Independent Intelligence Platform

Stealth
Cloud
Classified Infrastructure · Intelligence Community Cloud · TS/SCI Compute

Classified Cloud · Intelligence Community · Top Secret Compute

Intelligence on classified cloud infrastructure — IC Cloud, C2E, AWS Secret/Top Secret, Azure Government Secret, and AI-scale compute behind classification barriers.

Read Intelligence Report →

Not financial advice · Independent analysis · Swiss jurisdiction

$8-12BClassified Market
18IC Agencies
5C2E Vendors
TS/SCIMax Classification
Advertisement
Featured Intelligence

Key Coverage Areas

Intelligence 01

IC Cloud & C2E Architecture

CIA's Commercial Cloud Enterprise multi-cloud classified architecture and IC IT transformation.

Intelligence 02

AWS Secret & Top Secret Regions

Air-gapped classified regions — architecture, security, staffing, and IC production workload capabilities.

Intelligence 03

Classified AI/ML Infrastructure

GPU compute behind classification barriers — DGX in SCIFs, classified training, federated learning.

Intelligence 04

Zero Trust for Classified Networks

NSA Zero Trust — cross-domain solutions, multi-level security, classified network modernization.

Advertisement
Research Library

Intelligence Coverage Areas

IC Cloud Programs

In-depth research and analysis covering the latest developments and strategic implications.

8 Reports

Classified Regions

In-depth research and analysis covering the latest developments and strategic implications.

6 Reports

Classified AI/ML

In-depth research and analysis covering the latest developments and strategic implications.

7 Reports

Security Architecture

In-depth research and analysis covering the latest developments and strategic implications.

9 Reports
Pillar Intelligence Report

Deep Intelligence Analysis — Stealth Cloud

Updated: February 2026 Classification: Open Source Status: Active

The Classified Cloud Imperative

Behind the public internet, behind government networks, behind even the classified networks most defense personnel use, there exists a tier of cloud infrastructure that operates in complete isolation from the outside world. These air-gapped cloud environments — physically and logically disconnected from every other network — host the most sensitive workloads of the United States Intelligence Community and Department of Defense. They process signals intelligence, satellite imagery, human intelligence reports, and the analytical products that inform presidential daily briefings. The classified cloud market represents the most restricted, highest-security, and fastest-growing segment of sovereign cloud infrastructure globally.

What has changed dramatically since 2020 is not the existence of classified cloud — AWS launched its first Top Secret region in 2014 — but the scale, capability, and strategic importance assigned to it. The convergence of three forces has transformed classified cloud from an IT modernization program into a national security priority: the AI revolution requiring massive GPU compute even for classified workloads, the C2E multi-cloud contract opening the Intelligence Community to five competing providers, and the recognition by the Director of National Intelligence that classified AI capabilities are now mission-critical. As DNI Tulsi Gabbard stated at AWS re:Invent 2025, deploying AI applications in top-secret clouds has been "a game changer" for the intelligence community.

Advertisement

Market Intelligence: The $8-12 Billion Classified Cloud Opportunity

The U.S. classified cloud market — spanning the 18 Intelligence Community agencies, Department of Defense components, and national security organizations — is estimated at $8-12 billion annually, growing at 15-20% per year. This estimate encompasses infrastructure (air-gapped regions, dedicated hardware), platform services, managed services, and the professional services required to operate at classified levels. The market is structurally concentrated: AWS and Microsoft together hold an estimated 70-80% market share of classified cloud workloads, with Google, Oracle, and IBM competing for the remainder through the C2E vehicle.

The broader U.S. federal cloud market provides context. Federal cloud spending exceeds $20 billion annually and is projected to reach $40-50 billion by 2028. Within this, classified cloud commands a premium — infrastructure costs for air-gapped environments are substantially higher than commercial or even FedRAMP-authorized government cloud. Personnel costs alone are significant: every operator, administrator, and engineer with access to classified cloud infrastructure must hold appropriate security clearances (Secret, Top Secret, or TS/SCI), creating a constrained labor pool that commands premium compensation.

