ノーマルビュー

Federal Cyber Experts Called Microsoft's Cloud 'a Pile of Shit', Yet Approved It Anyway

著者: BeauHD
2026年3月19日 01:00

🤖 AI Summary

記事の概要:

Microsoftのクラウド製品「GCC High」が、連邦サイバーセキュリティ評価者の長年の懸念を抱えながらも承認されたという問題が浮上しています。ProPublicaによると、2024年後半に連邦政府の評価者は、Microsoftの「詳細なセキュリティドキュメンテーション不足」により、「システム全体のセキュリティポジションを信頼することができない」と結論付けました。また、数年にわたってMicrosoftは、クラウド上の情報をサーバ間で移動する方法について完全に説明できていなかったとの指摘がありました。

この判断は、米国政府へ製品を販売しようとする企業にとっては致命的ですが、Microsoftには特に問題でした。同社の製品は過去3年間に起きた2つの深刻なサイバー攻撃で中心的存在でした:ロシアのハッカーによる政府機関へのデータ漏洩事件と中国のハッカーによる閣僚レベルのメールアカウント侵入事件です。

それでも、連邦リスク認証管理計画(FedRAMP)は製品を承認し、「購入者の注意」付きで公的に承認しました。これがMicrosoftの政府ビジネスの帝国を億単位の利益に拡大させた一因となりました。「BOOM SHAKA LAKA」と、MicrosoftのセキュリティアーキテクトRichard Wakemanはオンラインフォーラムで喜んでいました。

連邦政策立案者は15年以上前にクラウド革命を迎える際に、FedRAMPを設立して政府機密情報を委ねられる信頼性を確保するための計画でした。しかし、ProPublicaの調査では、プロセスの各段階で問題があり、Microsoftに対する不必要な敬意が見られました。

関連リンク:
- Appleがアプリを削除する理由は「ある場合とない場合」 - ムジスアプリの敗訴
- 外国のハッカーがUS核施設にSharePointの欠陥を使って侵入
- 中国のハッカーが国会委員会職員のメールシステムを攻撃
ProPublica reports that federal cybersecurity reviewers had serious, yearslong concerns about Microsoft's GCC High cloud offering, yet they approved it anyway because the product was already deeply embedded across government. As one member of the team put it: "The package is a pile of shit." From the report: In late 2024, the federal government's cybersecurity evaluators rendered a troubling verdict on one of Microsoft's biggest cloud computing offerings. The tech giant's "lack of proper detailed security documentation" left reviewers with a "lack of confidence in assessing the system's overall security posture," according to an internal government report reviewed by ProPublica. For years, reviewers said, Microsoft had tried and failed to fully explain how it protects sensitive information in the cloud as it hops from server to server across the digital terrain. Given that and other unknowns, government experts couldn't vouch for the technology's security. Such judgments would be damning for any company seeking to sell its wares to the U.S. government, but it should have been particularly devastating for Microsoft. The tech giant's products had been at the heart of two major cybersecurity attacks against the U.S. in three years. In one, Russian hackers exploited a weakness to steal sensitive data from a number of federal agencies, including the National Nuclear Security Administration. In the other, Chinese hackers infiltrated the email accounts of a Cabinet member and other senior government officials. The federal government could be further exposed if it couldn't verify the cybersecurity of Microsoft's Government Community Cloud High, a suite of cloud-based services intended to safeguard some of the nation's most sensitive information. Yet, in a highly unusual move that still reverberates across Washington, the Federal Risk and Authorization Management Program, or FedRAMP, authorized the product anyway, bestowing what amounts to the federal government's cybersecurity seal of approval. FedRAMP's ruling -- which included a kind of "buyer beware" notice to any federal agency considering GCC High -- helped Microsoft expand a government business empire worth billions of dollars. "BOOM SHAKA LAKA," Richard Wakeman, one of the company's chief security architects, boasted in an online forum, celebrating the milestone with a meme of Leonardo DiCaprio in "The Wolf of Wall Street." It was not the type of outcome that federal policymakers envisioned a decade and a half ago when they embraced the cloud revolution and created FedRAMP to help safeguard the government's cybersecurity. The program's layers of review, which included an assessment by outside experts, were supposed to ensure that service providers like Microsoft could be entrusted with the government's secrets. But ProPublica's investigation -- drawn from internal FedRAMP memos, logs, emails, meeting minutes, and interviews with seven former and current government employees and contractors -- found breakdowns at every juncture of that process. It also found a remarkable deference to Microsoft, even as the company's products and practices were central to two of the most damaging cyberattacks ever carried out against the government.

Read more of this story at Slashdot.

❌