In a recent memorandum, U.S. Secretary of Defense Pete Hegseth issued an urgent directive to Pentagon leadership, calling for heightened measures to protect the Department of Defense’s (DoD) information technology (IT) capabilities, including cloud services, from foreign adversaries such as China and Russia. The memorandum underscores the growing concerns regarding the vulnerability of the DoD’s supply chain to potential malicious influence by foreign powers, particularly in light of recent revelations surrounding the use of China-based engineers by Microsoft for Pentagon cloud services.
A Summarization of Pete Hegseth’s Directive
Immediate Actions for Secure IT Capabilities
Secretary Hegseth’s memorandum mandates the DoD Chief Information Officer (CIO) to collaborate with key departments including the Under Secretaries of Defense for Acquisition and Sustainment, Intelligence and Security, and Research and Engineering to immediately review and validate all information technology assets within the DoD. This review focuses on ensuring that these systems are secure against any potential supply chain attacks by adversarial nations, particularly China and Russia. The directive emphasizes the necessity of ensuring that the Department does not procure any hardware or software that may be susceptible to foreign influence or pose a risk to mission security.
Fortifying the Defense Industrial Base (DIB)
In a bid to counter these threats, the DoD has been instructed to strengthen existing safeguards within the Defense Industrial Base (DIB) that serves as a critical supplier of goods and services to the military. The Department will take measures to eliminate or mitigate adversarial foreign influence in its products and services, with a focus on preventing the introduction of malicious capabilities by foreign actors. The memorandum further directs the Department to explore any additional steps necessary to address the risks posed by foreign influence.
Several ongoing initiatives are being leveraged to support this effort, including the Cybersecurity Maturity Model Certification (CMMC), the Software Fast Track Program, the Authority to Operate process, and the Federal Risk and Authorization Management Program (FedRAMP). These programs, alongside efforts such as the Secure Software Development Framework, are all aimed at enhancing the security of DoD systems and operations.
Additionally, the Under Secretary of Defense for Intelligence and Security will oversee the review and validation of personnel security practices and insider threat programs within the DIB and cloud service providers. This initiative is critical to ensuring that the personnel handling sensitive military data do not pose any potential security risks.
Tightened Oversight Following ProPublica Investigation
This memorandum follows recent revelations from a ProPublica investigation, which uncovered that Microsoft had been using China-based engineers to support U.S. military systems hosted in its cloud infrastructure. According to the report, these engineers, while monitored by U.S.-based “digital escorts” (U.S. citizens with security clearances), were still granted access to sensitive systems. This arrangement raised significant concerns about the potential for indirect foreign access to the Pentagon’s cloud infrastructure, leading Microsoft to end the practice.
As a direct consequence of these findings, Microsoft decided to cease using China-based engineers for Pentagon cloud services, in order to comply with U.S. security protocols and mitigate any perceived security risks. While Microsoft assured that it would continue adhering to all U.S. regulations, the company has not yet specified how it will address the technical support needs previously met by the now-discontinued use of Chinese engineers.
Future Guidance and Expectations
In response to these concerns, Secretary Hegseth has directed the DoD CIO to issue additional implementing guidance within 15 days to ensure a secure environment for the nation’s warfighters. This move underscores the urgency of protecting U.S. military infrastructure from potential vulnerabilities in an increasingly interconnected world, where adversaries such as China and Russia may seek to exploit weaknesses in the supply chain and cloud services.
The DoD’s actions reflect a growing recognition of the risks posed by foreign influence in military technologies and underscore the Department’s commitment to safeguarding sensitive defense systems from adversarial threats. Through rigorous security protocols, strategic reviews, and proactive measures, the DoD aims to fortify its IT infrastructure, ensuring the safety and security of its operations in an era of rapidly evolving technological threats.

2 Circle Inc.
Honeycomb Company of America, Inc., a supplier to the U.S. Department of Defense (DoD), faced a critical challenge: achieving compliance with the Cybersecurity Maturity Model Certification (CMMC) before the upcoming 2025 audits by the CMMC Accreditation Board. The company’s internal IT manager was equipped with deep institutional knowledge but lacked the bandwidth and specialized expertise to meet the rigorous requirements of NIST 800-171 alone.
FN America


Large multinational companies with US-based subsidiaries who provide products and/or services for the U.S. Department of Defense (DoD) are required to comply with the DoD’s cybersecurity regulation known as the
If you’re considering using an Enclave to help your company save on the cost associated with meeting CMMC requirements, consider SysArc’s cybersecurity compliance team. Over nearly a decade, our team has helped thousands of companies in the U.S. Defense Industrial Base navigate the complexities of DFARS 7012, NIST 800-171, ITAR and CMMC. As a