Source URL: https://tech.slashdot.org/story/25/08/29/1928258/pentagon-halts-chinese-coders-affecting-dod-cloud-systems
Source: Slashdot
Title: Pentagon Halts Chinese Coders Affecting DOD Cloud Systems
Feedly Summary:
AI Summary and Description: Yes
Summary: The Pentagon has terminated a Microsoft program that permitted Chinese coders to work on sensitive Department of Defense (DOD) cloud systems under U.S. supervision. This decision was made due to concerns about unacceptable risks associated with foreign involvement in critical U.S. infrastructure.
Detailed Description: The announcement by Defense Secretary Pete Hegseth reflects an increasing scrutiny of foreign participation in systems handling sensitive national security data, particularly in the context of cloud computing. Key points include:
– **Halting of the Program**: The long-standing Microsoft initiative, which allowed remote Chinese coders to work under U.S. contractor supervision, has been discontinued.
– **Risk Assessment**: Hegseth highlighted that the program posed “unacceptable risk” to national security, underscoring the importance of stringent checks in defense technology partnerships.
– **Immediate Review Initiated**: Upon discovering the program, an immediate review was ordered to evaluate its implications and regulatory compliance.
– **Breaches of Trust**: DOD has formally addressed Microsoft regarding concerns about trust breaches due to the program’s foreign involvement.
– **Third-Party Audit Requirement**: A third-party audit of the program’s operations has been mandated to assess the potential impact of the work done by Chinese programmers, aimed at ensuring the integrity of the code and submissions.
The situation emphasizes the growing importance of national security in cloud computing and the need for strict compliance and oversight in defense contracts, particularly those involving foreign nationals. This incident contributes to ongoing discussions about safeguarding sensitive information in a globally interconnected digital environment, aligning with data sovereignty and governance regulations. Security professionals are reminded of the implications of employing foreign entities in critical operations, highlighting the necessity for robust risk management strategies.