Description:

Agencies have spent much of the last five years crawling out of the waterfall approach to software development and walking, or in some cases running, into the development, security and operations (DevSecOps) approach.

The reasons are for this transition have always been clear: To improve their competitiveness, their ability to move quickly and to finally address their digital sprawl that resulted in mounds of technical debt.

A panel of federal and industry experts recently offered insights into how DevSecOps and the use of open source software are helping drive agencies to a more secure, agile and modernized set of applications.

Angel Phaneuf, the chief information security officer at the Army Software Factory, said creating a successful software development process involves several different pieces that must come together as one.

“The first factor is to ensure that we don’t already have a tool that already fits your need or use case because digital sprawl is a problem and it can get out of control really quick,” Phaneuf said during the discussion Secure development of federal software supply chains. “Another factor is understanding the licensing model and the ability to scale even though some software is only requested by a single team or a single person, we have to make sure that we take into account the possibility that the entire organization is going to adopt this. We’ve gone through several cycles of determining what is the right way to do it as someone comes in and uses a new tool.”

A third important factor, she said, is documentation. This includes everything from feedback from developers, engineers and security experts to a ratings system to ensure the product meets the controls and rigors the Army demands.

Looking for novel capabilities

The Navy’s Black Pearl effort, which is more of a DevSecOps tools and assistance provider than a software factory, is less prescriptive about how software is developed and implemented.

Manuel Gauto, the chief engineer of Black Pearl for the Department of the Navy, said security, user experience and overall integration are the leading factors that make up their successful software process.

“What we’re trying to do with Black Pearl is connect not just the high-performing entities within the traditional defense industrial base, but also bring in folks that have novel capability on the commercial side that we can just buy as a self-encapsulated capability, and then build a simpler interface to the rest of the ecosystem that we’re trying to build,” he said. “At the end of the day, the Department of Navy is not in the business of building source code scanners or artifact scanners. We build capabilities that are warfighting capabilities that go on a submarine or warship so we’re constantly trying to allocate our resources as intelligently as possible.”

This means for the Army, the Navy and even for the State Department using open source code to help accelerate certain capabilities.

Landon Van Dyke, the senior technology advisor for the State Department, said there are specific security and oversight tools needed to make sure open source software is as safe as possible.

“At the enterprise level when we’re looking at evaluating a company or a product, we’re actually evaluating the company themselves. We do start with the procurement process. We look to see what their financial health looks like what they’re doing in the market, who their partners are. Obviously if it’s overseas that matters especially for the State Department,” Van Dyke said. “One of the things that we’re really looking at for software is the source code. We’re looking at things like injection, authentication and session management. That does require a little bit of sophistication in the evaluation by artificial intelligence tools.”

Attacks becoming more challenging

Dr. Stephen Magill, the vice president of product innovation at Sonatype, said as agencies move more toward the DevSecOps model, they must understand there are two kinds of vulnerabilities—the mistakes made in code development and the intentional vulnerabilities like zero days such as Log4j.

“Having a good inventory is important because knowing what you’re using can be remarkably difficult. And when you’re operating at the level of scale that the government does and that larger companies do, then for the new style of attacks, things like malicious codes, that’s the most challenging but it’s also where the innovation is happening in the industry right now,” Magill said. “There are products out there, like we have a product called Firewall, which sits at the boundary of your network and will quarantine things that you pull in if we’ve detected malicious commits. Basically, it’s like a different type of monitoring.”

He said agencies need to rely on vulnerability reports and constantly assess the trustworthiness of their development teams, processes and contributors.

For many of the panelists, the build vs. buy decision is at the top of mind.

The Navy’s Gauto said every agency, DoD and civilian, is feeling the pinch of not having enough software engineers, which makes this decision more straightforward.

“We keep our core offering really trimmed down. We have a very specific set of tools, and what we do for folks is really locked in on a specific tool, like a specific code scanner or something. We have a whole architecture for bolting on tools as an additional set of functionality to our core offering and we can kind of work with the people that really want that to make sure that stays maintained, make sure it stays funded,” he said. “Then in terms of that core tooling, we’re really user experience-centric and we’re really demand driven. The only times we really challenge our common offering is when we have a large group of people saying the same thing. We’ve developed a process of looking for need and demand evaluation of the specific tool that’s being requested and then there’s an integration phase. That’s how we graduate products into that common environment.”

He added ensuring the tool integrates into their current set of capabilities and their delivery and development pipeline is paramount.

Build vs. buy considerations

The Army’s Phaneuf said many times the decision of buy vs. build comes to down to how fast the service needs to the software and whether it’s for a large number of users or a smaller number.

Sonatype’s Magill said finding that development and security expertise requires each organization to make trade off decisions, and that’s why open source can address that speed to market challenge.

He said if agencies use continuous monitoring tools and other security capabilities to monitor those dependencies to the software, they can stay on top of threats and innovations.

“Each organization has to make that tradeoff for themselves and decide where the line is in terms of what makes it worth it to pull in an open source component versus do something else,” Magill said. “It’s important to really think, when you are adding some new dependency or leveraging some new piece of open source, what is the value that’s bringing you? And then what is the maintenance burden that you’re setting yourself up for because if you’re pulling in a giant dependency  because you’re using one function, is that is that really worth it? Right, you’re going to have to maintain that. You’re going to have to keep that integrated into your code. You’re going to have to keep up with new versions and security vulnerabilities as they’re disclosed over a long period of time. It’s really hard to remove something once it’s in the code base, so you’re really signing up for a long term maintenance project.”

The move to DevSecOps is more about changing the culture than anything else. State’s Van Dyke said the culture of security permeating the entire development process. The culture of build vs. buy. And the culture of the infrastructure modernization effort.

He said previously at State a lot of these activities have been done in siloes so bringing those individual organizations together is a matter of people, process and technology.

Changing the culture

Gauto said he works with a lot of engineers who just want to build everything.

“They have a hammer so to them, everything looks like a nail. They’re like, ‘Oh, why would we pay for that I can build that over a weekend,’” he said. “But what we have been pushing for, and that kind of pushes the scale and weights it a little more effectively for us, is that we push for a certain level of quality for internal tooling. Like, if we’re building something it needs to almost be a product of its own right, it needs documentation, it needs to pass the robust tests that we do on any piece of open source software, any piece of commercial software. That usually makes it easier for the individual engineering leaders within the organization to properly evaluate that build versus buy decision.”

Gauto added that commoditizing the software development process as much as possible through software factories, as one example, lets sailors and civilians focus more on mission and less on development.

The Army Software Factory’s focus has been building skillsets around DevSecOps so the soldiers and civilians can go back to their mission areas and drive technology change focused on the future force design.

“We’ve developed a tech accelerator that bring soldiers from all professions in the Army up to speed on coding and security skills that they need to help implement secure that software that will drive the mission impact,” Phaneuf said. “When I think of that I think of do I want to build something that’s going to provide a capability that I can buy? I need to be able to buy something that has to be able to meet certain standards so that when I put out these future soldiers in a war zone, where I’m deploying a developer, a platform engineer, user experience designer and a project manager, soldiers are going out into the battlefield and can build you any application, at any time? Do they want to be building an application that supports their application? Or do they want to build that mission app? And that comes at really into play when we think of do we build a software product that is already out in the commercial aspect or do we just consume that product?”

The speed of DevSecOps pushes agencies to ensure all of these questions and concepts are built into the development cycle.

Sonatype’s Magill said this includes the security capabilities like scanning for vulnerabilities and relying on private sector software bill of materials (S-BOM).

“There’s the vulnerability database which will help you know which of those components are vulnerable in which versions and so forth. So when you’re thinking about a disconnected environment, you basically need a full copy of that vulnerability database in a process to keep it up to date and have consistency across your development and your deployment and release environments,” Magill said. “That’s definitely something I think about when you’re evaluating products and something where there has been some innovation in the industry.”

Learning objectives:

– Current State of Software Development in Agencies
– Cybersecurity Considerations for Open Source Software
– Decisions Around Building vs. Buying Capabilities

Agenda

-

Moderated by Jason Miller

Cost: No Fee
Description
How are agencies developing strategies to implement cutting edge software?

During this exclusive webinar, we will break down different approaches taken in securing software during development and production. Moderator Jason Miller and agency leaders will discuss some of the most important factors when you are deciding to bring new software into your ecosystem and how to ensure that your workforce has the necessary skills.

Learning objectives:

- Current State of Software Development in Agencies
- Cybersecurity Considerations for Open Source Software
- Decisions Around Building vs. Buying Capabilities

By providing your contact information to us, you agree: (i) to receive promotional and/or news alerts via email from Federal News Network and our third party partners, (ii) that we may share your information with our third party partners who provide products and services that may be of interest to you and (iii) that you are not located within the European Economic Area.

Please register using the form on this page.
Have questions or need help? Visit our Q&A page for answers to common questions or to reach a member of our team.

Speakers

Angelica Phaneuf

Chief Information Security Officer, Army Software Factory

Manuel Gauto

Chief Engineer, Black Pearl, Department of Navy

Landon Van Dyke

Senior Technology Advisor, State Department

Dr. Stephen Magill

Vice President, Product Innovation, Sonatype

Sponsors

By providing your contact information to us, you agree: (i) to receive promotional and/or news alerts via email from Federal News Network and our third party partners, (ii) that we may share your information with our third party partners who provide products and services that may be of interest to you and (iii) that you are not located within the European Economic Area.