<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=943711159418669&amp;ev=PageView&amp;noscript=1">

Maintaining Military Advantage at the Pace of DevSecOps

By Tara McLaughlin

Tara McLaughlin

Tara McLaughlin - 1 September 2020

Today’s modern military relies greatly on advanced technologies in its weaponry and operations to appropriately protect against adversaries. While these technologies enable strategic military advantages, the digital age has also created challenges for our warfighters.

A successful cyber-attack on any military system not only limits agency effectiveness and narrows the likelihood of achieving its missions, but it poses the threat for loss of life.

With such high stakes, information technology and cybersecurity leaders within military organizations and their partners are facing growing pressure to protect the nation’s interests and our men and women in uniform.

In its 2018 Cyber Strategy[1], the Department of Defense highlighted the need to innovate faster and better than adversaries who have already begun to invest in artificial intelligence and machine learning. Though agencies have worked diligently to protect their systems with defined parameters, the path towards multi-cloud environments requires security practices to adapt.

A 2020 Cloud Security Report[2] found that 33% of cybersecurity professionals across multiple industries, including government, listed “visibility into infrastructure security” as a critical issue.

To provide better security and close the visibility gap, controls need to be baked into the system earlier in the development cycle through adoption of DevSecOps.

In an effort to enact its 2018 Cyber Strategy and implement recommendations from the Defense Science Board, the Department of Defense recently announced requirements for the Pentagon and its contractors to shift away from traditional waterfall practices and direct funds to support DevSecOps environments.

However, for security to successfully keep pace with DevOps, introducing automated tools is key, and when the safety of the nation depends on your software, not just any automation tool will do.

Eggplant stands ready in supporting military organizations in balancing speed and security to diminish its attack surface.

Our non-invasive Digital Automation Intelligence platform has no impact on systems under test, complying with zero trust policies to ensure the privacy of high stakes technology in the testing process.

Rapid development and release of software is critical in remaining a step ahead of strategic competitors; with Eggplant, military organizations can ensure that its warfighters are harnessing the latest technologies without threat to their safety.

But don’t just take my word for it; check out our latest webinar, How to Attain a DevSecOps Utopia, delivered by John Hogan, Eggplant’s VP of Sales for Defense & Aerospace, and Warren Henderson, our Principal Technical Architect to learn more.

Or view our eBook, The Methodology and Tools for Testing in Regulated Environments.

[1] https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF

[2] https://www.cybersecurity-insiders.com/portfolio/2020-cloud-secuity-report-isc2/