Common and Data Services
Service Name | Service Description | |
1 | Operating System Vulnerability Scanning | Operating System vulnerability scanning service (e.g., Assured Compliance Assessment Solution [ACAS]) |
2 | IP Address Management | Planning, tracking, and managing the Internet Protocol (IP) address space used in the cloud environment |
3 | Virtual Datacenter Security Stack (VDSS) | All VDSS components and services (e.g. Web Application Firewall, Reverse Proxy, etc.) listed in DISA cloud SRG and SCCA documents, and DoD enclave protection firewall |
4 | Key Management | PKI certificate signing, administration, and key management |
5 | Network Infrastructure Management and Monitoring | Monitor, manage, and alert on events related to network utilization and availability |
6 | DDos Protection Service | Protects applications in the cloud environment from Distributed Denial of Service (DDoS) attacks |
7 | DNS Hosting, Caching, Recursion | DNS lookup for cloud-based applications and hierarchical DNS management delegated to mission owners |
8 | PKI Cert Validation | Online Certificate Status Protocol (OCSP) responder to validate if PKI certificates are valid or revoked |
9 | Network Time | Cybersecurity mandated accurate time source for DoD systems hosted in the cloud |
10 | Patch Management | Patch repositories for common operating system patch files. |
11 | SMTP Relay | Simple Mail Transport Protocol (SMTP) based email relay |
12 | Enterprise Directory Services | Privileged administrative user and non-person entity Identity, Credential, and Access Management (ICAM) (e.g., Active Directory [AD], Lightweight Directory Access Protocol [LDAP]) |
13 | Federated Access Management | User Identity, Credential, and Access Management (ICAM) (e.g., EAMS-A, SAML Services) |
14 | Secure File Transfer Service (SFTP) | Securely transfer large files to the cloud environment |
15 | Notification Services | Alerting and notification (e.g., Short Message Service [SMS]) |
16 | Endpoint Monitoring | Protects computing endpoints from malware and other cyber security threats (e.g., Host Based Security Service [HBSS]) |
17 | Remote Privileged Access | Secure administrative access from the Internet or DODIN to DoD servers in secure cloud enclaves. |
18 | Centralized Logging/Auditing | Consolidated aggregation point for receiving and storing logs from systems and applications in the cloud environment |
19 | Security Information and Event Management (SIEM) and Log Analytics | Identifies and categorizes security related incidents and events |
20 | Data Dissemination Service | Accelerates and consolidates data for transfer utilizing secure network tunnels. |
21 | Code Repository | Code repository for source code configuration management to support a software factory |
22 | STIG Compliant Virtual Server Templates | A library which stores DISA Security Technical Implementation Guide (STIG) compliant virtual machine template images |
23 | License/Software Management | Operating System (OS) level license management |
24 | Asset Management Services | Discover and track assets such as resources, licensed software, etc. within the cloud environment |
25 | Cross Domain Solution (CDS) | Automatically move appropriately vetted files between security classification levels |
26 | CSSP Services | Standardized tools & processes to meet cloud cyber security requirements; primarily provided by C5ISR to cArmy tenants. Collaboration with cArmy cloud services ops team |
27 | Continuous Integration / Continuous Delivery/Deployment (CI/CD) Tools | Tools to enable the CI/CD pipeline (e.g., tools similar to the capabilities provided in DI2E.net) |
28 | Enterprise Data Catalog and Service Registry | Data and service listing for data and service management and automated data processing |
29 | Container Platform | Enabling container runtime services (e.g., container orchestration) |
30 | Budget and Cost Management | Provides cloud cost and budget information to mission owners |
31 | Resource Management Portal | Portal to manage compute and store resources |
* Note - This listing is current as of 1 May 2020. The number of services is expected to increase as the Army cloud environment matures. |