SlideShare une entreprise Scribd logo
1  sur  39
Télécharger pour lire hors ligne
Weapons Free!

Open Source Solutions to Programmatic and Operational Challenges
Faced by the Defense and Intelligence Communities in the Age of
Sequestration

Prepared for WSO2Con 2013
Prepared by
Adam Firestone
Director of Solutions
WSO2 Federal Systems, Inc.
Weapons Free
• Weapons Control Status
–

The three levels of weapons control status (WCS) outline the
conditions, based on target identification criteria, under which
friendly elements may engage. The commander sets and
adjusts the weapons control status based on friendly and
enemy disposition. In general, a more restrictive WCS relates
to a higher probability of fratricide. The three levels, in
descending order of restriction, are-●

●

●

WEAPONS HOLD (Engage only if engaged or ordered to
engage)
WEAPONS TIGHT (Engage only targets positively identified
as enemy)
WEAPONS FREE (Engage any targets not positively
identified as friendly)

• From US Army Field Manual 3-21.10
Agenda
• Legal and Policy Basis for
Government Use of Open
Source Software
• Open Source and the Big 5
Government IT Challenges
• Open Source Cybersecurity
It Isn’t Shareware.com!
• Many misconceptions about open
source software (OSS); a few
examples:
–
–
–
–

“It’s a security risk.”
“I need a commercial product. This
isn’t commercial!”
“It’s a threat to innovation!”
“The use of OSS is contrary to DoD
information assurance regulations.”
All in the Name of
Liberty

• OSS freedoms:
–
–
–
–

Run the software for any
purpose
Study the software
Modify the software
Freely redistribute copies
of the original or modified
software without royalties
to the original author
A Rose by Any Other
Name
• Synonyms
–
–
–
–

Free software
Libre software
Free and open source software
(FOSS)
Free-libre open source software
(FLOSS)

• Antonyms
–
–

Proprietary software
Closed software
Why SHOULD the
Government Use OSS?
• Lower risk
–

Possibility of detailed evaluation when
you have the source code

• Lower TCO
–
–
–

Freely distributable at no additional cost
Shared development costs
Freedom from vendor lock-in

• Fit for purpose
–

Can be modified for special purposes and
to counter attacks
Comparing GOTS,
Proprietary Software
and OSS
Support
Strategy

Cost

Flexibility

Risks

GOTS

High

High

Become obsolescent
(government bears all
costs & can’t afford
them)

Proprietary

Medium Low
*

Abandonment & *high
cost if monopoly

OSS

Low*

* Can be as costly as
GOTS if fail to
build/work with
developer community

High
DoD OSS Policy Memo
(16 OCT 2009)
a. In almost all cases, OSS meets the definition of “commercial
computer software” and shall be given appropriate statutory
preference in accordance with 10 USC 2377…
b. Executive agencies, including the DoD, are required to conduct
market research [which should] include OSS… There are
positive aspects of OSS that should be considered…
c. DoDI8500.2 control “DCPD-1 Public Domain Software Controls,”
doesn’t forbid the use of OSS
d. Ensure that the plan for software support (e.g., commercial or
Government program office support) is adequate for mission
need.
e. Government is not always obligated to distribute the source
code of any modified OSS to the public
DoD OSS Policy Memo
(16 OCT 2009)
e. Software source code and associated design documents
are “data”… and therefore shall be shared across the DoD
as widely as possible
f. Software items, including code fixes and enhancements,
developed for the Government should be released to the
public (such as under an open source license) when:
–

–
–

The project manager, program manager, or other comparable
official determines that it is in the Government’s interest to do
so, such as through the expectation of future enhancements
by others.
The Government has the rights to reproduce and release the
item, and to authorize others to do so.
The public release of the item is not restricted by other law or
regulation
Myth: OSS is not Commercial
Software
Reality: OSS is Commercial
• Nearly all OSS are commercial items
• U.S. Law (41 USC 403), FAR, & DFARS
–

Commercial item is:
●
(1) Any item, other than real property, that
is of a type customarily used by the general
public or by non-governmental entities for
purposes [not government-unique], and
–
–

–

(i) Has been sold, leased, or licensed to the
general public; or
(ii) Has been offered for sale, lease, or
license to the general public...

