Federal Migration Guide -- AVS in Azure Government¶
Comprehensive guide for federal agencies and DoD components migrating VMware workloads to Azure VMware Solution (AVS) in Azure Government, covering IL2--IL5 compliance, FedRAMP inheritance, and DoD-specific considerations.
Federal VMware landscape¶
Scale of federal VMware deployments¶
The US federal government and Department of Defense operate some of the largest VMware installations in the world:
| Sector | Estimated VMware scale | Key characteristics |
|---|---|---|
| DoD (all branches) | 150,000--200,000+ ESXi hosts | DISA enterprise agreements, IL4/IL5/IL6 workloads |
| Intelligence Community | Classified (substantial) | Air-gapped, IL6+, classified environments |
| Civilian agencies (large) | 20,000--50,000+ hosts (DHS, VA, HHS, Treasury) | FedRAMP High, mixed IL levels |
| Civilian agencies (mid) | 2,000--10,000 hosts per agency | FedRAMP Moderate to High |
| Federal system integrators | 50,000--100,000+ hosts (for federal contracts) | Support government workloads on behalf of agencies |
Broadcom impact on federal¶
The Broadcom acquisition affects federal VMware customers with specific pain points:
- Enterprise agreement renegotiation: DoD-wide and agency-level VMware ELAs are being renegotiated under Broadcom terms, with significant price increases reported
- Budget cycle misalignment: federal budget cycles (fiscal year, PPBE for DoD) do not accommodate sudden 2x--12x cost increases
- Procurement complexity: federal acquisition regulations (FAR/DFAR) require competitive analysis when costs increase substantially
- Perpetual license conversion: many agencies invested capital in perpetual VMware licenses that are now being forcibly converted to subscription
- Skills availability: VMware specialists are already scarce in the federal cleared workforce; uncertainty about VMware's future makes recruitment harder
Congressional and oversight attention¶
The Broadcom/VMware pricing situation has drawn attention from:
- GAO: monitoring agency IT spending impacts
- OMB: evaluating government-wide VMware spend via FITARA reporting
- DISA: reviewing DoD-wide enterprise agreement options
- Agency IGs: auditing cost impact on agency budgets
AVS in Azure Government¶
Region availability¶
| Azure Government region | AVS available | Host SKUs | IL support |
|---|---|---|---|
| US Gov Arizona | Yes | AV36P, AV52 | IL2, IL4, IL5 |
| US Gov Virginia | Yes | AV36P, AV52, AV64 | IL2, IL4, IL5 |
| US Gov Texas | Yes | AV36P | IL2, IL4, IL5 |
| DoD Central | Yes | AV36P | IL2, IL4, IL5, DoD SRG |
| DoD East | Yes | AV36P | IL2, IL4, IL5, DoD SRG |
Region availability changes
Check Azure products by region for the most current AVS availability in Azure Government regions.
IL (Impact Level) classification¶
| Impact Level | Data types | AVS support | Notes |
|---|---|---|---|
| IL2 | Publicly releasable, non-CUI | Fully supported | Azure Government commercial workloads |
| IL4 | CUI (Controlled Unclassified Information) | Fully supported | Standard federal workloads |
| IL5 | CUI with higher sensitivity, NOFORN, mission-critical | Supported | Azure Government with dedicated infrastructure |
| IL6 | Classified (SECRET) | Not supported | Requires Azure Top Secret / air-gapped |
IL6 gap
AVS does not support IL6 (classified SECRET) workloads. For classified VMware workloads, options include:
- Maintain on-premises VMware in classified enclaves
- Azure Top Secret (limited service availability)
- VMware Cloud on classified infrastructure
- Evaluate re-platform to Azure Top Secret IaaS
FedRAMP compliance inheritance¶
How AVS inherits FedRAMP¶
AVS in Azure Government inherits FedRAMP High authorization from the Azure Government platform:
Azure Government FedRAMP High Authorization
└── Azure VMware Solution (inherits)
├── Physical security (Azure datacenter)
├── Network security (Azure backbone)
├── Host security (Azure managed ESXi hosts)
├── Identity (Entra ID integration)
└── Monitoring (Azure Monitor integration)
Customer responsibility:
├── Guest OS security (VM patching, hardening)
