SlideShare a Scribd company logo
Weapons Free!

Open Source Solutions to Programmatic and Operational Challenges
Faced by the Defense and Intelligence Communities in the Age of
Sequestration

Prepared for WSO2Con 2013
Prepared by
Adam Firestone
Director of Solutions
WSO2 Federal Systems, Inc.
Weapons Free
• Weapons Control Status
–

The three levels of weapons control status (WCS) outline the
conditions, based on target identification criteria, under which
friendly elements may engage. The commander sets and
adjusts the weapons control status based on friendly and
enemy disposition. In general, a more restrictive WCS relates
to a higher probability of fratricide. The three levels, in
descending order of restriction, are-●

●

●

WEAPONS HOLD (Engage only if engaged or ordered to
engage)
WEAPONS TIGHT (Engage only targets positively identified
as enemy)
WEAPONS FREE (Engage any targets not positively
identified as friendly)

• From US Army Field Manual 3-21.10
Agenda
• Legal and Policy Basis for
Government Use of Open
Source Software
• Open Source and the Big 5
Government IT Challenges
• Open Source Cybersecurity
It Isn’t Shareware.com!
• Many misconceptions about open
source software (OSS); a few
examples:
–
–
–
–

“It’s a security risk.”
“I need a commercial product. This
isn’t commercial!”
“It’s a threat to innovation!”
“The use of OSS is contrary to DoD
information assurance regulations.”
All in the Name of
Liberty

• OSS freedoms:
–
–
–
–

Run the software for any
purpose
Study the software
Modify the software
Freely redistribute copies
of the original or modified
software without royalties
to the original author
A Rose by Any Other
Name
• Synonyms
–
–
–
–

Free software
Libre software
Free and open source software
(FOSS)
Free-libre open source software
(FLOSS)

• Antonyms
–
–

Proprietary software
Closed software
Why SHOULD the
Government Use OSS?
• Lower risk
–

Possibility of detailed evaluation when
you have the source code

• Lower TCO
–
–
–

Freely distributable at no additional cost
Shared development costs
Freedom from vendor lock-in

• Fit for purpose
–

Can be modified for special purposes and
to counter attacks
Comparing GOTS,
Proprietary Software
and OSS
Support
Strategy

Cost

Flexibility

Risks

GOTS

High

High

Become obsolescent
(government bears all
costs & can’t afford
them)

Proprietary

Medium Low
*

Abandonment & *high
cost if monopoly

OSS

Low*

* Can be as costly as
GOTS if fail to
build/work with
developer community

High
DoD OSS Policy Memo
(16 OCT 2009)
a. In almost all cases, OSS meets the definition of “commercial
computer software” and shall be given appropriate statutory
preference in accordance with 10 USC 2377…
b. Executive agencies, including the DoD, are required to conduct
market research [which should] include OSS… There are
positive aspects of OSS that should be considered…
c. DoDI8500.2 control “DCPD-1 Public Domain Software Controls,”
doesn’t forbid the use of OSS
d. Ensure that the plan for software support (e.g., commercial or
Government program office support) is adequate for mission
need.
e. Government is not always obligated to distribute the source
code of any modified OSS to the public
DoD OSS Policy Memo
(16 OCT 2009)
e. Software source code and associated design documents
are “data”… and therefore shall be shared across the DoD
as widely as possible
f. Software items, including code fixes and enhancements,
developed for the Government should be released to the
public (such as under an open source license) when:
–

–
–

The project manager, program manager, or other comparable
official determines that it is in the Government’s interest to do
so, such as through the expectation of future enhancements
by others.
The Government has the rights to reproduce and release the
item, and to authorize others to do so.
The public release of the item is not restricted by other law or
regulation
Myth: OSS is not Commercial
Software
Reality: OSS is Commercial
• Nearly all OSS are commercial items
• U.S. Law (41 USC 403), FAR, & DFARS
–

Commercial item is:
●
(1) Any item, other than real property, that
is of a type customarily used by the general
public or by non-governmental entities for
purposes [not government-unique], and
–
–

–

(i) Has been sold, leased, or licensed to the
general public; or
(ii) Has been offered for sale, lease, or
license to the general public...

