4 Ways the Defense Department Can Leverage DevSecOps to Enhance the Mission
As the Defense Department navigates an increasingly complex threat landscape, the organization is eyeing a shift to a DevSecOps mindset to ensure it can securely innovate. At a recent roundtable, we asked the experts how DOD can begin adopting this practice and what it can do to drive the mission forward.
After a year like 2020, the word “security” has taken on a whole new meaning. As terms like “remote work” and “hybrid workforce” enter the public sector vernacular, organizations must determine how to secure their IT infrastructure beyond the traditional perimeter. And, as the complexities of the COVID-19 pandemic continue to take center stage, cybercriminals are disproportionately targeting governments and critical health infrastructure responsible for delivering services to the American people.
These security concerns run rampant across organizations everywhere, but the Defense Department is perhaps the most vulnerable to such threats. After all, a cyber attack targeted at the DOD could have lasting national security consequences. What’s more, warfighters and military personnel are stationed in multiple locations, making it increasingly important to prioritize identity and access management. One way to help solve these challenges is for the DOD to shift operations and workflow to follow a DevSecOps mindset, one where security is not an afterthought but a critical piece of the development and operational process. Over the past several years, the DOD has looked to shift toward a more agile and collaborative model. In 2019, the Pentagon launched the DoD Enterprise DevSecOpsInitiative. The goal: Avoid costly IT catastrophes by identifying flaws early and often in the software development lifecycle.
But there’s still work to be done. So, how can the DOD begin to turn DevSecOps from a goal into a reality? At a recent roundtable, produced by Government Executive Media Group and hosted by IBM and Red Hat, we asked the experts working hard to bring DevSecOps to the DOD for insight. Click here to read more.
This content is made possible by our sponsors Red Hat and IBM; it is not written by and does not necessarily reflect the views of Defense One’s editorial staff.