December 11, 2025
7 Min Read

U.S. government agencies face unique challenges as they adopt cloud technologies to meet digital modernization initiatives and adhere to a cloud-first policy. Here’s how Tenable Cloud Security FedRAMP can help.
As part of digital modernization initiatives and the U.S. government’s cloud-first policy, federal agencies are rapidly adopting cloud technologies to improve operational effectiveness and increase mission agility. Yet, as agencies expand their footprint across hybrid and cloud environments, nation-state adversaries and other threat actors are exploiting vulnerabilities unique to these environments. The high-value target of federal systems — where disrupting operations or accessing sensitive data can yield strategic advantage — makes cloud security essential to mission success.
That’s why Tenable has partnered with the U.S. General Services Administration’s OneGov program to deliver Tenable Cloud Security FedRAMP at a substantial discount. This partnership removes cost barriers and streamlines procurement, enabling agencies to accelerate zero trust adoption, strengthen cloud defenses, and meet compliance requirements faster.
"Our goal is to make cloud adoption secure and effective by helping agencies reduce risk while safeguarding critical data and enabling mission success."
— Mark Thurmond, Tenable Co-CEO, Tenable Partners with GSA OneGov To Help Federal Government Boost Its Cloud Security
Federal agencies face a distinct set of challenges in securing the cloud — including visibility gaps and complex identity and entitlement management. The following sections outline these challenges and show how Tenable Cloud Security helps agencies close them.
The challenge: Federal agencies often operate across multiple cloud providers, hybrid environments, and legacy on-premises systems. This complexity makes it difficult to maintain a clear picture of where sensitive workloads, data, and assets reside, as well as how threats can move laterally through the hybrid attack surface. This lack of visibility all too often results in high-risk misconfigurations going unnoticed, vulnerabilities remaining unaddressed, and unauthorized access being exploited by adversaries. Shadow IT further compounds the challenge, creating additional blind spots, leading to a constant exercise of Whac-A-Mole®.
The challenge: As agencies expand their cloud usage, the number of users, non-human identities, and permissions to manage grows exponentially. Without proper oversight, excessive permissions and inconsistent identity policies can lead to insider threats, privilege creep, and unauthorized access to sensitive systems. In dynamic cloud environments, roles change, temporary accounts are created, and new applications are deployed frequently, making the consistent enforcement of least privilege principals a real challenge.
For more information check out: Identity-First Security: Mitigating the Cloud’s Greatest Risk Vector.
The challenge: Federal agencies often rely on a patchwork of security tools to monitor and protect their hybrid and multi-cloud environments. Agencies struggle to chase myriad alerts, struggling to piece together a coherent picture of their ever-expanding attack surface. The result? Inefficiencies, redundant costs, and blind spots, along with overwhelmed security teams and slowed response times. Dynamic cloud workloads make it even harder to maintain consistent security policies and ensure compliance with federal mandates.
For a great overview, check out: Your Map for the Cloud Security Maze: An Integrated Cloud Security Solution That’s Part of an Exposure Management Approach.
The challenge: Cloud native attacks — such as API abuse, container exploits, compromised accounts, and misconfigured cloud services — are used to compromise cloud infrastructure. Traditional perimeter tools and legacy security tools often fail to detect these attacks quickly, leaving mission-critical workloads exposed and making it increasingly difficult to maintain real-time situational awareness and prioritize the most critical risks.
For more insight into cloud risk, check out the Tenable Cloud Security Risk Report 2025
The Challenge: Dynamic cloud environments aren’t only a challenge when it comes to identities. Constantly changing workloads, applications, and permissions make it easy for misconfigurations — such as overly permissive storage, unsecured APIs, or incorrect network settings — to slip through the cracks. Even small missteps can expose sensitive data, create vulnerabilities or lead to service disruptions. At the same time, federal agencies must comply with a complex web of mandates and guidelines, and ensure all systems remain compliant.
Securing federal cloud environments is critical to mission success, operational efficiency, and national security. By providing continuous visibility, automated vulnerability detection, identity-first protections, and compliance automation, Tenable Cloud Security FedRAMP empowers federal agencies to confidently modernize their IT environments, mitigate risk, and protect critical workloads from evolving threats.
Whac-A-Mole® is a registered trademark of Mattel, Inc.
As Tenable’s Chief Security Officer, Head of Research and President of Tenable Public Sector, LLC, Robert Huber oversees the company's global security and research teams, working cross-functionally to reduce risk to the organization, its customers and the broader industry. He has more than 25 years of cyber security experience across the financial, defense, critical infrastructure and technology sectors. Prior to joining Tenable, Robert was a chief security and strategy officer at Eastwind Networks. He was previously co-founder and president of Critical Intelligence, an OT threat intelligence and solutions provider, which cyber threat intelligence leader iSIGHT Partners acquired in 2015. He also served as a member of the Lockheed Martin CIRT, an OT security researcher at Idaho National Laboratory and was a chief security architect for JP Morgan Chase. Robert is a board member and advisor to several security startups and served in the U.S. Air Force and Air National Guard for more than 22 years. Before retiring in 2021, he provided offensive and defensive cyber capabilities supporting the National Security Agency (NSA), United States Cyber Command and state missions.
Enter your email and never miss timely alerts and security guidance from the experts at Tenable.