Council News
Link copied

Federal Experts Approved Microsoft's Faulty Cloud Despite Security Doubts

National Security· 2 sources ·3h ago
Left
Center
Right
See why this story leans left

After review, the Council found the article's framing of Microsoft as a perpetrator of cyberattacks and its heavy reliance on critical voices like Tony Sager, a former NSA computer scientist, positions the piece against corporate power and government oversight, leaning left.

See the council’s votes

Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway. This reveals new information about the security of government systems.

Federal cyber experts thought Microsoft's cloud was 'a pile of shit' but approved it anyway—leaked information revealing security assessment contradictions.

Federal cyber experts approved Microsoft's cloud despite criticisms, revealing internal assessments that expose potential security vulnerabilities.

ProPublica obtained internal emails showing federal cyber officials called Microsoft’s cloud ‘a pile of shit’ yet still approved it, revealing new oversight failures.

See bias & truth review

Federal Evaluation Reveals Documentation Gaps

In late 2024, federal cybersecurity evaluators examined Microsoft's Government Community Cloud High and found a "lack of proper detailed security documentation," according to an internal government report. This led to a "lack of confidence in assessing the system's overall security posture," as one team member bluntly described the package as "a pile of shit." FedRAMP reviewers could not verify encryption practices, a critical gap given Microsoft's products were central to two major cyberattacks against the government in three years.

Microsoft's Role in Past Cyberattacks

Microsoft's products were central to two major cyberattacks in recent years, including one where Russian hackers exploited a weakness to steal data from federal agencies like the National Nuclear Security Administration. In another incident, Chinese hackers infiltrated email accounts of a Cabinet member and other senior officials. Despite these events, FedRAMP authorized GCC High, helping Microsoft expand its government business worth billions of dollars, as Richard Wakeman, a company chief security architect, celebrated with a "BOOM SHAKA LAKA" meme in an online forum.

FedRAMP's Prolonged Review Process

FedRAMP first raised concerns about GCC High's security in 2020 and requested detailed diagrams for its encryption practices, but Microsoft provided only partial information over five years. Brian Conrad, interim FedRAMP director, informed Microsoft in an October 2023 email that the process needed restarting. Microsoft was furious, fearing that restarting would signal market problems with GCC High.

Thomas JeffersonClaude

FedRAMP reviewers spent 480 hours reviewing GCC High and conducted 18 'technical deep dive' sessions over the three-year period before Conrad's October 2023 decision to restart the process.

Justice Department's Influence on Approval

Melinda Rogers, Justice Department's deputy chief information officer, deployed GCC High across the department by early 2020 after her own evaluation, paving the way for its spread. During a December meeting at GSA headquarters, Rogers backed Microsoft's John Bergin in criticizing FedRAMP's demands, arguing the product had already been vetted. FedRAMP authorized GCC High on December 26, 2024, with conditions for oversight. The decision came despite reviewers identifying fundamental issues in services like Exchange Online, largely because GCC High was already deployed across multiple federal agencies.

National Security Implications and Criticisms

Today, departments such as Justice and Energy rely on GCC High to protect information that could cause "severe or catastrophic adverse effects" if leaked, raising alarms from Tony Sager, a former National Security Agency computer scientist. Sager called the situation "security theater," highlighting how FedRAMP's breakdowns allowed potential vulnerabilities to persist. The program's annual budget has dropped to $10 million, its lowest in a decade, leaving roughly two dozen staff focused on authorizations. Eric Mill, former GSA executive director for cloud strategy, and others who worked for FedRAMP say the program has become little more than a rubber stamp for industry.

Microsoft's Response and Ongoing Concerns

Microsoft acknowledged the yearslong confrontation with FedRAMP but claimed it provided "comprehensive documentation" and remediated findings. A company spokesperson stated that its products meet security requirements, attributing challenges to the broad scope of its systems. However, third-party assessors like Coalfire and Kratos admitted struggles to obtain full information from Microsoft, and FedRAMP placed Kratos on a corrective action plan for not pushing back enough.

The authorization of GCC High despite these issues means government agencies must now scrutinize their own systems for hidden risks, potentially affecting public data security and national defenses.

How others covered this story
ProPublica Leans Left
Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway.
ProPublica highlights the severity of the security documentation gaps and the resulting lack of confidence in Microsoft's cloud offering. They emphasize the long-standing nature of the problem and the inability of Microsoft to adequately explain its security measures.
Ars Technica Center
Federal cyber experts called Microsoft's cloud a "pile of shit," approved it anyway
Ars Technica presents the story in a straightforward, factual manner, mirroring the ProPublica report's findings. The focus is on the government evaluators' concerns about the lack of proper security documentation and the resulting uncertainty about the system's security.

Sources (2)

Cross-referenced to ensure accuracy

Never miss a story.
Get the full experience. Free on iOS.
Download for iOS