Intentionally broad; "enables the Government
to take greater advantage of the commercial
marketplace” [DoD AT&L]
Myth: OSS is not Commercial
Software
Reality: OSS is Commercial
• U.S. Law (41 USC 403), FAR, DFARS
require preference of commercial
items (inc. COTS) & NDI:
–

Agencies must
●
(a) Conduct market research to
determine [if] commercial items or
nondevelopmental items are
available …
●
(b) Acquire [them when available]
●
(c) Require prime contractors and
subcontractors at all tiers to
incorporate, to the maximum extent
practicable, [them] as
Myth: OSS Conflicts with DoD
IA Policy
Reality: DoD IA Policy
Supports OSS

• DoDI 8500.2 DCPD-1 "Public Domain Software Controls” is
often misinterpreted
–

–

People read THIS:
●
“Binary or machine executable ... software products and other
software products with limited or no warranty such as those
commonly known as freeware or shareware are not [to be] used
in DoD information systems ...”
But forget to read the SECOND PARAGRAPH
●
“[because they’re] difficult or impossible to review, repair, or
extend, given that the Government does not have access to the
original source code and there is no owner who could make
such repairs on behalf of the Government.”

• Doesn’t apply to OSS! The source code is available!
Myth: Proprietary is Always More Secure
Reality: Open Design is a Security Advantage

• Saltzer & Schroeder [1974/1975] - Open
design principle
–

the protection mechanism must not depend on
attacker ignorance

• Security by obscurity doesn’t halt attacks;
thorough review makes code more secure
• BUT
–
–
–

OSS developers/reviewers need security
knowledge
The code must be reviewed
Problems must be fixed
Myth: Proprietary is Always More Secure
Reality: Open Design is a Security Advantage

• Borland InterBase/Firebird Back Door
–
–
–
–

user: politically, password: correct
Hidden for 7 years in proprietary
product
Found after release as OSS in 5 months
Unclear if malicious, but has its form
Myth: OSS is Unsupported
Reality: OSS is Commercially
Supported
• Businesses support OSS!
–

WSO2, Red Hat, Novell, HP, IBM,
DMSolutions, SourceLabs, OpenLogic,
Carahsoft, ...

• Average OSS developer 30yrs old,
11yrs experience
• OSS doe not mean no cost
–
–

Training, support, transition, etc. are
not free-of-cost
Competition often produces lower TCO
& higher ROI for OSS
Some US Government OSS
Policies
• OMB policy “Technology Neutrality” (2011-01-07)
–
–

“agencies should analyze alternatives that include…
open source”
Updates OMB-04-16 (2004-07-01) = OSS okay in
federal government

• DOD policy “Clarifying guidance regarding Open
Source Software (OSS)” + FAQ (2009-10-16)
–
–

Makes clear OSS can be used, counters
misconceptions
Updates May 2003 memo

• Consumer Financial Protection Bureau’s Source
Code Policy
–
–
–

Released 2012-04, reuses DoD 2009 policy
Two parts, “use of external OSS” & “Redistribution”
http://www.consumerfinance.gov/developers/sourcec
odepolicy/

• cendi.gov, e.g., “Frequently Asked Questions about
Copyright and Computer Software”
http://www.cendi.gov/publications/09-1FAQ_OpenSo
The Big 5
• Transformation and Integration of
Legacy Systems
• Integration and Exploitation of
Heterogeneous Data Sources
• Secure Multi-Level Information
Sharing
• Optimizing Certification and
Accreditation Activities
• Modernization and Automation of
Software Verification and Validation
Transformation

Comma
nd
Authorit
y

Routing
System

Targetin
g
System
Proprietary
Message
Format

Unstructure
d

U
S

A
T
S

Weapon

N
U
22

Proprietary
Message
Format

N
I

B
A

E
L
Plannin
g
System

Proprietary
Message
Format

Delivery
Platform

Proprietar
y
Message
Format
Transformation Solution
Concept
Collapse multiple components into a single,
distributed, service oriented system

Targ
etin
g
App

Rou
ting
App

Thr
eat
Anal
ysis
App

Miss
ion
Plan
ning
App

ISR
App

Task
ing
APP

Enterprise
Integration
Platform
Transformation Solution
Components
Enterprise Integration
Platform
Transformation Solution
Architecture
Integration of Heterogeneous
Data Sources
Consuming System, Service or Application

WSO2 Data Services Server
(“DAL in a Box”)
HTTP
HTTPS
JMS
SMTP
FTP
FTPS
SFTP
TCP

SQL

NoSQ
L

CS
V

OD
S

RD
F

We
b
Pag
e
Secure Multilevel Information
Sharing
Optimizing Certification and
Accreditation
Where C&A Fits in the Process Today
Dream
It
Plan It
Build It
Test It
Submit
to C&A
PANIC!

