Carnegie Mellon University
Browse

Acquisition Archetypes Seen in the Wild, DevSecOps Edition: Cross-Program Dependencies

Download (116.35 kB)
online resource
posted on 2024-09-04, 14:10 authored by William NovakWilliam Novak

This post examines problems that arise from a shared DevSecOps platform. Because a DevSecOps platform and tool pipeline is too complex and expensive to create and manage separately for each program, the platform often needs to be a shared capability. This situation creates dependencies and cooperation issues. These problems are examples of an acquisition archetype, which is how we refer to a pattern of organizational system behaviors that have been seen during the SEI’s experiences in conducting invited independent technical assessments (ITAs) on technical and programmatic aspects of the DoD acquisition programs. In these ITAs, program management office (PMO) staff, contractor staff, users, and other external stakeholder organizations provide open and candid responses under the condition of anonymity that provide the SEI team insight into what is truly happening in a program. These insights suggest that similar, recurring problems in software acquisition and development -- archetypes -- arise across separate and seemingly dissimilar programs. A previous SEI blog post examined an archetype of clinging to the old ways. In this post, I discuss the recurring problem of cross-program dependencies. I describe the behavior in the context of a real-world scenario and provide recommendations on recovering from and preventing future occurrences of this problem.

History

Publisher Statement

This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The view, opinions, and/or findings contained in this material are those of the author(s) and should not be construed as an official Government position, policy, or decision, unless designated by other documentation. References herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Carnegie Mellon University or its Software Engineering Institute. This report was prepared for the SEI Administrative Agent AFLCMC/AZS 5 Eglin Street Hanscom AFB, MA 01731-2100. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution.

Copyright Statement

Copyright 2024 Carnegie Mellon University.

Usage metrics

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC