“If you want to have a embedded computer service, there are five essential characteristics you need to check off: on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service,” Cloyd says. “Each of these is fairly straightforward for commercial cloud networks, but when applied to the , each has unique challenges. [For example], self-service is about the provisioning of authorized users or services. One unique risk associated with self-service authorized end users is the role of insider threats. The embedded computer broad community has millions of users; the Army alone has 1.2 million core users.