Federal Cyber Experts Called Microsoft’s Cloud “S**t” – Approved It Anyway

ProPublica reveals federal reviewers privately criticized Microsoft’s cloud architecture while approving it for sensitive government data

C. da Costa Avatar
C. da Costa Avatar

By

Image: Pexels

Key Takeaways

Key Takeaways

  • Federal reviewers called Microsoft’s cloud “shit” but approved it anyway
  • Justice Department and Microsoft executed pressure campaign overcoming security concerns
  • Third-party assessors paid by Microsoft raised concerns while approving requirements

Your tax dollars just bought cloud services that cybersecurity experts privately trashed for years. Internal federal reviewers called Microsoft’s Government Community Cloud High everything from “a pile of shit to a “pile of spaghetti pies” while simultaneously green-lighting it for the nation’s most sensitive data, according to a ProPublica investigation.

The Documentation Disaster

Missing encryption diagrams and legacy code tangles created what reviewers called persistent “unknowns.”

Microsoft’s path to FedRAMP High authorization reads like a cybersecurity nightmare. Federal reviewers flagged “lack of proper detailed security documentation” spanning years, including missing data flow diagrams for basic encryption services like Exchange Online. You know that sinking feeling when legacy enterprise systems have zero documentation? Multiply that by national security implications.

The technical debt was staggering. Reviewers described Microsoft’s underlying architecture as interconnected “spaghetti pies” of legacy code, creating what they called “unknowns” that persisted right through the December 26, 2024 authorization. Yet the approval went through anyway, complete with bureaucratic caveats that essentially said “buyer beware.”

The Pressure Campaign That Worked

Justice Department and Microsoft orchestrated influence that overcame expert security concerns.

Behind the scenes, the Justice Department and Microsoft orchestrated a pressure campaign that would make Netflix’s “House of Cards” writers jealous. When FedRAMP briefly paused the GCC High review in 2023 after Chinese hackers infiltrated the system, the pause lasted just long enough to avoid political embarrassment.

The revolving door spun faster than a server farm cooling fan. Former Justice Department CIO Melinda Rogers, who had authorized GCC High use, landed at Microsoft in 2025. Ex-Deputy Attorney General Lisa Monaco joined as Microsoft president the same year. Meanwhile, FedRAMP’s budget got slashed to $10 million under DOGE efficiency initiatives, leaving fewer staff to scrutinize more authorizations.

When Assessors Can’t Assess

Third-party firms paid by Microsoft faced conflicts while raising security concerns.

Third-party assessors like Kratos and Coalfire, paid directly by Microsoft, back-channeled concerns to FedRAMP about incomplete access to security information. Kratos faced corrective action but maintained GCC High met requirements anyway. It’s like hiring your own home inspector and wondering why they keep finding structural problems but approving the sale.

The broader context makes this even more concerning. Russian and Chinese breaches targeting Microsoft services in 2020 and 2023 should have triggered enhanced scrutiny. After these incidents, widespread government adoption and industry pressure still trumped security expertise.

Federal cybersecurity decisions affect every contractor handling sensitive data and every taxpayer funding these systems. When expert assessment gets overruled by bureaucratic convenience, everyone’s security suffers.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →