d absolutely look at it,” he added – if it had adequate security.”

Secure Government SaaS – Specifications

So what are these high security standards, where and how are they defined?

This is the purpose of our new OASIS open standards group, called PACR, read more here in the launch briefing. This encompasses:

  • Cloud Security Alliance best practices - The CSA provides a comprehensive framework for securing Cloud environments, the backbone of which is the use of encryption at different levels: Encrypting VMs, data at rest and also in transit from the Cloud to the corporate data centre.
  • Cloud Identity Ecosystem - In the USA the NSTIC experts are pioneering the ‘Identity Ecosystem‘, where online service access is streamlined for citizens through “Social sign-on”. Microsoft provides a thorough expanation of how Government can apply these principles and technologies in this PPT presentation (42-page PDF)
  • Cloud Archiving and Compliance – A critical piece for governments is the Cloud Providers ability to meet their compliance needs. In line with standards like ISO 27037 this encompasses being able to verify digital evidence-ready record keeping, implementing litigation holds, maintaining an always-on irrefutable record of all transactions and other chain-of-custody features required for e-discovery.

Service Innovation and Solution Accelerators

The above technical capabilities are enabled by an ecosystem of vendor partners offering new technology products, that can be adopted by Cloud Providers and integrated into their environments to achieve a Government Secure SaaS platform.

This opens up opportunities for new service innovations, which can be pre-packaged into Solution Accelerators that helps entrepreneurs fast-track their venture

Guardtime – Keyless Signatures

This solution development process provides a context for the innovations that our Vendor partners are creating.

For example Guardtime has invented ‘Keyless Signatures’ that can play a major role in securing the integrity of information, the fundamental requirement for legally admissible materials.

It can be built into Cloud environments, as described here, and enable a variety of new services relevant to government. For example cMail, for Certified Email, that could be used for financial transactions through to doctors eReferals.

Read the original blog entry...

More Stories By Cloud Best Practices Network

The Cloud Best Practices Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net

CloudEXPO Stories
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 Cloud Computing Blogger for IT Integrators" by CRN (2015). Mr. Jackson's professional career includes service in the US Navy Space Systems Command, Vice President J.P. Morgan Chase, Worldwide Sales Executive for IBM and NJVC Vice President, Cloud Services. He is currently part of a team responsible for onboarding mission applications to the US Intelligence Community cloud computing environment (IC ...
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the steps so your team's apps not only function but also can be monitored and understood from their machine data when running in production.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will detail these pain points and explain how cloud can address them.