PANIC!

Receive
C&A
Results

Spend
Lots of
$ and
Time
Optimizing Certification and
Accreditation
Front End Loading C&A
Continuous
Continuous
Deployment
Deployment

Project and
Project and
Team
Team
Management
Management

Software
Software
development
workflow
workflow

Governance
Governance
and
and
Compliance
Compliance

Test
Test
Automation
Automation

Continuous
Integration
Integration

Development
Dashboards
Dashboards

Continuous
Continuous
Build
Build

Develop Code

Source Control
Source Control

Issue Tracking
Issue Tracking
Modernizing Verification and
Validation
Modernizing Verification and
Validation
Only the Audience Changes
Continuous
Continuous
Deployment
Deployment

Project and
Project and
Team
Team
Management
Management

Software
Software
development
workflow
workflow

Governance
Governance
and
and
Compliance
Compliance

Test
Test
Automation
Automation

Continuous
Integration
Integration

Development
Dashboards
Dashboards

Continuous
Continuous
Build
Build

Develop Code

Source Control
Source Control

Issue Tracking
Issue Tracking
It’s a Dangerous Cyber
World, Folks
The Most Dangerous
Threat is Still the Insider
Managing the Insider
Threat
A Quick Recap
• Open source is commercial software
and fully applicable to defense,
intelligence and other government
requirements
• Open source effectively responds to
today’s top government IT
challenges
• Open source can mitigate today’s
key cybersecurity threats
Contact
• Adam Firestone
–
–
–
–

Director of Solutions
WSO2 Federal Systems
703-879-5176
adam@wso2federal.com
Thank You

More Related Content

Similar to WSO2Con US 2013 - Weapons Free: Open Source Solutions to Programmatic and Operational Challenges Faced by the Defense and Intelligence Communities in the Age of Sequestration

Open Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and SecurityOpen Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and Security
Joshua L. Davis
 
Open source software in government challenges and opportunities
Open source software in government challenges and opportunitiesOpen source software in government challenges and opportunities
Open source software in government challenges and opportunities
Luke Fretwell
 
Reaching It's Potential: How to Make Government-Developed OSS A Major Player
Reaching It's Potential: How to Make Government-Developed OSS A Major PlayerReaching It's Potential: How to Make Government-Developed OSS A Major Player
Reaching It's Potential: How to Make Government-Developed OSS A Major Player
Joshua L. Davis
 
Reaching its Potential: Making Government Developed OSS a Major Player
Reaching its Potential: Making Government Developed OSS a Major PlayerReaching its Potential: Making Government Developed OSS a Major Player
Reaching its Potential: Making Government Developed OSS a Major Player
Delta3D
 
Oss healthcare
Oss healthcareOss healthcare
Oss healthcare
Carlo Daffara
 
FOSS and Open Standards for Digital Sovereignty
FOSS and Open Standards for Digital SovereigntyFOSS and Open Standards for Digital Sovereignty
FOSS and Open Standards for Digital Sovereignty
LibreItalia
 
Barcamp: Open Source and Security
Barcamp: Open Source and SecurityBarcamp: Open Source and Security
Barcamp: Open Source and Security
Joshua L. Davis
 
3 page paper due tomorrow.pdf
3 page paper due tomorrow.pdf3 page paper due tomorrow.pdf
3 page paper due tomorrow.pdf
sdfghj21
 
Floss
FlossFloss
AV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons LearnedAV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons Learned
Stanford University
 
H4d DOD 101 workshop 040516
H4d DOD 101 workshop 040516H4d DOD 101 workshop 040516
H4d DOD 101 workshop 040516
Stanford University
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companies
iasaglobal
 
Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...
Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...
Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...
Cloudera, Inc.
 
OSS - enterprise adoption strategy and governance
OSS -  enterprise adoption strategy and governanceOSS -  enterprise adoption strategy and governance
OSS - enterprise adoption strategy and governance
Prabir Kr Sarkar
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference Keynote
SandraPaiva
 
Developing a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP ConsiderationsDeveloping a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP Considerations
ipspat
 
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Mike Linksvayer
 
Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...
Mary Lou Wakimura
 
Legal interoperability: glocal perspective (LAPSI, Torino)
Legal interoperability: glocal perspective (LAPSI, Torino)Legal interoperability: glocal perspective (LAPSI, Torino)
Legal interoperability: glocal perspective (LAPSI, Torino)
Federico Morando
 
Security - sophos-nist-compliance-card.pdf
Security - sophos-nist-compliance-card.pdfSecurity - sophos-nist-compliance-card.pdf
Security - sophos-nist-compliance-card.pdf
JohanGunawan13
 

Similar to WSO2Con US 2013 - Weapons Free: Open Source Solutions to Programmatic and Operational Challenges Faced by the Defense and Intelligence Communities in the Age of Sequestration (20)

Open Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and SecurityOpen Source Software (OSS/FLOSS) and Security
Open Source Software (OSS/FLOSS) and Security
 
Open source software in government challenges and opportunities
Open source software in government challenges and opportunitiesOpen source software in government challenges and opportunities
Open source software in government challenges and opportunities
 
Reaching It's Potential: How to Make Government-Developed OSS A Major Player
Reaching It's Potential: How to Make Government-Developed OSS A Major PlayerReaching It's Potential: How to Make Government-Developed OSS A Major Player
Reaching It's Potential: How to Make Government-Developed OSS A Major Player
 
Reaching its Potential: Making Government Developed OSS a Major Player
Reaching its Potential: Making Government Developed OSS a Major PlayerReaching its Potential: Making Government Developed OSS a Major Player
Reaching its Potential: Making Government Developed OSS a Major Player
 
Oss healthcare
Oss healthcareOss healthcare
Oss healthcare
 
FOSS and Open Standards for Digital Sovereignty
FOSS and Open Standards for Digital SovereigntyFOSS and Open Standards for Digital Sovereignty
FOSS and Open Standards for Digital Sovereignty
 
Barcamp: Open Source and Security
Barcamp: Open Source and SecurityBarcamp: Open Source and Security
Barcamp: Open Source and Security
 
3 page paper due tomorrow.pdf
3 page paper due tomorrow.pdf3 page paper due tomorrow.pdf
3 page paper due tomorrow.pdf
 
Floss
FlossFloss
Floss
 
AV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons LearnedAV Combinator H4D 2020 Lessons Learned
AV Combinator H4D 2020 Lessons Learned
 
H4d DOD 101 workshop 040516
H4d DOD 101 workshop 040516H4d DOD 101 workshop 040516
H4d DOD 101 workshop 040516
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companies
 
Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...
Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...
Hadoop World 2011: The Hadoop Award for Government Excellence - Bob Gourley -...
 
OSS - enterprise adoption strategy and governance
OSS -  enterprise adoption strategy and governanceOSS -  enterprise adoption strategy and governance
OSS - enterprise adoption strategy and governance
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference Keynote
 
Developing a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP ConsiderationsDeveloping a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP Considerations
 
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
 
Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...Strategies for Commercial Software Developers Using Open Source Code in Propr...
Strategies for Commercial Software Developers Using Open Source Code in Propr...
 
Legal interoperability: glocal perspective (LAPSI, Torino)
Legal interoperability: glocal perspective (LAPSI, Torino)Legal interoperability: glocal perspective (LAPSI, Torino)
Legal interoperability: glocal perspective (LAPSI, Torino)
 
Security - sophos-nist-compliance-card.pdf
Security - sophos-nist-compliance-card.pdfSecurity - sophos-nist-compliance-card.pdf
Security - sophos-nist-compliance-card.pdf
 

More from WSO2

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
WSO2
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
WSO2
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
WSO2
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
WSO2
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
WSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
WSO2
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2
 

More from WSO2 (20)

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 

Recently uploaded

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 

Recently uploaded (20)

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 

WSO2Con US 2013 - Weapons Free: Open Source Solutions to Programmatic and Operational Challenges Faced by the Defense and Intelligence Communities in the Age of Sequestration