For investors and defense industry analysts, classified cloud represents an unusually durable revenue stream. Classified workloads cannot be easily migrated to foreign or commercial infrastructure. Security clearance requirements create natural barriers to entry. And the shift to AI is driving demand for GPU compute within classified environments at rates that exceed available capacity — creating both a market gap and an investment opportunity.

According to Deltek, federal cloud spending reached a record $16.5 billion in 2024, with projections exceeding $30 billion by fiscal 2028. The classified portion — spanning the C2E, JWCC, and WildandStormy contract vehicles — accounts for an estimated 30-40% of total federal cloud expenditure. The Defense Information Systems Agency (DISA), which manages JWCC, has awarded $2.7 billion in task orders across the four contract holders as of mid-2025, with approximately 30% tied to classified Secret and 10% to top-secret workloads.

C2E: The Intelligence Community's Multi-Billion Dollar Cloud Contract

The CIA's Commercial Cloud Enterprise (C2E) contract is the single most important procurement vehicle in the classified cloud market. Awarded in November 2020, C2E is an indefinite-delivery, indefinite-quantity, multiple-award contract valued at potentially "tens of billions" of dollars over 15 years. Five companies — Amazon, Microsoft, Google, IBM, and Oracle — hold spots on the contract and compete for individual task orders to provide IaaS, PaaS, SaaS, and professional services across the 18 IC agencies.

C2E replaced the CIA's original Commercial Cloud Services (C2S) contract, which was awarded solely to AWS in 2013 for $600 million. The shift from single-vendor (C2S) to multi-vendor (C2E) reflects the Intelligence Community's strategic decision to adopt multi-cloud architecture — reducing dependency on any single provider while increasing competition and capability access. The NSA separately awarded AWS a contract worth up to $10 billion to modernize its primary data repository, though Microsoft challenged the award through the Government Accountability Office.

For the defense industrial base, C2E creates a cascading ecosystem. Companies like Palantir, Salesforce, and Anthropic have partnered with AWS specifically because of its ability to deploy software at scale in air-gapped classified environments. Every software vendor seeking IC customers must build, test, and certify their applications for classified cloud regions — creating a significant market for classified cloud-native development tools, testing environments, and deployment pipelines.

The C2E contract structure reflects a fundamental shift from single-provider to multi-cloud in the intelligence community. Under C2S, AWS was the sole commercial provider — winning the original $600 million CIA contract in 2013. C2E, awarded in 2020, expanded to five providers: Amazon, Microsoft, Google, Oracle, and IBM, competing for task orders at various classification levels across all 17 IC agencies. The contract has a 15-year period of performance worth "tens of billions" according to procurement documents. Director of National Intelligence Tulsi Gabbard has publicly credited classified cloud capabilities as transformative for the IC's ability to deploy AI at secret and top-secret levels, stating that "opening up AI applications in the top secret clouds has been a game changer."

Under C2E, the IC's biggest challenge is incentivizing five competing hyperscalers to collaborate rather than simply compete for task orders. Acting IC CIO Michael Waschull described this "collaborating competitors" dynamic as the greatest obstacle in the transition from single-cloud C2S to multi-cloud C2E. The CIA Cloudworks Program Management Office meets with all five providers individually and as a group monthly. A separate CIMM (Cloud Integration and Multi-Cloud Management) contract — estimated at $1-5 billion over seven years by Bloomberg Government — will award a single systems integrator to serve as intermediary between IC agencies and the five cloud vendors.

AWS Secret & Top Secret Regions: The Market Leader

AWS operates the most extensive classified cloud infrastructure of any commercial provider, with a 14-year head start that gives it structural advantages in relationships, accreditation, and operational experience.

Top Secret Regions. AWS operates two Top Secret regions — Top Secret-East (launched 2014, Northern Virginia) and Top Secret-West (launched 2021, location undisclosed but over 1,000 miles from East). Both are fully air-gapped, accredited under the DNI Intelligence Community Directive (ICD) 503 and NIST SP 800-53 Rev. 4. They operate with 24/7 U.S. citizen cleared support and include multiple Availability Zones for fault tolerance.

Secret Regions. AWS operates the Secret Region (launched 2017) authorized for DoD Cloud Computing Security Requirements Guide Impact Level 6. In November 2025, AWS announced the launch of Secret-West, its second Secret region, providing multi-region architectures for the first time at the Secret classification level. U.S. Army CIO Leo Garciga endorsed the announcement, stating it "will enhance support for critical warfighting IT systems" and function as "a highly resilient backup site, safeguarding combat-essential applications."

AWS was the first cloud provider accredited across the full range of U.S. government data classifications — Unclassified, Sensitive, Secret, and Top Secret. This complete classification coverage is the foundation of its classified cloud dominance and the primary reason defense and IC organizations continue to select AWS for their most sensitive workloads.

NSA CIO Scott Fear confirmed in December 2024 that the agency is "about three, maybe four years into a journey of moving our capabilities into the Amazon cloud" under WildandStormy. AWS VP David Appel told Nextgov that "plans are tracking" and new physical infrastructure and computing regions would come online through 2025, "fundamentally changing the way that the agency has typically done work." WildandStormy modernizes the NSA's Intelligence Community GovCloud — a classified data repository aggregating signals intelligence, foreign surveillance, and other material from global collection points into a unified data lake where analysts run queries using AI/ML capabilities including large language models.

Advertisement

Microsoft Azure Government Secret & Top Secret

Microsoft Azure Government operates dedicated regions for classified workloads including Azure Government Secret and Azure Government Top Secret. While Microsoft entered the classified cloud market later than AWS, its integration of Microsoft 365 productivity tools (Outlook, Teams, SharePoint) with classified infrastructure gives it a distinct advantage for office productivity workloads that represent a significant portion of day-to-day IC operations.

Microsoft's classified cloud strategy extends into sovereign capabilities through Azure Local (formerly Azure Stack Hub), which enables fully disconnected operations — air-gapped cloud environments managed entirely on-premises with no connection to Microsoft's commercial infrastructure. In November 2025, Microsoft announced the general availability of disconnected operations for Azure Local, enabling government agencies to operate sovereign private cloud environments with a completely local control plane. This capability is specifically designed for classified and highly regulated scenarios where any external connectivity is prohibited.

The competitive dynamic between AWS and Microsoft in classified cloud mirrors their commercial cloud rivalry but with additional dimensions. AWS leads in infrastructure-level services and has deeper IC relationships. Microsoft leads in productivity and collaboration tools — and in a classified environment where personnel cannot use commercial email or messaging, Microsoft's classified Office 365 Government deployment is a significant operational advantage.

Azure Government Secret and Azure Government Top Secret operate in dedicated regions with air-gapped infrastructure, cleared personnel, and compliance with DoD SRG Impact Levels 5 and 6 and ICD 503. Microsoft has invested heavily in closing the capability gap with AWS at classified levels, leveraging its dominant position in enterprise productivity (Teams, SharePoint, Office 365) to offer a compelling "classified digital workplace" that AWS cannot match. The Pentagon's CIO office has actively encouraged multi-cloud competition to prevent the single-vendor dependency that plagued the cancelled JEDI contract.

Google Cloud Air-Gapped & Oracle Classified

Google Cloud holds a C2E contract position and has developed air-gapped solutions authorized for U.S. government Top Secret and Secret-level data. Google's competitive advantage in classified cloud centers on its AI and machine learning capabilities — TensorFlow, Vertex AI, and its proprietary TPU chips — which offer differentiated compute for IC analytical workloads.

Oracle provides classified cloud capabilities through Oracle Cloud Infrastructure, including its Compute Cloud@Customer Isolated offering announced in June 2025 — a fully configurable air-gapped version of its on-premise compute service deployable within six to eight weeks. Oracle targets defense, government, healthcare, and telecom with sovereign compute infrastructure that can be completely disconnected from the internet. Oracle's database dominance in government legacy systems gives it a migration pathway into classified cloud that is difficult for competitors to replicate.