├── Application security
├── Data classification and protection
├── Access control (NSX DFW rules, vCenter RBAC)
└── Audit logging and monitoring configuration
Shared responsibility model for AVS¶
| Control domain | Microsoft responsibility | Customer responsibility |
|---|---|---|
| Physical security | Datacenter physical security, environmental controls | N/A |
| Infrastructure | ESXi host lifecycle, hardware, networking | N/A |
| vSphere platform | vCenter, ESXi patching, NSX-T platform | NSX-T configuration, vCenter RBAC |
| Compute | Host provisioning, DRS, HA | VM deployment, guest OS patching, application |
| Storage | vSAN hardware, firmware | vSAN policies, data classification |
| Network | ExpressRoute backbone, Azure backbone | NSX segments, firewall rules, VPN configuration |
| Identity | Entra ID platform, MFA | User provisioning, role assignments, conditional access |
| Monitoring | Azure Monitor platform, Service Health | Log collection configuration, alert rules, Sentinel queries |
| Compliance | FedRAMP authorization maintenance, annual assessment | Agency-specific SSP, POA&M, continuous monitoring |
NIST 800-53 Rev 5 control mapping¶
CSA-in-a-Box provides machine-readable NIST 800-53 mappings for the data platform layer. For AVS-specific controls:
| Control family | AVS coverage | CSA-in-a-Box coverage (data workloads) |
|---|---|---|
| AC (Access Control) | Entra ID + vCenter RBAC | Entra ID + Purview + Unity Catalog RBAC |
| AU (Audit) | Azure Monitor + vCenter events | Azure Monitor + tamper-evident audit logger |
| CM (Configuration Mgmt) | Azure Policy + Bicep IaC | Bicep + dbt contracts + GitHub Actions CI/CD |
| IA (Identification/Auth) | Entra ID MFA + PIM | Entra ID + managed identities |
| SC (System/Comm Protection) | NSX-T DFW + encryption + ExpressRoute | Private endpoints + encryption + VNet isolation |
| SI (System/Info Integrity) | Defender for Cloud + Sentinel | Defender for Cloud + data quality contracts |
DoD-specific considerations¶
DISA STIG compliance¶
For DoD workloads, STIGs (Security Technical Implementation Guides) apply to:
| Component | Applicable STIG | Implementation |
|---|---|---|
| Windows Server VMs | Windows Server 2019/2022 STIG | Azure Policy guest configuration |
| Linux VMs | RHEL/Ubuntu STIG | Azure Policy guest configuration |
| vSphere (AVS) | VMware vSphere STIG | Microsoft-managed + customer NSX configuration |
| NSX-T (AVS) | VMware NSX-T STIG | Customer-managed segment and firewall rules |
| SQL Server (if on VM) | SQL Server STIG | Customer-managed database configuration |
| Networking | Network STIG | NSG rules + Azure Firewall policies |
DISA Cloud Computing SRG¶
AVS in Azure Government DoD regions complies with the DISA Cloud Computing SRG:
- CC SRG baseline: inherited from Azure Government DoD authorization
- Provisional Authorization (PA): Azure Government has DoD PA at IL2, IL4, IL5
- Agency ATO: each agency must obtain its own ATO based on the inherited PA
DoD network connectivity¶
| Connectivity option | Description | IL support |
|---|---|---|
| ExpressRoute (Gov) | Dedicated private circuit to Azure Government | IL2--IL5 |
| ExpressRoute Direct | Dedicated 10/100 Gbps ports | IL4--IL5 |
| DISA CAP (Cloud Access Point) | DISA-managed cloud access | IL4--IL5 |
| BCAP (Boundary CAP) | For DoD tenant connectivity | IL4--IL5 |
| VPN Gateway | IPsec VPN over internet | IL2--IL4 |
| Azure Government Peering | Government peering locations | IL2--IL5 |
# Create ExpressRoute circuit in Azure Government
az network express-route create \
--name er-dod-govaz \
--resource-group rg-network-gov \
--location usgovarizona \
--bandwidth 1000 \
--peering-location "Washington DC" \
--provider "Megaport" \
--sku-family MeteredData \
--sku-tier Premium
Federal migration patterns¶
Pattern 1: Base-level VMware to AVS in Gov¶
For installations (Air Force bases, Army posts, Navy installations) with local VMware environments:
Installation VMware Datacenter
→ ExpressRoute / DISA CAP
→ AVS Private Cloud (Azure Government)
→ Azure PaaS services (via VNet peering)
