Insight By Red Hat

DevOps morphs into DevSecOps for built-in security

DevOps is a proven route to modernizing of legacy applications and for developing them in a way that’s they’re natively cloud deployable.

A sea change is occurring in the way federal agencies go about software development. More and more, they’re moving to the agile process. Agile is characterized by close interaction with the users of software so the ultimate delivery works as expected.

Agency techs are also adopting strategies of frequent and regular releases of discrete blocks of functionality. That’s know as DevOps, a handy way of saying development operations. Many of the individual steps in DevOps environments are automated, speeding things up and ensuring consistency.

DevOps is a proven route to modernizing of legacy applications and for developing them in a way that’s they’re natively cloud deployable.

The growing urgency of cybersecurity calls for programmers to make security an inherent quality of software, one that persists when modules are combined to build systems or when they are reused in different systems. A growing number of development teams find containerization and microservices technologies enable production of software that meets both cloud and security imperatives. Used in a DevOps environment, the result might be called DevSecOps.

 

Shape

Current Agency Software Projects

We are aggressively moving what few systems we have left in data centers to the cloud. Therefore, the adoption of more modern software development practices [is] very important to us.

Shape

Rapid Delivery of Software Code

What we’ve been looking at is how can we take advantage of cloud number one, containerized environments number two, and platform standardization number three. Security has to be up front.

Shape

The Journey to Automation

By decoupling those larger components of the application, we can be much more agile and DevSecOps friendly in the way we’re developing apps. The authentication team can be over here doing their job, while folks doing some other part of the business logic can be over there doing theirs.

 

Listen to the full show

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

Related Stories

Panel of experts
  • Shane Barney

    Deputy Chief Information Security Officer, U.S. Citizenship and Immigration Services

  • Bill Tinston

    Program Executive Officer, Information Operations, Defense Logistics Agency

  • Pamela Wise-Martinez

    Chief Cloud and Enterprise Data Architect, Pension Benefit Guaranty Corporation

  • Adam Clater

    Chief Architect, Office of the Chief Technologist, Red Hat North America Public Sector

  • Jason Miller

    Executive Editor, FederalNewsRadio.com