Intentionally broad; "enables the Government
to take greater advantage of the commercial
marketplace” [DoD AT&L]
Myth: OSS is not Commercial
Software
Reality: OSS is Commercial
• U.S. Law (41 USC 403), FAR, DFARS
require preference of commercial
items (inc. COTS) & NDI:
–

Agencies must
●
(a) Conduct market research to
determine [if] commercial items or
nondevelopmental items are
available …
●
(b) Acquire [them when available]
●
(c) Require prime contractors and
subcontractors at all tiers to
incorporate, to the maximum extent
practicable, [them] as
Myth: OSS Conflicts with DoD
IA Policy
Reality: DoD IA Policy
Supports OSS

• DoDI 8500.2 DCPD-1 "Public Domain Software Controls” is
often misinterpreted
–

–

People read THIS:
●
“Binary or machine executable ... software products and other
software products with limited or no warranty such as those
commonly known as freeware or shareware are not [to be] used
in DoD information systems ...”
But forget to read the SECOND PARAGRAPH
●
“[because they’re] difficult or impossible to review, repair, or
extend, given that the Government does not have access to the
original source code and there is no owner who could make
such repairs on behalf of the Government.”

• Doesn’t apply to OSS! The source code is available!
Myth: Proprietary is Always More Secure
Reality: Open Design is a Security Advantage

• Saltzer & Schroeder [1974/1975] - Open
design principle
–

the protection mechanism must not depend on
attacker ignorance

• Security by obscurity doesn’t halt attacks;
thorough review makes code more secure
• BUT
–
–
–

OSS developers/reviewers need security
knowledge
The code must be reviewed
Problems must be fixed
Myth: Proprietary is Always More Secure
Reality: Open Design is a Security Advantage

• Borland InterBase/Firebird Back Door
–
–
–
–

user: politically, password: correct
Hidden for 7 years in proprietary
product
Found after release as OSS in 5 months
Unclear if malicious, but has its form
Myth: OSS is Unsupported
Reality: OSS is Commercially
Supported
• Businesses support OSS!
–

WSO2, Red Hat, Novell, HP, IBM,
DMSolutions, SourceLabs, OpenLogic,
Carahsoft, ...

• Average OSS developer 30yrs old,
11yrs experience
• OSS doe not mean no cost
–
–

Training, support, transition, etc. are
not free-of-cost
Competition often produces lower TCO
& higher ROI for OSS
Some US Government OSS
Policies
• OMB policy “Technology Neutrality” (2011-01-07)
–
–

“agencies should analyze alternatives that include…
open source”
Updates OMB-04-16 (2004-07-01) = OSS okay in
federal government

• DOD policy “Clarifying guidance regarding Open
Source Software (OSS)” + FAQ (2009-10-16)
–
–

Makes clear OSS can be used, counters
misconceptions
Updates May 2003 memo

• Consumer Financial Protection Bureau’s Source
Code Policy
–
–
–

Released 2012-04, reuses DoD 2009 policy
Two parts, “use of external OSS” & “Redistribution”
http://www.consumerfinance.gov/developers/sourcec
odepolicy/

• cendi.gov, e.g., “Frequently Asked Questions about
Copyright and Computer Software”
http://www.cendi.gov/publications/09-1FAQ_OpenSo
The Big 5
• Transformation and Integration of
Legacy Systems
• Integration and Exploitation of
Heterogeneous Data Sources
• Secure Multi-Level Information
Sharing
• Optimizing Certification and
Accreditation Activities
• Modernization and Automation of
Software Verification and Validation
Transformation

Comma
nd
Authorit
y

Routing
System

Targetin
g
System
Proprietary
Message
Format

Unstructure
d

U
S

A
T
S

Weapon

N
U
22

Proprietary
Message
Format

N
I

B
A

E
L
Plannin
g
System

Proprietary
Message
Format

Delivery
Platform

Proprietar
y
Message
Format
Transformation Solution
Concept
Collapse multiple components into a single,
distributed, service oriented system

Targ
etin
g
App

Rou
ting
App

Thr
eat
Anal
ysis
App

Miss
ion
Plan
ning
App

ISR
App

Task
ing
APP

Enterprise
Integration
Platform
Transformation Solution
Components
Enterprise Integration
Platform
Transformation Solution
Architecture
Integration of Heterogeneous
Data Sources
Consuming System, Service or Application

WSO2 Data Services Server
(“DAL in a Box”)
HTTP
HTTPS
JMS
SMTP
FTP
FTPS
SFTP
TCP

SQL

NoSQ
L

CS
V

OD
S

RD
F

We
b
Pag
e
Secure Multilevel Information
Sharing
Optimizing Certification and
Accreditation
Where C&A Fits in the Process Today
Dream
It
Plan It
Build It
Test It
Submit
to C&A
PANIC!

