Digital fortress: How the cloud protected Kherson National Technical University during occupation

Strategic session of the Student Parliament at Kherson National Technical University, 2024. Source: KNTU Press Office

February 24, 2022. Russia launched a full-scale invasion of Ukraine. Olena Chepeliuk, then head of the design department at Kherson National Technical University (KNTU) was woken by her husband’s words: “Wake up, it has started.” The first minutes brought shock, adrenaline and fear for her family. Her phone was overwhelmed with calls; chats were flooded with messages.

At the exact same time, Oleh Artemenko from the university’s IT center received a call from a close friend: “Hide. This is going to last.”

In those chaotic first hours, no one was thinking about servers. Only when the initial shock subsided did the university leadership focus on re-establishing contact. Despite the danger, just two weeks after the invasion began, KNTU resumed classes online, giving students a lifeline to normalcy. But while the leadership and educators were rallying and saving the university community, the IT team was waging a battle of its own —invisible, but with everything on the line.

The main building and central alley of Kherson National Technical University (KNTU). Source: KNTU Press Office
The main building and central alley of Kherson National Technical University (KNTU). Source: KNTU Press Office

A critical digital asset

By the second day of the invasion, Oleksandr Melnychenko, then head of the IT department, and Artemenko realized the true scale of the threat. On the second floor of the main building operated a full-fledged educational datacenter. Removing the servers undetected during the occupation was out of the question, but leaving them meant losing the university’s entire digital memory.

On March 1, 2022, occupying forces took full control of Kherson. The only option left was to extract the data through the network before local internet providers were definitively seized.

Just a month prior, KNTU had completed a full modernization: a 10-gigabit network and a fully independent network infrastructure. But this technological advantage had now turned into a critical vulnerability. The drives contained not only scientific archives but also mobilization registries and personnel files. Under occupation, this infrastructure could be misused, turning sensitive databases into tools that could place hundreds of families at serious risk.

Masterclass on 3D modeling and 3D printing for veterans at the "Veteran Pro" Veteran Space, 2025. Source: KNTU Press Office
Masterclass on 3D modeling and 3D printing for veterans at the “Veteran Pro” Veteran Space, 2025. Source: KNTU Press Office

The university clearly understood the scale of this threat. That is why, in the early days of the occupation, the employee responsible for records made her way into the building and personally destroyed all the paper card files. The paper burned. But a complete digital copy of these documents remained on the data center’s drives—and now it had become the most dangerous thing in the building.

Escape to the cloud

There was only one way out: an urgent remote migration of the data to the cloud. The IT department leadership reached out to their partners at the URAN (Ukrainian Research and Academic Network) association, who immediately contacted Microsoft.

The conditions for migration were highly complex. Occupying forces were destroying digital connectivity on the city streets. The university’s direct communication channel was severed. The situation was further complicated by the fact that the occupiers had already gained access to local routers, so any sudden spike in traffic could immediately attract attention.

Strategic session of the Student Parliament at Kherson National Technical University, 2024. Source: KNTU Press Office
Strategic session of the Student Parliament at Kherson National Technical University, 2024. Source: KNTU Press Office

In peacetime, a migration of this scale requires months of planning. Now, every minute counted.

For the teams at Microsoft, requests from Ukraine were prioritized. The company’s emergency response channels were activated, mobilizing engineering and security teams around the world to protect the data.

An exhausting effort began. Since Artemenko was blocked on the left bank of the Dnipro River, someone physically present at the university needed to operate the hardware. This risky role was taken on by an IT department employee. She passed through checkpoints every day to reach the main building, right beneath the windows of which lay an unexploded missile. On each trip, she carried out critical system keys on portable drives—risking her life every time she passed through a checkpoint.

The migration to Microsoft Azure took place mostly at night. One evening, at a highly critical moment, the connection speed dropped to 10 megabits per second. Local providers, now controlled by the occupiers, limited the speed per single connection—but did not limit their total number.

Artemenko took advantage of this: he wrote special scripts that automatically sliced the data arrays into thousands of small fragments. Using the Microsoft AzCopy utility, these pieces were sent in thousands of parallel threads to the cloud.

Microsoft’s technical experts today call these actions exceptional. The ability to write scripts, divide nearly 20 terabytes of data, and transfer it through a limited 10 Mbps channel under extreme pressure was world-class engineering under extreme pressure. Artemenko worked systematically: he transferred a portion of the array, verified the integrity of the files in the cloud—and only then physically destroyed the original in Kherson. When the last file crossed the digital border, he remotely locked the hard drives at the BIOS level, turning the servers into a pile of expensive scrap metal.

