DoD CIO Enterprise DevSecOps Reference Design - Summarymonitoring, signature-based continuous scanning using Common Vulnerabilities and Exposures (CVEs), runtime behavior analysis, and container policy enforcement.The security stack in the security sidecar container hardening from DCAR containers are preserved and complies with the NIST 800-190 requirements [12]. 3. Runtime Defense, this can perform both signature-based and behavior-based detection. This can also be used Log Storage and Retrieval Service 2. Service Mesh 3. Program-specific artifact repository 4. Runtime Behavior Analysis Artificial Intelligence (AI) service 5. DCAR for the hardened containers 60 码力 | 8 页 | 3.38 MB | 5 月前3
The Goal - A Process of Ongoing Improvementsure… Did you lay anyone off or reduce operating expenses? No, there is a union… Did your inventories go down? I don’t think so… Jonah ends the conversation with the question: “Alex, you cannot understand fluctuating in speed, but the ability to go faster than average is restricted, it depends on all the others ahead in line. There are limits on how fast I can go. However, there is no limit on my ability constraint (Bringing back old machines) STEP 5 If, in a previous step, a constraint has been broken go back to Step 1Match Game Need: Dice Box of matches Plate or bowl The system is intended to0 码力 | 6 页 | 100.81 KB | 5 月前3
Predictably Irrationalsports-what do we do? We love it perhaps more than we should. And most frequently, we have trouble letting go of it because we can’t stand the idea of its loss. What are we left with then? An ideology- rigid implementing a given feature, if our customer tells us they don’t value the feature, can we really let it go?0 码力 | 3 页 | 234.46 KB | 5 月前3
MITRE Defense Agile Acquisition Guide - Mar 2014success when it is ready to commit to full-scale Agile adoption. However, when a program has decided to “go Agile” and formally adopt the methodology as a development approach, the government must commit to operations. It allows adaptation, so that a mission can continue even when the operation does not go as planned. For Agile, the overall plan represents the intent. If the plan does not work as expected0 码力 | 74 页 | 3.57 MB | 5 月前3
Cynefin - Agile for Defenseapproach • Monitor for emergence - foster creative environment rather than predetermined results.Go Do Good Things0 码力 | 17 页 | 3.75 MB | 5 月前3
A Seat at the Table - IT Leadership in the Age of Agilityuncertainty and risk. What I call the “contractor-control paradigm” – is really about trying to make risk go away, when risk really the essence of what we do. Complex Adaptive Systems: Fourth and last, that0 码力 | 4 页 | 379.23 KB | 5 月前3
The DevOps Handbookorganizational goals 2. Ch. 14 – Create Telemetry to Enable Seeing and Solving Problems a. Fact – Things will go wrong in Operations! i. 2001 Microsoft Operation Framework study found the best-performing organization0 码力 | 8 页 | 24.02 KB | 5 月前3
The DevOps Handbookallow people to explore past it. 1. The marked channel provides safe, supported passage 2. You can go beyond the buoys, if you follow organizational principles 4. Ch. 21 – Reserve Time to Create Organizational0 码力 | 9 页 | 25.13 KB | 5 月前3
A Seat at the Table: IT Leadership in the Age of Agility - Part 2discussion.” Every quarter, I would do something I called a release cycle review , and then we would go back to the Star Chamber for an update discussion. How to gauge success: To gauge the success of0 码力 | 7 页 | 387.61 KB | 5 月前3
A Seat at the Table - IT Leadership in the Age of AgilityIn the Waterfall, we were worried about getting FOC delivered soon; With an Agile approach, we go this one better—we make sure that we deliver each individual piece of functionality soon. If it0 码力 | 7 页 | 387.48 KB | 5 月前3
共 11 条
- 1
- 2