PANIC!

Receive
C&A
Results

Spend
Lots of
$ and
Time
Optimizing Certification and
Accreditation
Front End Loading C&A
Continuous
Continuous
Deployment
Deployment

Project and
Project and
Team
Team
Management
Management

Software
Software
development
workflow
workflow

Governance
Governance
and
and
Compliance
Compliance

Test
Test
Automation
Automation

Continuous
Integration
Integration

Development
Dashboards
Dashboards

Continuous
Continuous
Build
Build

Develop Code

Source Control
Source Control

Issue Tracking
Issue Tracking
Modernizing Verification and
Validation
Modernizing Verification and
Validation
Only the Audience Changes
Continuous
Continuous
Deployment
Deployment

Project and
Project and
Team
Team
Management
Management

Software
Software
development
workflow
workflow

Governance
Governance
and
and
Compliance
Compliance

Test
Test
Automation
Automation

Continuous
Integration
Integration

Development
Dashboards
Dashboards

Continuous
Continuous
Build
Build

Develop Code

Source Control
Source Control

Issue Tracking
Issue Tracking
It’s a Dangerous Cyber
World, Folks
The Most Dangerous
Threat is Still the Insider
Managing the Insider
Threat
A Quick Recap
• Open source is commercial software
and fully applicable to defense,
intelligence and other government
requirements
• Open source effectively responds to
today’s top government IT
challenges
• Open source can mitigate today’s
key cybersecurity threats
Contact
• Adam Firestone
–
–
–
–

Director of Solutions
WSO2 Federal Systems
703-879-5176
adam@wso2federal.com
Thank You

Contenu connexe

Similaire à WSO2Con US 2013 - Weapons Free: Open Source Solutions to Programmatic and Operational Challenges Faced by the Defense and Intelligence Communities in the Age of Sequestration

Open Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and SecurityOpen Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and SecurityJoshua L. Davis
 
Open source software in government challenges and opportunities
Open source software in government challenges and opportunitiesOpen source software in government challenges and opportunities
Open source software in government challenges and opportunitiesLuke Fretwell
 
Reaching its Potential: Making Government Developed OSS a Major Player
Reaching its Potential: Making Government Developed OSS a Major PlayerReaching its Potential: Making Government Developed OSS a Major Player
Reaching its Potential: Making Government Developed OSS a Major PlayerDelta3D
 
Reaching It's Potential: How to Make Government-Developed OSS A Major Player
Reaching It's Potential: How to Make Government-Developed OSS A Major PlayerReaching It's Potential: How to Make Government-Developed OSS A Major Player
Reaching It's Potential: How to Make Government-Developed OSS A Major PlayerJoshua L. Davis
 
FOSS and Open Standards for Digital Sovereignty
FOSS and Open Standards for Digital SovereigntyFOSS and Open Standards for Digital Sovereignty
FOSS and Open Standards for Digital SovereigntyLibreItalia
 
Barcamp: Open Source and Security
Barcamp: Open Source and SecurityBarcamp: Open Source and Security
Barcamp: Open Source and SecurityJoshua L. Davis
 
3 page paper due tomorrow.pdf
3 page paper due tomorrow.pdf3 page paper due tomorrow.pdf
3 page paper due tomorrow.pdfsdfghj21
 
AV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons LearnedAV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons LearnedStanford University
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companiesiasaglobal
 
Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...
Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...
Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...Cloudera, Inc.
 
OSS - enterprise adoption strategy and governance
OSS -  enterprise adoption strategy and governanceOSS -  enterprise adoption strategy and governance
OSS - enterprise adoption strategy and governancePrabir Kr Sarkar
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteSandraPaiva
 
Developing a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP ConsiderationsDeveloping a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP Considerationsipspat
 
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Mike Linksvayer
 
Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Mary Lou Wakimura
 
Legal interoperability: glocal perspective (LAPSI, Torino)
Legal interoperability: glocal perspective (LAPSI, Torino)Legal interoperability: glocal perspective (LAPSI, Torino)
Legal interoperability: glocal perspective (LAPSI, Torino)Federico Morando
 
Security - sophos-nist-compliance-card.pdf
Security - sophos-nist-compliance-card.pdfSecurity - sophos-nist-compliance-card.pdf
Security - sophos-nist-compliance-card.pdfJohanGunawan13
 

Similaire à WSO2Con US 2013 - Weapons Free: Open Source Solutions to Programmatic and Operational Challenges Faced by the Defense and Intelligence Communities in the Age of Sequestration (20)

Open Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and SecurityOpen Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and Security
 
Open source software in government challenges and opportunities
Open source software in government challenges and opportunitiesOpen source software in government challenges and opportunities
Open source software in government challenges and opportunities
 
Reaching its Potential: Making Government Developed OSS a Major Player
Reaching its Potential: Making Government Developed OSS a Major PlayerReaching its Potential: Making Government Developed OSS a Major Player
Reaching its Potential: Making Government Developed OSS a Major Player
 
Reaching It's Potential: How to Make Government-Developed OSS A Major Player
Reaching It's Potential: How to Make Government-Developed OSS A Major PlayerReaching It's Potential: How to Make Government-Developed OSS A Major Player
Reaching It's Potential: How to Make Government-Developed OSS A Major Player
 
Oss healthcare
Oss healthcareOss healthcare
Oss healthcare
 
FOSS and Open Standards for Digital Sovereignty
FOSS and Open Standards for Digital SovereigntyFOSS and Open Standards for Digital Sovereignty
FOSS and Open Standards for Digital Sovereignty
 
Barcamp: Open Source and Security
Barcamp: Open Source and SecurityBarcamp: Open Source and Security
Barcamp: Open Source and Security
 
3 page paper due tomorrow.pdf
3 page paper due tomorrow.pdf3 page paper due tomorrow.pdf
3 page paper due tomorrow.pdf
 
Floss
FlossFloss
Floss
 
AV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons LearnedAV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons Learned
 
H4d DOD 101 workshop 040516
H4d DOD 101 workshop 040516H4d DOD 101 workshop 040516
H4d DOD 101 workshop 040516
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companies
 
Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...
Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...
Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...
 
OSS - enterprise adoption strategy and governance
OSS -  enterprise adoption strategy and governanceOSS -  enterprise adoption strategy and governance
OSS - enterprise adoption strategy and governance
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference Keynote
 
Developing a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP ConsiderationsDeveloping a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP Considerations
 
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
 
Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...
 
Legal interoperability: glocal perspective (LAPSI, Torino)
Legal interoperability: glocal perspective (LAPSI, Torino)Legal interoperability: glocal perspective (LAPSI, Torino)
Legal interoperability: glocal perspective (LAPSI, Torino)
 
Security - sophos-nist-compliance-card.pdf
Security - sophos-nist-compliance-card.pdfSecurity - sophos-nist-compliance-card.pdf
Security - sophos-nist-compliance-card.pdf
 

Plus de WSO2

Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 

Plus de WSO2 (20)

Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 

Dernier

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

WSO2Con US 2013 - Weapons Free: Open Source Solutions to Programmatic and Operational Challenges Faced by the Defense and Intelligence Communities in the Age of Sequestration