Metal left behind

When the occupying troops finally reached the university’s datacenter, they found only locked equipment. The IT team had previously switched some cameras to a hidden Wi-Fi channel, allowing the Ukrainian team—now relocated to safer ground—to watch in real time as the occupiers moved through the server room.

“They took everything most valuable and lightest,” Artemenko says. “Memory modules, processors, network cards. Apparently, there was a strict weight limit during their escape. That’s why the heavy hard drives were left lying around, while they took all the small SSDs.”

"Audience Interaction" training session by the Rector of KNTU, 2024. Source: KNTU Press Office
“Audience Interaction” training session by the Rector of KNTU, 2024. Source: KNTU Press Office

While the servers were rendered useless, not a single byte of data was compromised. Everything that mattered most was in the cloud, securely protected.

A new security perimeter

This protection was tested when occupation authorities attempted to build a “clone” of KNTU, appointing a former staff member as its head. Despite this, they quickly realized seizing the building was not enough.

Identity management had also moved to the cloud via Microsoft Entra ID, so the Ukrainian administration retained full control over the digital perimeter. This allowed them to block compromised corporate accounts and revoke access rights to all internal services. The digital keys remained with the university team.

This case practically proved a key rule of modern security architecture: the physical seizure of servers no longer means control over the organization. When identities, access rights and credentials are controlled from the cloud, digital identity—not hardware—becomes the true line of defense.

The unique campus

Today, KNTU exists as a unique virtual campus—it has no single physical address. The administration, led by Rector Olena Chepeliuk, works from Khmelnytskyi. The servers are protected in Azure, and students are scattered around the world. Thanks to Teams, lectures and exams continue seamlessly.

Olena Chepelyuk, Rector of Kherson National Technical University. Source: KNTU Press Office
Olena Chepelyuk, Rector of Kherson National Technical University. Source: KNTU Press Office

However, some students remain in the occupied territories.

“We have a student who is there right now,” Chepeliuk’s voice trembles. “She doesn’t miss a single class. To connect to her studies, she has to search for an internet signal every time, risking her own safety. She does this just to hear the Ukrainian language and see her teachers. Her attendance is better than that of students who are now completely safe somewhere in Europe.”

For students who risk their safety each time they log on, the university in the cloud is not just education. It is a strong connection to a free Ukraine. The close partnership between Microsoft and KNTU, provided free of charge by Microsoft as part of a technology support program, guaranteed the continuity of the educational process under the most difficult conditions. The company views education as critical infrastructure, guided by a simple principle: a country that continues to learn, continues to exist.

Unpacking and setting up 3D printing equipment won by students at the GCIP Regional Accelerator for Innovation, Technology and Startups in the Kherson Region, 2024. Source: KNTU Press Office
Unpacking and setting up 3D printing equipment won by students at the GCIP Regional Accelerator for Innovation, Technology and Startups in the Kherson Region, 2024. Source: KNTU Press Office

Epilogue: Lessons for the World

KNTU emerged from this trial technologically stronger. In Chepeliuk’s temporary office, one entire wall is dedicated to her home—covered in photographs of iconic places in the Kherson region. Some of these symbols no longer exist, destroyed by the war. Yet the university carefully preserves this memory, and the team is already designing new office furniture with an eye toward exactly how it will be arranged in rebuilt Kherson classrooms.

Ukraine’s case proves: data loss threats are no longer hypothetical, and it makes no difference what destroys the servers—military action, massive floods, fires, or ransomware. They all lead to the same result. Moving to the cloud is no longer just a matter of convenience or cost—it is a matter of digital survival. In a world of constant uncertainty, only cloud technologies can guarantee geographical redundancy, identity-based security, and, ultimately, an organization’s “digital immortality.” Kherson University left broken machines and empty hard drives for those who came. But thanks to the cloud, it kept its heart, its memory and its future intact.

Technical reference: The architecture of rescue

  • Data Transfer: Evacuation of over 20 terabytes of mission-critical databases using Microsoft Azure Blob Storage and Microsoft AzCopy under extreme network constraints.
  • Security and Access: Implementation of Microsoft Entra ID for identity management. A strict geo-block instantly cut off unauthorized actors from management systems.
  • Educational Process: Deployment of Microsoft 365 and Teams to conduct lectures and exams online, uniting students across the globe.

Partnership: Rapid technical implementation and coordination thanks to partners from the URAN (Ukrainian Research and Academic Network).

Reporting and interviews by Ilya Strelnikov.

English (United States)
Your Privacy Choices Opt-Out Icon Your Privacy Choices
Consumer Health Privacy Sitemap Contact Microsoft Privacy Manage cookies Terms of use Trademarks Safety & eco Recycling About our ads