In late 2025, the Navy's PEO Digital awarded competitive JWCC task orders to both Google Public Sector and Oracle, providing GCP and OCI landing zones with cross-cloud interoperability through Impact Level 6 and air-gapped edge operations. The Neptune Cloud Management Office expanded beyond its initial Azure Secret partnership to embrace true multi-cloud at classified levels — a watershed moment for Google's defense re-entry after its 2018 JEDI withdrawal.

Classified AI/ML: GPUs Behind the Classification Barrier

The most significant transformation in classified cloud is the deployment of AI and machine learning capabilities within air-gapped environments. The Intelligence Community processes vast quantities of signals intelligence, geospatial imagery, open-source intelligence, and human intelligence reports — all of which benefit enormously from AI-powered analysis, pattern recognition, and anomaly detection. The challenge is bringing the GPU compute power required for modern AI into environments that are physically disconnected from the commercial internet and global supply chains.

NVIDIA GPUs in classified environments. NVIDIA DGX and HGX systems are deployed within Sensitive Compartmented Information Facilities (SCIFs) and air-gapped data centers supporting classified cloud regions. These deployments face unique constraints: hardware must pass security inspection before entering classified spaces, firmware updates require manual processes, and supply chain provenance must be verified to prevent hardware compromise. The result is that classified GPU compute capacity typically lags 12-18 months behind commercial availability.

The DNI has explicitly endorsed classified AI deployment. Director Gabbard's statement that classified cloud AI has been "a game changer" signals that AI capabilities are now embedded in IC analytical workflows, not merely experimental. The CIA described active use of generative AI for analysis, and the NSA is using large language models to enhance mission capabilities. These deployments require classified GPU infrastructure that will only grow as models increase in size and analytical tasks become more computationally demanding.

The classified cloud workforce constraint is structural: only 1.2 million Americans hold active TS/SCI clearances, with processing times of 12-18 months for new applicants. The Defense Counterintelligence and Security Agency (DCSA) processed a record 3.3 million background investigations in FY2024 but backlogs persist. Every classified AI deployment — from GPU cluster construction to model training to inference operations — requires cleared personnel, creating a talent bottleneck that money alone cannot solve. Cloud providers maintain dedicated cleared workforces near IC facilities in Northern Virginia, Maryland, and the Denver-Colorado Springs corridor.

JWCC & DoD Cloud Architecture

The Department of Defense's Joint Warfighting Cloud Capability (JWCC) is a $9 billion multi-vendor contract awarded to AWS, Microsoft, Google, and Oracle to provide enterprise cloud services across all classification levels for DoD components. JWCC replaced the controversial single-vendor JEDI contract and establishes the DoD's multi-cloud architecture for the current decade.

JWCC operates across the full classification spectrum from unclassified through Top Secret, creating a unified cloud procurement vehicle for combatant commands, military services, and defense agencies. The contract's multi-cloud design requires interoperability between providers — a significant architectural challenge when workloads span classification levels and provider-specific air-gapped regions.

For the defense industrial base, JWCC and C2E together define the classified cloud procurement landscape. Companies building defense AI applications must design for deployment across multiple classified cloud environments, testing on unclassified infrastructure and deploying through controlled processes into air-gapped regions. This creates demand for specialized development tools like the Sequoia Combine classified region emulator, which allows developers to test workloads against classified cloud constraints without requiring classified access.

As of mid-2025, JWCC has awarded $2.7 billion in task orders to the four cloud providers, with approximately 50% tied to unclassified work, 30% to classified (Secret), and 10% to top-secret operations. The DoD CIO is already planning JWCC Next — the successor contract — with a draft RFP expected within 18 months. JWCC Next aims to bring entire cloud ecosystems and third-party marketplaces to classified environments, including smaller specialized vendors beyond the four hyperscalers. Federal cloud spending reached a record $16.5 billion in 2024 according to Deltek, with projections exceeding $30 billion by fiscal 2028.

