Federal Cyber Experts Called Microsoft's Cloud "A Pile of Shit", Yet Approved It
Companies Mentioned
Why It Matters
The authorization lets Microsoft retain a lucrative federal market share despite unresolved security gaps, exposing sensitive government data to heightened risk and eroding confidence in the nation’s cloud‑security oversight.
Key Takeaways
- •FedRAMP approved GCC High despite missing encryption diagrams.
- •Reviewers described the product as a “pile of shit.”
- •Third‑party assessors were paid by Microsoft, creating conflict.
- •FedRAMP staff cut to ~24 employees, budget at $10 M.
- •Authorization enables billions in federal cloud revenue for Microsoft.
Pulse Analysis
FedRAMP was created to streamline cloud adoption across U.S. agencies, promising a single, rigorous security assessment that could be reused government‑wide. In practice, the program’s limited resources and a surge in vendor demand have strained its ability to conduct deep technical reviews. The ProPublica investigation reveals that Microsoft’s GCC High, a suite meant to protect the most sensitive data, never supplied the detailed data‑flow diagrams FedRAMP required, yet the agency still issued an authorization after a five‑year review lag. This outcome highlights a systemic weakness where procedural compliance can outweigh substantive security validation.
The conflict‑of‑interest dynamic further undermines FedRAMP’s credibility. Third‑party assessment organizations, tasked with providing independent verification, are compensated by the very companies they evaluate, blurring the line between objective review and vendor advocacy. Coupled with a staff cut to roughly two dozen analysts and a $10 million budget—the lowest in a decade—the program operates more as a rubber‑stamp than a gatekeeper. Agencies that rely on the FedRAMP marketplace now inherit this risk, potentially exposing classified information to exploitation, as evidenced by prior Russian and Chinese intrusions linked to Microsoft services.
Looking ahead, the controversy may spur legislative and executive actions to reinforce cloud‑security oversight. Proposals could include stricter independence requirements for assessors, increased funding for FedRAMP, and mandatory disclosure of security architecture for high‑impact services. For federal IT leaders, the immediate takeaway is heightened due diligence: supplement FedRAMP authorizations with internal threat modeling and consider alternative providers with transparent security documentation. The broader market implication is a possible shift toward vendors that can demonstrably meet rigorous, auditable standards, reshaping the competitive landscape for cloud contracts worth billions of dollars.
Comments
Want to join the conversation?
Loading comments...