“If you want to have a embedded computer service, there are five essential characteristics you need to check off: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service,” Cloyd says. “Each of these is fairly straightforward for commercial cloud networks, but when applied to the Embedded Computer, each has unique challenges. [For example], self-service is about the provisioning of authorized users or services. One unique risk associated with self-service authorized end users is the role of insider threats. The embedded computer broad community has millions of users; the Army alone has 1.2 million core users.
refer to: http://mil-embedded.com/articles/cloud-security-the-dod/