{"id":34518,"date":"2020-04-20T16:00:07","date_gmt":"2020-04-20T16:00:07","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=90909"},"modified":"2020-04-20T16:00:07","modified_gmt":"2020-04-20T16:00:07","slug":"nerc-cip-compliance-in-azure-vs-azure-government-cloud","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/","title":{"rendered":"NERC CIP Compliance in Azure vs. Azure Government cloud"},"content":{"rendered":"<p>As discussed in my last blog post on <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/02\/12\/nerc-cip-compliance-azure\/\" target=\"_blank\" rel=\"noopener noreferrer\">North American Electric Reliability Corporation\u2014Critical Infrastructure Protection (NERC CIP) Compliance in Azure,<\/a> U.S. and Canadian utilities are now free to benefit from cloud computing in Azure for many NERC CIP workloads. Machine learning, multiple data replicas across fault domains, active failover, quick deployment and pay for use benefits are now available for these NERC CIP workloads.<\/p>\n<p>Good candidates include a range of predictive maintenance, asset management, planning, modelling and historian systems as well as evidence collection systems for NERC CIP compliance itself.<\/p>\n<p>It\u2019s often asked whether a utility must use <a href=\"https:\/\/azure.microsoft.com\/en-us\/global-infrastructure\/government\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Government Cloud<\/a> (\u201cAzure Gov\u201d) as opposed to Azure public cloud (\u201cAzure\u201d) to host their NERC CIP compliant workloads. The short answer is that both are an option.&nbsp; There are several factors that bear on the choice.<\/p>\n<p>U.S. utilities can use Azure and Azure Gov for NERC CIP workloads. Canadian utilities can use Azure.<\/p>\n<p>There are some important differences that should be understood when choosing an Azure cloud for deployment.<\/p>\n<p>Azure and Azure Gov are separate clouds, physically isolated from each other. They both offer U.S. regions. All data replication for both can be kept within the U.S.<\/p>\n<p>Azure also offers two Canadian regions, one in Ontario and one in Quebec, with data stored exclusively in Canada.<\/p>\n<p>Azure Gov is only available to verified U.S. federal, state, and local government entities, some partners and contractors. It has four regions: Virginia, Iowa, Arizona and Texas. Azure Gov is available to U.S.-based NERC Registered Entities.<\/p>\n<p>We are working toward feature parity between Azure and Azure Gov. A comparison is provided <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/azure-government\/compare-azure-government-global-azure\" target=\"_blank\" rel=\"noopener noreferrer\">here.<\/a><\/p>\n<p>The security controls are the same for Azure and Azure Gov clouds. All U.S. Azure regions are now approved for <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/all-us-azure-regions-now-approved-for-fedramp-high-impact-level\/\" target=\"_blank\" rel=\"noopener noreferrer\">FedRAMP<\/a> High impact level.<\/p>\n<p>Azure Gov provides additional assurances regarding U.S. government-specific background screening requirements. One of these is verification that Azure Gov operations personnel with potential access to Customer Data are U.S. persons. Azure Gov can also support customers subject to certain export controls laws and regulations. While not a NERC CIP requirement, this can impact U.S. utility customers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90918 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/04\/Azure-v-Azure-Gov-for-Blog-Post-New.png\" alt=\"Azure Table 1\" width=\"1199\" height=\"493\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/04\/Azure-v-Azure-Gov-for-Blog-Post-New.png 1199w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/04\/Azure-v-Azure-Gov-for-Blog-Post-New-300x123.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/04\/Azure-v-Azure-Gov-for-Blog-Post-New-1024x421.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/04\/Azure-v-Azure-Gov-for-Blog-Post-New-768x316.png 768w\" sizes=\"auto, (max-width: 1199px) 100vw, 1199px\"><\/p>\n<p>Under NERC CIP-004, utilities are required to conduct background checks.<\/p>\n<p><strong>Microsoft U.S. Employee Background Screening<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-90911 size-large alignnone\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/04\/NERC-Table-2-1024x441.png\" alt=\"Microsoft US Employee Background Screening\" width=\"1024\" height=\"441\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/04\/NERC-Table-2-1024x441.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/04\/NERC-Table-2-300x129.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/04\/NERC-Table-2-768x331.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/04\/NERC-Table-2-1536x661.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/04\/NERC-Table-2.png 1893w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/p>\n<p>Microsoft\u2019s background checks for both Azure and Azure Gov exceed the requirements of CIP 004.<\/p>\n<p>NERC is not prescriptive on the background check that a utility must conduct as part of its compliance policies.<\/p>\n<p>A utility may have a U.S. citizenship requirement as part of its CIP-004 compliance policy which covers both its own staff and the operators of its cloud infrastructure. Thus, if a utility needs U.S. citizens operating its Microsoft cloud in order to meet its own CIP-004 compliance standards, it can use Azure Gov for this purpose.<\/p>\n<p>A utility may have nuclear assets that subject it to U.S. Department of Energy export control requirements (DOE 10 CFR Part 810) on Unclassified Controlled Nuclear Information. This rule covers more than the export of nuclear technology outside the United States, it also covers the transmission of protected information or technology to foreign persons inside the U.S. (for example, employees of the utility and employees of the utility\u2019s cloud provider).<\/p>\n<p>Since access to protected information could be necessary to facilitate a support request, this should be considered if the customer has DOE export control obligations. Though the NERC assets themselves may be non-nuclear, the utility\u2019s policy set may extend to its entire fleet and workforce regardless of generation technology. Azure Gov, which requires that all its operators be U.S. citizens, would facilitate this requirement.