  • 1. Weapons Free! Open Source Solutions to Programmatic and Operational Challenges Faced by the Defense and Intelligence Communities in the Age of Sequestration Prepared for WSO2Con 2013 Prepared by Adam Firestone Director of Solutions WSO2 Federal Systems, Inc.
  • 2. Weapons Free • Weapons Control Status – The three levels of weapons control status (WCS) outline the conditions, based on target identification criteria, under which friendly elements may engage. The commander sets and adjusts the weapons control status based on friendly and enemy disposition. In general, a more restrictive WCS relates to a higher probability of fratricide. The three levels, in descending order of restriction, are-● ● ● WEAPONS HOLD (Engage only if engaged or ordered to engage) WEAPONS TIGHT (Engage only targets positively identified as enemy) WEAPONS FREE (Engage any targets not positively identified as friendly) • From US Army Field Manual 3-21.10
  • 3. Agenda • Legal and Policy Basis for Government Use of Open Source Software • Open Source and the Big 5 Government IT Challenges • Open Source Cybersecurity
  • 4.
  • 5. It Isn’t Shareware.com! • Many misconceptions about open source software (OSS); a few examples: – – – – “It’s a security risk.” “I need a commercial product. This isn’t commercial!” “It’s a threat to innovation!” “The use of OSS is contrary to DoD information assurance regulations.”
  • 6. All in the Name of Liberty • OSS freedoms: – – – – Run the software for any purpose Study the software Modify the software Freely redistribute copies of the original or modified software without royalties to the original author
  • 7. A Rose by Any Other Name • Synonyms – – – – Free software Libre software Free and open source software (FOSS) Free-libre open source software (FLOSS) • Antonyms – – Proprietary software Closed software
  • 8. Why SHOULD the Government Use OSS? • Lower risk – Possibility of detailed evaluation when you have the source code • Lower TCO – – – Freely distributable at no additional cost Shared development costs Freedom from vendor lock-in • Fit for purpose – Can be modified for special purposes and to counter attacks
  • 9. Comparing GOTS, Proprietary Software and OSS Support Strategy Cost Flexibility Risks GOTS High High Become obsolescent (government bears all costs & can’t afford them) Proprietary Medium Low * Abandonment & *high cost if monopoly OSS Low* * Can be as costly as GOTS if fail to build/work with developer community High
  • 10. DoD OSS Policy Memo (16 OCT 2009) a. In almost all cases, OSS meets the definition of “commercial computer software” and shall be given appropriate statutory preference in accordance with 10 USC 2377… b. Executive agencies, including the DoD, are required to conduct market research [which should] include OSS… There are positive aspects of OSS that should be considered… c. DoDI8500.2 control “DCPD-1 Public Domain Software Controls,” doesn’t forbid the use of OSS d. Ensure that the plan for software support (e.g., commercial or Government program office support) is adequate for mission need. e. Government is not always obligated to distribute the source code of any modified OSS to the public
  • 11. DoD OSS Policy Memo (16 OCT 2009) e. Software source code and associated design documents are “data”… and therefore shall be shared across the DoD as widely as possible f. Software items, including code fixes and enhancements, developed for the Government should be released to the public (such as under an open source license) when: – – – The project manager, program manager, or other comparable official determines that it is in the Government’s interest to do so, such as through the expectation of future enhancements by others. The Government has the rights to reproduce and release the item, and to authorize others to do so. The public release of the item is not restricted by other law or regulation
  • 12.
  • 13. Myth: OSS is not Commercial Software Reality: OSS is Commercial • Nearly all OSS are commercial items • U.S. Law (41 USC 403), FAR, & DFARS – Commercial item is: ● (1) Any item, other than real property, that is of a type customarily used by the general public or by non-governmental entities for purposes [not government-unique], and – – – (i) Has been sold, leased, or licensed to the general public; or (ii) Has been offered for sale, lease, or license to the general public... Intentionally broad; "enables the Government to take greater advantage of the commercial marketplace” [DoD AT&L]
  • 14. Myth: OSS is not Commercial Software Reality: OSS is Commercial • U.S. Law (41 USC 403), FAR, DFARS require preference of commercial items (inc. COTS) & NDI: – Agencies must ● (a) Conduct market research to determine [if] commercial items or nondevelopmental items are available … ● (b) Acquire [them when available] ● (c) Require prime contractors and subcontractors at all tiers to incorporate, to the maximum extent practicable, [them] as