→ CSA-in-a-Box data platform (for data workloads)
Pattern 2: Agency datacenter consolidation¶
For agencies consolidating multiple datacenter VMware deployments:
Agency DC 1 (VMware) ─┐
Agency DC 2 (VMware) ─┼─→ AVS (Azure Gov) + Azure IaaS
Agency DC 3 (VMware) ─┘ │
├── Web/app tier → Azure IaaS VMs
├── Database tier → Fabric / Azure SQL (CSA-in-a-Box)
└── Analytics → Power BI + Databricks (CSA-in-a-Box)
Pattern 3: DoD hybrid migration¶
For DoD components with mixed IL levels:
IL2 workloads → AVS in Azure Government (standard)
IL4 workloads → AVS in Azure Government (IL4 controls)
IL5 workloads → AVS in Azure Government (IL5 dedicated)
IL6 workloads → Remain on-premises (classified enclave)
CSA-in-a-Box federal compliance for data workloads¶
After migrating VMware infrastructure to AVS, data workloads modernized via CSA-in-a-Box inherit these compliance mappings:
| Framework | CSA-in-a-Box artifact | Location |
|---|---|---|
| NIST 800-53 Rev 5 | Machine-readable control mapping | csa_platform/csa_platform/governance/compliance/nist-800-53-rev5.yaml |
| CMMC 2.0 Level 2 | Practice-level mapping | csa_platform/csa_platform/governance/compliance/cmmc-2.0-l2.yaml |
| HIPAA Security Rule | Safeguard mapping | csa_platform/csa_platform/governance/compliance/hipaa-security-rule.yaml |
| FedRAMP control narratives | Human-readable narratives | docs/compliance/nist-800-53-rev5.md |
Federal data governance via Purview¶
For federal data workloads, CSA-in-a-Box's Purview automation provides:
- CUI classification: automated detection and labeling of CUI data
- PII classification: automated PII detection across data assets
- Government classifications: custom classification rules for federal data types
- Lineage tracking: end-to-end data lineage for audit compliance
- Data contracts: machine-readable contracts per data product
Classification taxonomies are defined in:
csa_platform/csa_platform/governance/purview/classifications/government_classifications.yamlcsa_platform/csa_platform/governance/purview/classifications/pii_classifications.yaml
Procurement considerations¶
Federal acquisition approach¶
| Acquisition vehicle | Applicability | Notes |
|---|---|---|
| GSA Schedule 70 | Azure Government commercial pricing | Standard IT schedule |
| BPA (Blanket Purchase Agreement) | Agency-specific Azure commitments | Volume discounts |
| SEWP V | IT products and services | NASA-managed vehicle |
| DoD ESI (Enterprise Software Initiative) | DoD-wide Azure | Negotiated DoD pricing |
| ITES-3H | Army IT enterprise solutions | Covers Azure and migration services |
| Alliant 2 | Government-wide IT solutions | Includes cloud migration |
Migration funding strategies¶
- Modernization fund: agencies can request modernization funding through TMF (Technology Modernization Fund)
- Cost avoidance: document Broadcom cost increases as justification for migration spending
- OMB Cloud Smart: align migration with OMB Cloud Smart policy for cloud adoption
- Working capital fund: for agencies with WCF, Azure consumption can be billed as a service
Migration timeline for federal¶
Federal migrations typically take longer than commercial due to compliance requirements:
gantt
title Federal VMware-to-Azure Migration (36-48 weeks)
dateFormat YYYY-MM-DD
section Authority to Operate
ATO package preparation :a0, 2026-06-01, 8w
3PAO assessment (if required) :a0b, after a0, 6w
section Discovery
VMware inventory and assessment :a1, 2026-06-01, 4w
section Landing Zones
Deploy AVS in Azure Government :a2, after a1, 4w
section Compliance
STIG hardening :a3, after a2, 4w
Security control implementation :a3b, after a2, 6w
section Migration
IL2/IL4 workload migration :a4, after a3, 12w
IL5 workload migration :a5, after a4, 8w
section Data Modernization
CSA-in-a-Box data workloads :a6, after a4, 12w
section Validation
Parallel run and decommission :a7, after a6, 8w Related¶
- AVS Migration Guide
- Security Migration
- TCO Analysis
- Best Practices
- Migration Playbook
- Government Service Matrix
- NIST 800-53 Compliance
- CMMC 2.0 Compliance
Last updated: 2026-04-30 Maintainers: CSA-in-a-Box core team