<\/p>\n<p>Azure makes the operational advantages, increased security and cost savings of the cloud available for many NERC CIP workloads. Microsoft provides Azure and Azure Gov clouds for our customers\u2019 specific needs.&nbsp; Microsoft continues its work with regulators to make our cloud available for more workloads, including those requiring compliance with NERC CIP standards. The utility (Registered Entity) is ultimately responsible for NERC CIP compliance and Microsoft continues to work with customers and partners to simplify the efforts to prepare for audits.<\/p>\n<p>Thanks to Larry Cochrane and Stevan Vidich for their leadership on Microsoft\u2019s NERC CIP compliance viewpoint and architecture. Bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a> for the latest news and updates on cybersecurity. To learn more about our Security solutions visit our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">website<\/a>.<\/p>\n<p><em>(c) 2020 Microsoft Corporation. All rights reserved. This document is provided \u201cas-is.\u201d Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document is not intended to communicate legal advice or a legal or regulatory compliance opinion. Each customer\u2019s situation is unique, and legal and regulatory compliance should be assessed in consultation with their legal counsel.<\/em><\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/04\/20\/nerc-cip-compliance-azure-vs-azure-government-cloud\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>North American Electric Reliability Corporation\u2014Critical Infrastructure Protection (NERC CIP) Compliance options in Azure public cloud and Azure Government.<br \/>\nThe post NERC CIP Compliance in Azure vs. Azure Government cloud appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34519,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[6426,941,8412,8413,6411,347,101],"class_list":["post-34518","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-azure-security","tag-compliance","tag-compliance-and-security","tag-compliance-and-security-series","tag-cybersecuirty","tag-cybersecurity","tag-data-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NERC CIP Compliance in Azure vs. Azure Government cloud 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NERC CIP Compliance in Azure vs. Azure Government cloud 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-20T16:00:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/nerc-cip-compliance-in-azure-vs-azure-government-cloud.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1199\" \/>\n\t<meta property=\"og:image:height\" content=\"493\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"NERC CIP Compliance in Azure vs. Azure Government cloud\",\"datePublished\":\"2020-04-20T16:00:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/\"},\"wordCount\":829,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/nerc-cip-compliance-in-azure-vs-azure-government-cloud.png\",\"keywords\":[\"Azure Security\",\"compliance\",\"Compliance and security\",\"Compliance and security series\",\"cybersecuirty\",\"Cybersecurity\",\"Data Privacy\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/\",\"name\":\"NERC CIP Compliance in Azure vs. Azure Government cloud 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/nerc-cip-compliance-in-azure-vs-azure-government-cloud.png\",\"datePublished\":\"2020-04-20T16:00:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/nerc-cip-compliance-in-azure-vs-azure-government-cloud.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/nerc-cip-compliance-in-azure-vs-azure-government-cloud.png\",\"width\":1199,\"height\":493},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Security\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/azure-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NERC CIP Compliance in Azure vs. Azure Government cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NERC CIP Compliance in Azure vs. Azure Government cloud 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/","og_locale":"en_US","og_type":"article","og_title":"NERC CIP Compliance in Azure vs. Azure Government cloud 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-20T16:00:07+00:00","og_image":[{"width":1199,"height":493,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/nerc-cip-compliance-in-azure-vs-azure-government-cloud.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"NERC CIP Compliance in Azure vs. Azure Government cloud","datePublished":"2020-04-20T16:00:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/"},"wordCount":829,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/nerc-cip-compliance-in-azure-vs-azure-government-cloud.png","keywords":["Azure Security","compliance","Compliance and security","Compliance and security series","cybersecuirty","Cybersecurity","Data Privacy"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/","url":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/","name":"NERC CIP Compliance in Azure vs. Azure Government cloud 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/nerc-cip-compliance-in-azure-vs-azure-government-cloud.png","datePublished":"2020-04-20T16:00:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/nerc-cip-compliance-in-azure-vs-azure-government-cloud.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/nerc-cip-compliance-in-azure-vs-azure-government-cloud.png","width":1199,"height":493},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nerc-cip-compliance-in-azure-vs-azure-government-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Security","item":"https:\/\/www.threatshub.org\/blog\/tag\/azure-security\/"},{"@type":"ListItem","position":3,"name":"NERC CIP Compliance in Azure vs. Azure Government cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34518"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34518\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34519"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}