  • 15. Myth: OSS Conflicts with DoD IA Policy Reality: DoD IA Policy Supports OSS • DoDI 8500.2 DCPD-1 "Public Domain Software Controls” is often misinterpreted – – People read THIS: ● “Binary or machine executable ... software products and other software products with limited or no warranty such as those commonly known as freeware or shareware are not [to be] used in DoD information systems ...” But forget to read the SECOND PARAGRAPH ● “[because they’re] difficult or impossible to review, repair, or extend, given that the Government does not have access to the original source code and there is no owner who could make such repairs on behalf of the Government.” • Doesn’t apply to OSS! The source code is available!
  • 16. Myth: Proprietary is Always More Secure Reality: Open Design is a Security Advantage • Saltzer & Schroeder [1974/1975] - Open design principle – the protection mechanism must not depend on attacker ignorance • Security by obscurity doesn’t halt attacks; thorough review makes code more secure • BUT – – – OSS developers/reviewers need security knowledge The code must be reviewed Problems must be fixed
  • 17. Myth: Proprietary is Always More Secure Reality: Open Design is a Security Advantage • Borland InterBase/Firebird Back Door – – – – user: politically, password: correct Hidden for 7 years in proprietary product Found after release as OSS in 5 months Unclear if malicious, but has its form
  • 18. Myth: OSS is Unsupported Reality: OSS is Commercially Supported • Businesses support OSS! – WSO2, Red Hat, Novell, HP, IBM, DMSolutions, SourceLabs, OpenLogic, Carahsoft, ... • Average OSS developer 30yrs old, 11yrs experience • OSS doe not mean no cost – – Training, support, transition, etc. are not free-of-cost Competition often produces lower TCO & higher ROI for OSS
  • 19. Some US Government OSS Policies • OMB policy “Technology Neutrality” (2011-01-07) – – “agencies should analyze alternatives that include… open source” Updates OMB-04-16 (2004-07-01) = OSS okay in federal government • DOD policy “Clarifying guidance regarding Open Source Software (OSS)” + FAQ (2009-10-16) – – Makes clear OSS can be used, counters misconceptions Updates May 2003 memo • Consumer Financial Protection Bureau’s Source Code Policy – – – Released 2012-04, reuses DoD 2009 policy Two parts, “use of external OSS” & “Redistribution” http://www.consumerfinance.gov/developers/sourcec odepolicy/ • cendi.gov, e.g., “Frequently Asked Questions about Copyright and Computer Software” http://www.cendi.gov/publications/09-1FAQ_OpenSo
  • 20.
  • 21. The Big 5 • Transformation and Integration of Legacy Systems • Integration and Exploitation of Heterogeneous Data Sources • Secure Multi-Level Information Sharing • Optimizing Certification and Accreditation Activities • Modernization and Automation of Software Verification and Validation
  • 23. Transformation Solution Concept Collapse multiple components into a single, distributed, service oriented system Targ etin g App Rou ting App Thr eat Anal ysis App Miss ion Plan ning App ISR App Task ing APP Enterprise Integration Platform
  • 26. Integration of Heterogeneous Data Sources Consuming System, Service or Application WSO2 Data Services Server (“DAL in a Box”) HTTP HTTPS JMS SMTP FTP FTPS SFTP TCP SQL NoSQ L CS V OD S RD F We b Pag e
  • 28. Optimizing Certification and Accreditation Where C&A Fits in the Process Today Dream It Plan It Build It Test It Submit to C&A PANIC! PANIC! Receive C&A Results Spend Lots of $ and Time
  • 29. Optimizing Certification and Accreditation Front End Loading C&A Continuous Continuous Deployment Deployment Project and Project and Team Team Management Management Software Software development workflow workflow Governance Governance and and Compliance Compliance Test Test Automation Automation Continuous Integration Integration Development Dashboards Dashboards Continuous Continuous Build Build Develop Code Source Control Source Control Issue Tracking Issue Tracking
  • 31. Modernizing Verification and Validation Only the Audience Changes Continuous Continuous Deployment Deployment Project and Project and Team Team Management Management Software Software development workflow workflow Governance Governance and and Compliance Compliance Test Test Automation Automation Continuous Integration Integration Development Dashboards Dashboards Continuous Continuous Build Build Develop Code Source Control Source Control Issue Tracking Issue Tracking
  • 32.
  • 33. It’s a Dangerous Cyber World, Folks
  • 34. The Most Dangerous Threat is Still the Insider
  • 36. A Quick Recap • Open source is commercial software and fully applicable to defense, intelligence and other government requirements • Open source effectively responds to today’s top government IT challenges • Open source can mitigate today’s key cybersecurity threats
  • 37.
  • 38. Contact • Adam Firestone – – – – Director of Solutions WSO2 Federal Systems 703-879-5176 adam@wso2federal.com