Government Cloud

Every agency is waiting
6 to 18 months for a project.


For CIOs and ministry IT leads building a shared cloud platform for multiple government agencies — without duplicating infrastructure or compromising classification boundaries.

The same infrastructure demand,
repeated across every agency.

Ministries and agencies share a common mandate: deliver digital services to citizens. But each agency arrives with a separate procurement, separate IT team, and the same infrastructure requirements.

🏛️

Multiple agencies, one CIO

Central IT is accountable for 10–50 agencies. Each has unique workloads, classification levels, and IT teams with varying maturity.

🔒

Classification is non-negotiable

UNCLASSIFIED, RESTRICTED, SECRET workloads cannot share runtime boundaries. Isolation must be architectural, not policy-based.

📋

Procurement is the bottleneck

Each agency request triggers a new procurement cycle. 6–18 months before a workload runs, regardless of technical complexity.

You have the platform.
Agencies can't reach it.

Most governments have already invested in HCI and OpenShift. The infrastructure exists — but there's no operating model to share it across agencies safely.

What you've bought

HCI platform (Nutanix / HPE / Dell)

On-premises hyper-converged infrastructure in one or more government data centres. Procured centrally, sized for peak demand.

OpenShift container platform

Cluster(s) running on the HCI. Managed by central IT. Applications deployed by namespace — but no inter-agency tenancy.

Active Directory / LDAP

Government-wide identity. Each agency has its own OU. No bridge to Kubernetes RBAC for self-service provisioning.

ITSM / ticket-based provisioning

Agencies submit requests via ServiceNow or similar. Central IT team manually provisions. Queue: days to weeks per request.

The infrastructure is shared.
The operating model isn't.

Without the right multi-tenancy layer, central IT cannot safely give agencies self-service access — so every request goes through the ticket queue.

Per-agency isolation

No hard boundaries between agency workspaces. Namespace-level separation is not sufficient for cross-classification access.

Agency self-service

No portal for agency IT teams to provision their own namespaces, resources, or services without raising a ticket.

Audit trail per agency

No per-agency access log or activity audit. Compliance and security reviews require manual evidence collection.

Chargeback to finance

No per-agency usage reporting that feeds government finance systems for cost allocation or internal chargeback.

The ticket queue
is costing governments years.

Without self-service, every agency workload goes through central IT. The result is duplicate infrastructure, slow digital services, and a platform team that can't keep up.

Procurement duplication

Each agency re-procures infrastructure independently. The same HCI and OpenShift appear in 10 different procurement packages — each taking 6–18 months.

Central platform underutilised while agencies wait for their own procurement to complete.

Platform team overload

Every namespace, quota change, and service account goes through central IT. Platform teams are bottlenecks, not enablers.

No headroom for security hardening, upgrades, or new platform capabilities. Ops consumes all capacity.

The platform is there. The operating model is the bottleneck.

Cloud Orchestrator makes
agencies self-sufficient.

A government-grade multi-tenancy layer on top of your existing OpenShift. Each agency gets its own isolated workspace — without a new procurement cycle.

Per-agency isolation

KCP-based virtual control planes per agency. Hard boundaries enforced at the Kubernetes API level — not namespace RBAC. Classification tiers mapped to separate virtual planes.

Agency self-service portal

Agency IT teams provision their own workloads, namespaces, and services through a portal. No central IT ticket required. Quotas enforced by policy.

Active Directory integration

SSO via existing government AD. Agency OU maps to tenant workspace. Users see only their agency's resources — automatically, without manual RBAC configuration.

Full audit trail

Every API call, resource change, and access event logged per agency. Exported to your SIEM automatically. Compliance evidence generated, not collected.

Air-gap ready

Runs fully disconnected. No external registry, no cloud metadata endpoints, no external secret stores. Images mirrored internally. Classification-appropriate for RESTRICTED and above.

Chargeback reporting

Per-agency compute, storage, and network metered. Cost reports exported to government finance systems. Internal chargeback without a separate FinOps tool.

From shared platform to self-service government cloud

Security-led. Air-gap ready. Agencies self-provisioning within 90 days.

1
Assess Week 1–3

Security review complete, classification tiers mapped

We

· Security architecture review

· SSO/LDAP integration design

· Classification model mapping

You

· Security team access

· Data classification policy

· IT governance sign-off

2
Foundation Month 2

Cloud Orchestrator deployed, air-gap configured

We

· Deploy in air-gapped mode

· Active Directory integration

· RBAC per classification tier

You

· Isolated network segment

· AD service account

· Procurement approval

3
Pilot Month 3

3 agencies self-provisioning, audit trail active

We

· Agency workspaces created

· Audit log shipped to SIEM

· Self-service portal configured

You

· Nominate 3 pilot agencies

· Agency IT leads engaged

· Validate access controls

4
Production Month 4–6

All agencies onboarded, chargeback to finance active

We

· Full agency migration

· Chargeback reports configured

· Run-book and training delivered

You

· Finance system integration

· Executive communications

· Support escalation path

5
Scale Month 6+

New agencies onboarded in days, not months

We

· Self-service agency onboarding

· New classification tiers

· Quarterly governance reviews

You

· Growth pipeline of agencies

· Policy updates

· Feedback from agency leads

What makes this
work in government.

Government cloud deployments succeed on governance and security design — not just technology. These are the factors that determine outcome.

Security review in Assess, not after Pilot

Government security sign-off takes weeks. Start the accreditation process in week one — not after the platform is built. Late reviews kill timelines.

Classification model agreed before build

The number of classification tiers and which agencies sit in which tier determines the tenancy architecture. Agree it in Assess — changes after Foundation are expensive.

Three pilot agencies with different maturity levels

Pick one advanced agency, one average, one with minimal IT capacity. The portal and self-service workflows must work for all three to be viable at scale.

Finance team involved from Production phase

Chargeback requires connecting metering data to government finance systems. Finance teams have long approval cycles — engage them at Month 3, not Month 6.

Stop re-procuring.
Start sharing — safely.


You already have the platform.
Cloud Orchestrator adds the agency isolation, self-service, and audit trail — without a new procurement per agency.



stakater.com