JWCC task orders have accelerated dramatically: as of August 2025, DISA officials confirmed more than $3 billion in total task order awards — up from $621 million in mid-2024 and just $200 million in August 2023 (13 orders). DISA's John Hale, chief of product management and development, confirmed that the contract vehicle was modified to include third-party marketplace access after cloud brokers within the military services requested capabilities not originally available. The acceleration from $621 million to $3 billion in approximately 12 months indicates the DoD has overcome its initial cloud procurement learning curve.

The Pentagon plans to issue the JWCC Next solicitation in Q1 calendar 2026 (Q2 FY26), with contract awards expected in early 2027. JWCC Next will supersede the current contract vehicle, not supplement it — though there will be an overlap period for transition. The key evolution: JWCC Next will provide "broader access to the various commercial cloud providers," potentially expanding beyond the current four hyperscalers. DISA declined to estimate how many vendors might be awarded: "Until the contract hits the street and we start to get the bids in, I could not speculate," Hale told DefenseScoop.

Zero Trust for Classified Networks

Zero Trust Architecture (ZTA) implementation within classified cloud environments represents one of the most complex cybersecurity challenges in government IT. NSA's Zero Trust Architecture guidance and CISA's Zero Trust Maturity Model define five pillars — identity, devices, networks, applications, and data — that must be implemented even within air-gapped environments already protected by physical isolation.

The rationale for zero trust within classified cloud is the insider threat. Air-gapping protects against external network attacks but does not address authorized personnel who may be compromised, coerced, or acting as foreign intelligence agents. Zero trust principles — continuous verification, least-privilege access, microsegmentation, and real-time monitoring — provide defense-in-depth within the classified perimeter. Executive Order 14028 mandates zero trust implementation across all federal agencies, and OMB Memorandum M-22-09 sets specific zero trust goals across all five pillars.

Implementing zero trust in classified networks requires specialized architectures that differ significantly from commercial deployments. Identity verification must integrate with government PKI infrastructure and national security credentials, not commercial identity providers. Device trust must validate government-issued endpoints with hardware attestation. Network microsegmentation must operate within air-gapped boundaries without relying on cloud-native security services that assume internet connectivity. The NSA's Cybersecurity Directorate provides classified-specific guidance that extends NIST SP 800-207 for intelligence community environments, addressing challenges like cross-domain identity federation, classified mobile device management, and zero trust for disconnected tactical edge nodes.

Advertisement

Cross-Domain Solutions: Moving Data Between Worlds

Cross-Domain Solutions (CDS) are the controlled interfaces that enable data to flow between classification levels — from Top Secret to Secret, Secret to Unclassified, or between different compartmented programs at the same classification level. In the classified cloud context, CDS are essential infrastructure that determines how intelligence products derived from classified analysis can be shared with broader audiences, allied partners, or tactical edge systems.

The demand for CDS is accelerating because AI models trained on classified data produce insights that are often needed at lower classification levels. A model trained on signals intelligence at the Top Secret level may produce targeting recommendations needed at the Secret level for operational planning, or threat assessments needed at the Unclassified level for civilian agency coordination. The controlled downgrading of AI-derived insights through cross-domain solutions is emerging as a critical operational capability that directly impacts the value proposition of classified cloud AI investment.

The cross-domain solutions market represents a critical chokepoint in classified cloud architectures. Only a handful of vendors — BAE Systems, General Dynamics, Raytheon, and Forcepoint — produce NSA-certified CDS platforms approved for bridging classification levels. These solutions must pass rigorous National Cross Domain Strategy and Management Office (NCDSMO) evaluation, a process that typically takes 18-36 months. The technical challenge intensifies with AI workloads: traditional CDS platforms were designed for structured data transfers, but AI inference outputs are unstructured, probabilistic, and potentially embed classified training data in ways that resist simple filtering. Solving what NSA officials call the "AI cross-domain problem" — enabling classified AI insights to flow to lower classification environments safely — is arguably the most important unsolved challenge in classified cloud architecture.

Investment & Defense Contractor Landscape

The classified cloud market creates investment exposure through three channels: hyperscaler government segments (AWS, Microsoft, Google, Oracle), defense primes with classified cloud integration practices (Lockheed Martin, Northrop Grumman, General Dynamics), and specialized government technology companies (Palantir, Booz Allen Hamilton, Leidos, SAIC).

The classified cloud supply chain extends beyond hyperscalers to defense primes and specialized contractors. General Dynamics IT operates major portions of the intelligence community's classified infrastructure. ManTech and SAIC provide systems integration for classified cloud migrations. Palantir Technologies has secured significant classified AI contracts, with its Gotham and Foundry platforms deployed across intelligence agencies. For investors, the classified cloud ecosystem offers exposure through both hyperscaler equity (AWS/Amazon, Azure/Microsoft, GCP/Google, OCI/Oracle) and defense-specialized companies (Palantir, Booz Allen Hamilton, Leidos, CACI International). The total addressable market for classified cloud services, including infrastructure, platform, and application layers, is projected to exceed $15-20 billion annually by 2030, driven by the convergence of AI workloads, zero trust mandates, and legacy system modernization across the U.S. intelligence and defense communities.

The C2E contract alone is valued at potentially tens of billions over 15 years. The NSA's $10 billion modernization contract adds further scale. JWCC at $9 billion represents DoD-specific cloud investment. Combined, these vehicles represent over $30 billion in classified cloud procurement authority currently active. For portfolio managers, classified cloud represents a defense technology growth vector that is less susceptible to budget sequestration than traditional weapons programs because it is foundational infrastructure rather than discretionary procurement.

Risks & Classification Constraints

The classified cloud market faces unique constraints that limit growth rates despite massive demand signals. Security clearance bottlenecks restrict the available workforce — the average time to process a TS/SCI clearance exceeds 12 months, and the cleared workforce cannot be rapidly scaled. GPU supply at classification remains constrained because hardware must undergo security inspection and supply chain verification before entering classified spaces. Technology currency lag means classified environments typically operate 1-2 generations behind commercial cloud capabilities, as new services require separate accreditation processes.

Concentration risk is significant: AWS's structural dominance means that any disruption to its classified operations — whether technical, contractual, or political — would impact a disproportionate share of IC cloud workloads. The multi-cloud shift through C2E partially addresses this, but practical migration of classified workloads between providers remains technically complex and operationally disruptive.

Talent constraints compound the risk: classified cloud engineers must hold active TS/SCI clearances, limiting the talent pool to approximately 1.2 million Americans with top-secret access. Clearance processing backlogs (12-18 months for initial TS/SCI) create structural bottlenecks in scaling classified cloud operations. Technology lag presents operational risk: air-gapped regions typically operate 12-24 months behind commercial cloud releases, meaning classified users cannot access the latest AI frameworks, security patches, or performance optimizations until they complete the classified certification process. This creates a paradox where the most security-sensitive workloads run on the least current software — a tension that the intelligence community is actively working to resolve through accelerated certification pipelines.

Supply chain risk adds a geopolitical dimension: the GPUs powering classified AI workloads are designed by NVIDIA (a US company) but manufactured by TSMC in Taiwan — a single point of failure in the classified compute supply chain. The CHIPS and Science Act aims to mitigate this through domestic semiconductor fabrication incentives, but new fabs will not reach volume production until 2027-2028. Until then, classified cloud infrastructure remains dependent on Taiwanese manufacturing capacity operating under Chinese military threat — a risk that defense planners acknowledge but cannot immediately resolve.

The sole-source nature of WildandStormy raises long-term vendor lock-in concerns that contrast sharply with the multi-cloud direction everywhere else in government. Microsoft declined to re-protest after the NSA's reevaluation, but sources told Federal News Network that the decision "does raise concerns about another single award contract for cloud services" at classified levels. Under C2S, the NSA and IC partners supported development of AWS's Secret cloud instance while other providers received no financial benefit — creating a structural incumbency advantage that compounds with each year of operation.