  • 1. Weapons Free! Open Source Solutions to Programmatic and Operational Challenges Faced by the Defense and Intelligence Communities in the Age of Sequestration Prepared for WSO2Con 2013 Prepared by Adam Firestone Director of Solutions WSO2 Federal Systems, Inc.
  • 2. Weapons Free • Weapons Control Status – The three levels of weapons control status (WCS) outline the conditions, based on target identification criteria, under which friendly elements may engage. The commander sets and adjusts the weapons control status based on friendly and enemy disposition. In general, a more restrictive WCS relates to a higher probability of fratricide. The three levels, in descending order of restriction, are-● ● ● WEAPONS HOLD (Engage only if engaged or ordered to engage) WEAPONS TIGHT (Engage only targets positively identified as enemy) WEAPONS FREE (Engage any targets not positively identified as friendly) • From US Army Field Manual 3-21.10
  • 3. Agenda • Legal and Policy Basis for Government Use of Open Source Software • Open Source and the Big 5 Government IT Challenges • Open Source Cybersecurity
  • 4.
  • 5. It Isn’t Shareware.com! • Many misconceptions about open source software (OSS); a few examples: – – – – “It’s a security risk.” “I need a commercial product. This isn’t commercial!” “It’s a threat to innovation!” “The use of OSS is contrary to DoD information assurance regulations.”
  • 6. All in the Name of Liberty • OSS freedoms: – – – – Run the software for any purpose Study the software Modify the software Freely redistribute copies of the original or modified software without royalties to the original author
  • 7. A Rose by Any Other Name • Synonyms – – – – Free software Libre software Free and open source software (FOSS) Free-libre open source software (FLOSS) • Antonyms – – Proprietary software Closed software
  • 8. Why SHOULD the Government Use OSS? • Lower risk – Possibility of detailed evaluation when you have the source code • Lower TCO – – – Freely distributable at no additional cost Shared development costs Freedom from vendor lock-in • Fit for purpose – Can be modified for special purposes and to counter attacks
  • 9. Comparing GOTS, Proprietary Software and OSS Support Strategy Cost Flexibility Risks GOTS High High Become obsolescent (government bears all costs & can’t afford them) Proprietary Medium Low * Abandonment & *high cost if monopoly OSS Low* * Can be as costly as GOTS if fail to build/work with developer community High
  • 10. DoD OSS Policy Memo (16 OCT 2009) a. In almost all cases, OSS meets the definition of “commercial computer software” and shall be given appropriate statutory preference in accordance with 10 USC 2377… b. Executive agencies, including the DoD, are required to conduct market research [which should] include OSS… There are positive aspects of OSS that should be considered… c. DoDI8500.2 control “DCPD-1 Public Domain Software Controls,” doesn’t forbid the use of OSS d. Ensure that the plan for software support (e.g., commercial or Government program office support) is adequate for mission need. e. Government is not always obligated to distribute the source code of any modified OSS to the public
  • 11. DoD OSS Policy Memo (16 OCT 2009) e. Software source code and associated design documents are “data”… and therefore shall be shared across the DoD as widely as possible f. Software items, including code fixes and enhancements, developed for the Government should be released to the public (such as under an open source license) when: – – – The project manager, program manager, or other comparable official determines that it is in the Government’s interest to do so, such as through the expectation of future enhancements by others. The Government has the rights to reproduce and release the item, and to authorize others to do so. The public release of the item is not restricted by other law or regulation
  • 12.
  • 13. Myth: OSS is not Commercial Software Reality: OSS is Commercial • Nearly all OSS are commercial items • U.S. Law (41 USC 403), FAR, & DFARS – Commercial item is: ● (1) Any item, other than real property, that is of a type customarily used by the general public or by non-governmental entities for purposes [not government-unique], and – – – (i) Has been sold, leased, or licensed to the general public; or (ii) Has been offered for sale, lease, or license to the general public... Intentionally broad; "enables the Government to take greater advantage of the commercial marketplace” [DoD AT&L]
  • 14. Myth: OSS is not Commercial Software Reality: OSS is Commercial • U.S. Law (41 USC 403), FAR, DFARS require preference of commercial items (inc. COTS) & NDI: – Agencies must ● (a) Conduct market research to determine [if] commercial items or nondevelopmental items are available … ● (b) Acquire [them when available] ● (c) Require prime contractors and subcontractors at all tiers to incorporate, to the maximum extent practicable, [them] as
  • 15. Myth: OSS Conflicts with DoD IA Policy Reality: DoD IA Policy Supports OSS • DoDI 8500.2 DCPD-1 "Public Domain Software Controls” is often misinterpreted – – People read THIS: ● “Binary or machine executable ... software products and other software products with limited or no warranty such as those commonly known as freeware or shareware are not [to be] used in DoD information systems ...” But forget to read the SECOND PARAGRAPH ● “[because they’re] difficult or impossible to review, repair, or extend, given that the Government does not have access to the original source code and there is no owner who could make such repairs on behalf of the Government.” • Doesn’t apply to OSS! The source code is available!
  • 16. Myth: Proprietary is Always More Secure Reality: Open Design is a Security Advantage • Saltzer & Schroeder [1974/1975] - Open design principle – the protection mechanism must not depend on attacker ignorance • Security by obscurity doesn’t halt attacks; thorough review makes code more secure • BUT – – – OSS developers/reviewers need security knowledge The code must be reviewed Problems must be fixed
  • 17. Myth: Proprietary is Always More Secure Reality: Open Design is a Security Advantage • Borland InterBase/Firebird Back Door – – – – user: politically, password: correct Hidden for 7 years in proprietary product Found after release as OSS in 5 months Unclear if malicious, but has its form
  • 18. Myth: OSS is Unsupported Reality: OSS is Commercially Supported • Businesses support OSS! – WSO2, Red Hat, Novell, HP, IBM, DMSolutions, SourceLabs, OpenLogic, Carahsoft, ... • Average OSS developer 30yrs old, 11yrs experience • OSS doe not mean no cost – – Training, support, transition, etc. are not free-of-cost Competition often produces lower TCO & higher ROI for OSS
  • 19. Some US Government OSS Policies • OMB policy “Technology Neutrality” (2011-01-07) – – “agencies should analyze alternatives that include… open source” Updates OMB-04-16 (2004-07-01) = OSS okay in federal government • DOD policy “Clarifying guidance regarding Open Source Software (OSS)” + FAQ (2009-10-16) – – Makes clear OSS can be used, counters misconceptions Updates May 2003 memo • Consumer Financial Protection Bureau’s Source Code Policy – – – Released 2012-04, reuses DoD 2009 policy Two parts, “use of external OSS” & “Redistribution” http://www.consumerfinance.gov/developers/sourcec odepolicy/ • cendi.gov, e.g., “Frequently Asked Questions about Copyright and Computer Software” http://www.cendi.gov/publications/09-1FAQ_OpenSo
  • 20.
  • 21. The Big 5 • Transformation and Integration of Legacy Systems • Integration and Exploitation of Heterogeneous Data Sources • Secure Multi-Level Information Sharing • Optimizing Certification and Accreditation Activities • Modernization and Automation of Software Verification and Validation
  • 23. Transformation Solution Concept Collapse multiple components into a single, distributed, service oriented system Targ etin g App Rou ting App Thr eat Anal ysis App Miss ion Plan ning App ISR App Task ing APP Enterprise Integration Platform
  • 26. Integration of Heterogeneous Data Sources Consuming System, Service or Application WSO2 Data Services Server (“DAL in a Box”) HTTP HTTPS JMS SMTP FTP FTPS SFTP TCP SQL NoSQ L CS V OD S RD F We b Pag e
  • 28. Optimizing Certification and Accreditation Where C&A Fits in the Process Today Dream It Plan It Build It Test It Submit to C&A PANIC! PANIC! Receive C&A Results Spend Lots of $ and Time
  • 29. Optimizing Certification and Accreditation Front End Loading C&A Continuous Continuous Deployment Deployment Project and Project and Team Team Management Management Software Software development workflow workflow Governance Governance and and Compliance Compliance Test Test Automation Automation Continuous Integration Integration Development Dashboards Dashboards Continuous Continuous Build Build Develop Code Source Control Source Control Issue Tracking Issue Tracking
  • 31. Modernizing Verification and Validation Only the Audience Changes Continuous Continuous Deployment Deployment Project and Project and Team Team Management Management Software Software development workflow workflow Governance Governance and and Compliance Compliance Test Test Automation Automation Continuous Integration Integration Development Dashboards Dashboards Continuous Continuous Build Build Develop Code Source Control Source Control Issue Tracking Issue Tracking
  • 32.
  • 33. It’s a Dangerous Cyber World, Folks
  • 34. The Most Dangerous Threat is Still the Insider
  • 36. A Quick Recap • Open source is commercial software and fully applicable to defense, intelligence and other government requirements • Open source effectively responds to today’s top government IT challenges • Open source can mitigate today’s key cybersecurity threats
  • 37.
  • 38. Contact • Adam Firestone – – – – Director of Solutions WSO2 Federal Systems 703-879-5176 adam@wso2federal.com