DevSecOps Movement Expanding Rapidly Throughout DOD

DevSecOps helps military service branches and the Department of Homeland Security (DHS) secure software applications against software vulnerabilities like Log4j, but prioritization is still a challenge as software development ramps up.
Approaching software development from a security-first mindset can be a difficult culture transition for some teams. A helpful tool for the Army Software Factory is the Army’s DevSecOps playbook.
Hannah Hunt, chief product and innovation officer at the Army Software Factory, said the factory recently launched its fifth application.
“The process itself is that we have security advocates whose sole job is to enable the success of the application teams to understand what security controls they need to maintain in order to go to production,” Hunt said during the ATARC Securing Modern Application with DevSecOps event this week. “There’s a very tight feedback loop with security. They are developers with a security mindset so they know what needs to be built in order to be secure.”
Matthew Huston, CISO for Platform One under the Air Force, said upskilling and empowering workers to handle modern software challenges helps position the Air Force with a stronger DevSecOps posture.
“As we’ve really been taking this DevSecOps movement the last five years, we have pulled up people from just coming in being basic engineers that had tremendous talent and then put them in key leadership positions to really help further along our efforts,” Huston said. “We are also working with the DOD CIO office to establish different policies that we can push out and get the policies rewritten so they can support modern development.”
DevSecOps has changed the way agencies develop security strategies.
United States Citizenship and Immigration Services (USCIS) approached DevSecOps from several different angles. First, the agency developed specialized information security officers embedded in their development teams. These leaders were required to have backgrounds in coding and cloud plus accreditations in these areas.
Shane Barney, USCIS CISO, said the agency also gave development teams the ability to initiate things on their own and empowered them to deploy.
“We had to modernize our overall approach to cybersecurity, and we needed to stop focusing on known risks and automate those out of the way and start refocusing back on things we don’t know about, like SolarWinds, Log4j — because that’s where the ‘gotchas’ were going to come from and that’s where we were going to hurt,” he said during the ATARC event.
Leadership buy-in can make or break DevSecOps implementation plans. At the Air Force, consistent communication between software development and security teams and upper leadership is key.
“Getting leadership that understands what’s coming through, the security people understanding the developers, but then also the developers understanding what the security controls are and that way they can actually provide meaningful mitigations and I think that’s huge,” Huston said.
Zero trust principles also play an important role in DevSecOps implementation.
Ian Anderson, lead DevSecOps engineer of secure cloud architecture and automation at the Navy, said federal agencies should think about zero trust from the perspective of the end user.
“What does it need to do, does it need to read a file or does it need the more elevated admin privileges? It’s not just, ‘let’s implement this and everyone gets a key and it will authenticate,’” Anderson said. “You really have to look at it down to the permissions that these things need, so that way if something is compromised, you’re not giving away the whole network.”
The Army and the Air Force believe prioritization will be a major challenge they will both face in 2022.
“Radical prioritization is always a challenge,” Hunt said. “There are many fun and interesting things to do in the DevSecOps space, and you have to make sure your teams are not overwhelmed and can prioritize the workloads that will meet the users they intend to meet.”
Part of the prioritization challenge is sifting through emerging technologies and DevSecOps methods to identify ones that serve the mission.
“Prioritization is huge,” Huston said. “There are also still gaps that we’re looking to fill. We have developed many [continuous improvement] environments that are far superior to what our legacy processes were, but I think there is still more to come. I would love to see more chaos engineering and how we can automate that, more performance testing that we can embed in our different pipelines and help close the gap on some of the other feature sets that are great practices when it comes to software development.”
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
Navy Memo Maps Tech Priorities for the Future Fight
Acting CTO’s memo outlines critical investment areas, from AI and quantum to cyber and space, as part of an accelerated modernization push.
5m read -
DOD Can No Longer Assume Superiority in Digital Warfare, Officials Warn
The DOD must make concerted efforts to address cyber vulnerabilities to maintain the tactical edge, military leaders said at HammerCon 2025.
4m read -
New NSF Program Cultivates the Future of NextG Networks
The agency’s new VINES program looks to tackle key challenges like energy efficiency and future-proofing wireless tech.
21m watch -
Marine Corps Operation StormBreaker Slashes Software Delivery Timelines by 17x
New program aims to deliver critical digital capabilities to warfighters at the "speed of relevance" by overhauling traditional processes.
4m read -
Tracking CIOs in Trump's Second Term
Stay informed on the latest shifts in federal technology leadership as new CIOs are appointed and President Trump's second term takes shape.
6m read -
DHA CDAO Spearheads Master Data Catalog to Boost Transparency
Jesus Caban plans to boost DHA's data maturity through a new master data catalog, governance frameworks and inventory of tech tools.
5m read -
IHS Prepares to Deploy PATH EHR at Pilot Sites in 2026
IHS targets PATH EHR pilot in 2026, emphasizing governance, collaboration and interoperability as key pillars of the modernization strategy.
4m read -
Trump Orders Spark Government-Wide Acquisition Overhaul
As Trump pushes for a faster, simpler procurement system, agencies are leveraging AI and adapting strategies to meet new requirements.
5m read -
IRS Makes Direct File Code Public as Lawmakers Debate Program’s Fate
The agency sees the Direct File source code as beneficial to government digital services despite what happens with it in proposed budgets.
5m read -
Inside Oak Ridge National Lab’s Pioneer Approach to AI
Energy Department’s Oak Ridge National Lab transforms AI vulnerabilities into strategic opportunities for national defense.
22m listen -
A Look at Federal Zero Trust Transformation
Recent developments from CISA and DOD show how government is advancing zero trust quickly.
20m read -
Modernization Strategies to Enable Energy Innovation
Lawrence Berkeley National Lab and Maximus experts explore the modernization strategies driving digital transformation and operational resilience within the energy sector.
33m watch