Strategic Outlook: AI Transforms the Intelligence Community

The classified cloud market is entering a transformational phase where AI capabilities become the primary driver of infrastructure investment, architectural decisions, and mission outcomes. The Intelligence Community's explicit endorsement of classified AI — from the DNI's public statements to the CIA's active deployment of generative AI for analysis — signals that GPU-intensive classified cloud workloads will grow at rates exceeding overall classified cloud market expansion.

By 2028, classified cloud infrastructure will likely support three distinct AI workload tiers: foundational models trained within classification barriers on IC-specific data, fine-tuned commercial models adapted for classified applications through secure transfer and retraining, and edge AI deployments pushing classified inference capabilities to tactical environments through specialized hardware. Each tier requires different GPU configurations, different network architectures, and different cross-domain interfaces.

For defense technology investors and companies, the strategic conclusion is clear: classified cloud AI represents the highest-value, most defensible segment of the sovereign cloud market. The barriers to entry — security clearances, air-gapped infrastructure, accreditation processes, IC relationships — create structural moats that protect incumbent positions. The demand signal — explicit DNI endorsement, $30+ billion in active contract vehicles, accelerating AI adoption across all 18 IC agencies — ensures sustained growth. The infrastructure is being built in secret, but the investment opportunity is in plain sight.

AWS launched its second Top Secret region — Top Secret-West — providing geographic redundancy for the IC's most sensitive workloads for the first time. Combined with the forthcoming Secret-West region expected by end of 2025, AWS is building a fully resilient multi-region classified cloud architecture that mirrors commercial best practices. DNI Gabbard has publicly credited these capabilities as enabling AI deployment at classification levels that were previously impossible — a validation of the classified cloud model that guarantees continued investment growth.

The DoD CIO is already planning JWCC Next — the successor contract expected to hit the market within 18 months — designed to bring entire cloud ecosystems and third-party marketplaces into classified environments, expanding opportunity beyond the four current hyperscalers. The NSA's $10 billion WildandStormy contract with AWS continues modernizing the agency's primary classified data repository. And the CIA's C2E integrator contract — a separate vehicle for multi-cloud management across the IC — will define how five competing hyperscalers operate collaboratively in the most sensitive computing environments on earth. For investors and defense contractors, the classified cloud market offers a rare combination: double-digit growth, multi-decade contract durations, and the highest barriers to entry in enterprise technology.

Advertisement
Knowledge Base

Frequently Asked Questions

The Intelligence Community's cloud infrastructure — primarily the CIA's C2E program providing classified cloud across 18 IC agencies.
Commercial Cloud Enterprise — CIA's multi-billion dollar multi-cloud contract awarded to AWS, Microsoft, Google, Oracle, IBM.
Yes — AWS operates air-gapped TS regions in SCIF-equivalent facilities with TS/SCI-cleared staff, isolated from all other infrastructure.
GPU clusters in classified regions. Challenges: limited GPUs, data ingestion across levels, model deployment to tactical edge.
Controlled interfaces for data transfer between classification levels — essential for classified cloud interacting with lower systems.
$8-12B annually spanning IC, DoD, national security agencies, growing 15-20% per year. AWS and Microsoft dominate.
WildandStormy is the NSA's $10 billion cloud computing contract awarded to AWS, part of the Hybrid Compute Initiative to modernize the NSA's classified data repository by migrating signals intelligence data from internal servers to AWS-operated classified cloud infrastructure.
As of mid-2025, JWCC has awarded $2.7 billion in task orders across four cloud providers (AWS, Microsoft, Google, Oracle). Approximately 50% covers unclassified work, 30% classified Secret operations, and 10% top-secret workloads. Federal cloud spending reached $16.5 billion in 2024.
Classified cloud engineers require active TS/SCI clearances. Only approximately 1.2 million Americans hold active top-secret clearances, and initial TS/SCI processing takes 12-18 months, creating structural talent bottlenecks in scaling classified cloud operations.
JWCC Next is the successor to the current $9 billion JWCC contract. The DoD plans to publish a draft RFP within 18 months, aiming to bring entire cloud ecosystems and third-party marketplaces including smaller specialized vendors into classified environments.
Advertisement