{"id":32674,"date":"2017-07-25T16:43:49","date_gmt":"2017-07-25T20:43:49","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/federal-cloud-computing-techtarget.php"},"modified":"2017-07-25T16:43:49","modified_gmt":"2017-07-25T20:43:49","slug":"federal-cloud-computing-techtarget","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/open-source-software\/federal-cloud-computing-techtarget.php","title":{"rendered":"Federal Cloud Computing &#8211; TechTarget"},"content":{"rendered":"<p><p>    The following is an excerpt from Federal Cloud Computing    by author Matthew Metheny and published by Syngress. This    section from chapter three explores open source software in the    federal government.  <\/p>\n<p>    Open source software (OSS) and cloud computing are distinctly    different concepts that have independently grown in use, both    in the public and private sectors, but have each faced adoption    challenges by federal agencies. Both OSS and cloud computing    individually offer potential benefits for federal agencies to    improve their efficiency, agility, and innovation, by enabling    them to be more responsive to new or changing requirements in    their missions and business operations. OSS improves the way    the federal government develops and also distributes software    and provides an opportunity to reduce costs through the reuse    of existing source code, whereas cloud computing improves the    utilization of resources and enables a faster service delivery.  <\/p>\n<p>    In this chapter, issues faced by OSS in the federal government    will be discussed, in addition to the relationship of the    federal government's adoption of cloud computing technologies.    However, this chapter does not present a differentiation of OSS    from proprietary software, rather focuses on highlighting the    importance of the federal government's experience with OSS in    the adoption of cloud computing.  <\/p>\n<p>    Over the years, the private sector has encouraged the federal    government to consider OSS by making a case that it offers an    acceptable alternative to proprietary commercial off-the-shelf    (COTS) software. Regardless of the potential cost-saving    benefits of OSS, federal agencies have historically approached    it with cautious interest. Although, there are other potential    issues in transitioning from an existing proprietary software,    beyond cost. These issues include, a limited in-house skillset    for OSS developers within the federal workforce, a lack of    knowledge regarding procurement or licensing, and the    misinterpretation of acquisition and security policies and    guidance. Although some of the challenges and concerns have    limited or slowed a broader-scale adoption of OSS, federal    agencies have become more familiar with OSS and the marketplace    expansion of available products and services, having made    considerations for OSS as a viable alternative to    enterprise-wide COTS software. This renewed shift to move    toward OSS is also being driven by initiatives such as the 18F    and the US Digital Service, and the publication of the guidance    such as the Digital Services Playbook, which urges federal    agencies to \"consider using open source, cloud based, and    commodity solutions across the technology stack\".  <\/p>\n<p>    Interoperability, portability, and security standards have    already been identified as critical barriers for cloud adoption    within the federal government. OSS facilitates overcoming    standards obstacles through the development and implementation    of open standards. OSS communities support standards    development through the \"shared\" development and industry    implementation of open standards. In some instances, the    federal government's experience with standards development has    enabled the acceptance and use of open standards-based, open    source technologies and platforms.  <\/p>\n<p>    The federal government's use of OSS has its beginning in the    1990s. During this period, OSS was used primarily within the    research and scientific community where collaboration and    information sharing was a cultural norm. However, it was not    until 2000 that federal agencies began to seriously consider    the use of OSS as a model for accelerating innovation within    the federal government. As illustrated in Fig. 3.1, the federal    government has developed a list of OSS-related studies,    policies, and guidelines that have formed the basis for the    policy framework that has guided the adoption of OSS. This    framework tackles critical issues that have inhibited the    federal government from attaining the full benefits offered by    OSS. Although gaps still exist in specific guidelines relating    to the evaluation, contribution, and sharing of OSS, the policy    framework serves as a foundation for guiding federal agencies    in the use of OSS. In this section, we will explore the policy    framework with the objective of describing how the current    policy framework has led to the broader use of OSS across the    federal government, and more importantly how this framework has    enabled the federal government's adoption of cloud computing by    overcoming the challenges with acquisition and security that    will be discussed in detail in the next section.  <\/p>\n<p>    The President's Information Technology Advisory Committee    (PITAC), which examined OSS, was given the goal of:  <\/p>\n<p>    The PITAC published a report concluding that the use of the    open source development model (also known as the Bazaar model)    was a viable strategy for producing high-quality software    through a mixture of public, private, and academic    partnerships. In addition, as presented in Table 3.1, the    report also highlighted several advantages and challenges. Some    of these key issues have been at the forefront of the federal    government's adoption of OSS.  <\/p>\n<p>    Over the years since the PITAC report, the federal government    has gained significant experience in both sponsoring and    contributing to OSS projects. For example, one of the most    widely recognized contributions by the federal government    specifically related to security is the Security Enhanced Linux    (SELinux) project. The SELinux project focused on improving the    Linux kernel through the development of a reference    implementation of the Flask security architecture for flexible    mandatory access control (MAC). In 2000, the National Security    Agency (NSA) made the SELinux available to the Linux community    under the terms of the GNU's Not Unix (GNU) General Public    License (GPL).  <\/p>\n<p>    Starting in 2001, the MITRE Corporation, for the US Department    of Defense (DoD), published a report42 that built a business    case for the DoD's use of OSS. The business case discussed both    the benefits and risks for considering OSS. In MITRE's    conclusion, OSS offered significant benefits to the federal    government, such as improved interoperability, increased    support for open standards and quality, lower costs, and    agility through reduced development time. In addition, MITRE    highlighted issues and risks, recommending any consideration of    OSS should be carefully reviewed.  <\/p>\n<p>    Shortly after the MITRE report, the federal government began to    establish specific policies and guidance to help clarify issues    around OSS. The DoD Chief Information Officer (CIO) published    the Department's first official DoD-wide memorandum to    reiterate existing policy and to provide clarifying guidance on    the acquisition, development, and the use of OSS within the DoD    community. Soon after the DoD policy, the Office of Management    and Budget (OMB) established a memorandum to provide    government-wide policy regarding acquisition and licensing    issues.  <\/p>\n<p>    Since 2003, there were multiple misconceptions, specifically    within the DoD, regarding the use of OSS. Therefore, in 2007,    the US Department of the Navy (DON) CIO released a memorandum    that clarified the classification of OSS and directed the    Department to identify areas where OSS can be used within the    DON's IT portfolio. This was followed by another DoD-wide    memorandum in 2009, which provided DoD-wide guidance and    clarified the use and development of OSS, including explaining    the potential advantages of the DoD reducing the development    time for new software, anticipating threats, and response to    continual changes in requirements.  <\/p>\n<p>    In 2009, OMB released the Open Government Directive, which    required federal agencies to develop and publish an Open    Government Plan on their websites. The Open Government Plan    provided a description on how federal agencies would improve    transparency and integrate public participation and    collaboration. As an example response to the directive support    for openness, the National Aeronautics and Space Administration    (NASA), in furtherance of its Open Government Plan, released    the \"open. NASA\" site that was built completely using OSS, such    as the LAMP stack and the WordPress content management system    (CMS).  <\/p>\n<p>    On May 23, 2012, the White House released the Digital    Government Strategy that complements other initiatives and    established principles for transforming the federal government.    More specifically, the strategy outlined the need for a \"Shared    Platform\" approach. In this approach, the federal government    would need to leverage \"sharing\" of resources such as the \"use    of open source technologies that enable more sharing of data    and make content more accessible\".  <\/p>\n<p>    The Second Open Government Action Plan established an action to    develop an OSS policy to improve access by federal agencies to    custom software to \"fuel innovation, lower costs, and benefit    the public\". In August 2016, the White House published the    Federal Source Code Policy, which is consistent with the    \"Shared Platform\" approach in the Digital Government's    Strategy, by requiring federal agencies make available custom    code as OSS. Further, the policy also made \"custom-developed    code available for Government-wide reuse and make their code    inventories discoverable at <a href=\"https:\/\/www.code.gov\" rel=\"nofollow\">https:\/\/www.code.gov<\/a> ('Code.gov')\".  <\/p>\n<p>    In this section, we discussed key milestones that have impacted    the federal government's cultural acceptance of OSS. It also    discussed the current policy framework that has been developed    through a series of policies and guidelines to support federal    agencies in the adoption of OSS and the establishment of    processes and policies to encourage and support the development    of OSS. The remainder of this chapter will examine the key    issues that have impacted OSS adoption and briefly examine the    role of OSS in the adoption of cloud computing within the    federal government.  <\/p>\n<\/p>\n<p>    About the author:  <\/p>\n<p>    Matthew Metheny, PMP, CISSP, CAP, CISA, CSSLP, CRISC, CCSK,    is an information security executive and professional with    twenty years of experience in the areas of finance management,    information technology, information security, risk management,    compliance programs, security operations and capabilities,    secure software development, security assessment and auditing,    security architectures, information security    policies\/processes, incident response and forensics, and    application security and penetration testing. He currently is    the Chief Information Security Officer and Director of Cyber    Security Operations at the Court Services and Offender    Supervision Agency (CSOSA), and is responsible for managing    CSOSA's enterprise-wide information security and risk    management program, and cyber security operations.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/searchsecurity.techtarget.com\/feature\/Federal-Cloud-Computing\" title=\"Federal Cloud Computing - TechTarget\">Federal Cloud Computing - TechTarget<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The following is an excerpt from Federal Cloud Computing by author Matthew Metheny and published by Syngress. This section from chapter three explores open source software in the federal government. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-32674","post","type-post","status-publish","format-standard","hentry","category-open-source-software"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32674"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32674"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32674\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}