Cloud // Cloud Storage
News
5/10/2012
09:27 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Pentagon CIO Talks Security, Mobility, Shared Services

Budget cuts and cybersecurity demands have led the Department of Defense to push increasing resources into a long-term strategy to create shared IT infrastructure across the military, CIO Teri Takai says.

Defense Robots: Fast, Flexible, And Tough
Defense Robots: Fast, Flexible, And Tough
(click image for larger view and for slideshow)
The Department of Defense has more than 100 people working on its Joint Information Enterprise strategy, a long-term plan for a common IT infrastructure--including shared networks, data centers, and IT services--across the military, DOD CIO Teri Takai said last week at InformationWeek Government's IT Leadership Forum in Washington, D.C.

Joint Information Enterprise (JIE) is not a new term for the military, but its use has again been on the rise in recent months as top DOD IT officials increasingly discuss the need in tough budgetary environments to consolidate and share IT resources. According to Takai, DOD is now hard at work on a timeline to implement the strategy.

"The concept that we're driving is really to bring together a lot of concepts," Takai said. "Today we provision our networks, data centers, and information on a service-by-service basis. Today they operate in a very siloed way. The idea is to think 'enterprise' going in, to bring together our physical data centers, our services, and our data, and we have to make sure that we can deploy quickly and rapidly in a much more standard way than we do today."

[ With an IT budget that hasn't grown in three years, federal IT leaders are looking to "cut and invest" to make their agencies more agile and efficient. See Federal CIO Touts Shared Services Model. ]

JIE will include a strategy for shared networks, shared security frameworks including common identity management, and more. According to Takai, a shared environment will improve security and collaboration, accelerate the development of new IT services and deployment of mobile devices, and will make heavy use of cloud computing.

However, she said, the "cadence and speed" with which this strategy will move will be determined in large part by the services themselves. This can now be seen in the DOD's enterprise email strategy. Takai has expressed an interest in moving all of the military to a common email infrastructure. The Army is now well underway in its move, and the Air Force is next up, but each service is moving at its own pace.

While the budget is a big driver for the JIE, information security is one of the key parts of the effort, and some of the improvement on that front will come from network consolidation, according to Takai.

"Networks haven't necessarily been designed with security in mind," she said. "It is very difficult to protect all these isolated enclaves, and so we are looking at what a Joint Information Environment would look like from that standpoint, from as much a cyber standpoint as an efficiency standpoint."

Increasingly, for example, the DOD is looking at security from an enterprise and data-level perspective, working on a common identity management framework, rolling out a public-key infrastructure on both classified and unclassified networks, and tagging data for security purposes.

Takai said that mobility should benefit from the shared security work. "We can't do a secure mobility strategy when we are trying to link into so many security frameworks," she said. "By looking at a joint environment, we'll able to deploy mobile devices much more rapidly."

The goal, she said, would be to get to a point where the military can certify mobile devices within 90 days, and then allow the services to select which devices to use. "Our role is to make sure [the devices] fit into the network," she said. "The important thing is that we can set the policy floor, and then the control, the acquisition, the contract for those devices, the services are going to look at the justification for that."

Eventually, Takai said, DOD will also use a federated model to bring the different services' mobile application stores together. This may be a longer-term plan, as the Army, the first service with a mobile app store, barely has the first pieces of its store up and running. However, Takai said that DOD is already starting to look at the design of the federated store, building on work done by the Army.

Takai said that the shared infrastructure should also help accelerate development time. Currently, the average cycle for the development of enterprise systems within the DOD is a glacial 81 months, Takai said. She hopes to decrease that to between six and 12 months by leveraging shared infrastructure and agile development methodologies.

"We tend to blame [the long acquisition cycle] on the acquisition process, but it's a problem that we have to solve from the bottom up," Takai said. "The concept here is to have environments where we are building applications on top of them, where we are not trying to rebuild the infrastructure every time."

The DOD's data center consolidation effort dovetails well with this philosophy. The military will close 115 data centers in fiscal 2012 and hopes that its consolidation effort will save DOD $700 million in annual spending within five years.

One byproduct of this work will be increasing use of cloud computing concepts. DOD has been working on an overarching cloud computing strategy for months, and the final strategy will tie in with the data center consolidation strategy, Takai said.

The DOD's strategy shares much in common with a new intelligence community effort to move the currently highly federated intelligence community into more of an enterprise IT model. The intelligence community and military have been sharing technical experts to work on their respective strategies, and Takai even went so far as to call the two efforts "identical strategies."

In our InformationWeek Government virtual event, Next Steps In Cybersecurity, experts will assess the state of cybersecurity in government and present strategies for creating a more secure IT infrastructure. It happens May 24.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Honest Broker
50%
50%
Honest Broker,
User Rank: Apprentice
5/15/2012 | 9:11:09 PM
re: Pentagon CIO Talks Security, Mobility, Shared Services
DoD's plans align with the Secure Cloud Acquisition Roadmap published by the IT Acquisition Advisory Council (IT-AAC) in late 2010, and credited with influencing the current congressional directive (NDAA) requiring all defense agencies to migrate legacy data and applications to commercially available cloud solutions. IT-AAC's informed by the Cloud Security Alliance, Cloud Standards Customer Council, SEI, and a dozen other non-profit bodies focused on transforming how government acquires and manages IT.
Google in the Enterprise Survey
Google in the Enterprise Survey
There's no doubt Google has made headway into businesses: Just 28 percent discourage or ban use of its productivity ­products, and 69 percent cite Google Apps' good or excellent ­mobility. But progress could still stall: 59 percent of nonusers ­distrust the security of Google's cloud. Its data privacy is an open question, and 37 percent worry about integration.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - August 27, 2014
Who wins in cloud price wars? Short answer: not IT. Enterprises don't want bare-bones IaaS. Providers must focus on support, not undercutting rivals.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Howard Marks talks about steps to take in choosing the right cloud storage solutions for your IT problems
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.