Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Recovery.gov Moves to Cloud Infrastructure on Amazon EC2

The Recovery Accountability and Transparency Board announced today that Recovery.gov has moved to a cloud computing infrastructure, a technology that will allow for more efficient computer operations, improved security and reduced costs.

The Recovery Accountability and Transparency Board announced today that Recovery.gov has moved to a cloud computing infrastructure, a technology that will allow for more efficient computer operations, improved security and reduced costs.

Recovery.gov is the U.S. government’s official Web site that provides access to data related to Recovery Act spending and allows for the reporting of potential fraud, waste, and abuse.

The Board’s prime contractor, Smartronix, Inc., selected Amazon Web Services’ EC2 cloud service offering for Recovery.gov and is the first government-wide system to move to the cloud. 

The expected benefits from moving to the cloud include:

Enhanced Recovery.gov security. The improved computer security includes, but is not limited to, greater protection against network attacks and real time detection of system tampering. In essence, Amazon’s computer security platform has been added to the Board’s own security system, which the Board’s staff will continue to maintain and operate.

Cost savings. The Board expects savings of about $750,000 during its current budget cycle and significantly more savings, long-term.

Freeing up resources. The Board’s staff will be able to focus more intently on its core mission of delivering rich content for Recovery.gov users without worrying about managing the website’s underlying data center and related computer equipment.

Improved accountability mission. The Board will have the opportunity to redirect more than $1 million in computer hardware and software to its sophisticated oversight operations, a move that will help identify fraud, waste and abuse in the Recovery program.

Advertisement. Scroll to continue reading.

“Cloud computing strikes me as a perfect tool to help achieve greater transparency and accountability,” said Earl E. Devaney, the Board’s Chairman. “Moving to the cloud allows us to provide better service at lower costs. I hope this development will inspire other government entities to accelerate their own efforts. The American taxpayers would be the winners.”

The announcement comes shortly after several government Web sites, were hacked in an attack that redirected visitors to web sites containing malicious content. The hacked sites included BEP.gov, BEP.treas.gov, MoneyFactory.gov and Moneyfactory.com and were apparently hacked using an iFrame that injected malicious codes into the site and sent data to computers located in Ukraine.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.