Department Of Defense SharePoint Architecture Guide (DSAG) Part 10 Standardization of the GIG Computing Infrastructure

The net centric operating environment and applications won’t be hosted or maintained by dedicated software any longer. Instead they will be virtual on the GIG computing nodes across the various resources in the GIG. The computing nodes are IT facilities that allow for hosting the various applications and services. Data is stored and the content is controlled so that they it is delivered within the different service levels.

The computing nodes allow for security, backup, and information assurance to be in place across the IT network that is being hosted. The computing nodes can be offered in a variety of levels. This can range from a fixed enterprise scale to a regional processing area. The use of standard rules for the computing nodes is vital for the DIEA 1.0.

The GIG resources have to be on the edge and that will happen with a fixed and deployed computing node technology that is responsive. All of the computing nodes have to be NetOps certified and accredited in order for them to meet the computing service provider requirements.

The computing infrastructure has to support all of the missions of the department. It must provide the edge with an on demand access that is secure for shared spaces. The information of the assets has to work for the functionality, the security, and the integrity of all the domains.

Consolidating the computing infrastructure has fixed mode operations in place so that it is cost effective. At the same time the mission capabilities and operational effectiveness won’t be compromised. The infrastructure needs to offer security and plenty of storage for the data.

The infrastructure also needs to offer a host environment that can evolve. That way it can be adaptable to the different needs of the applications. It can also meet the demands of the increased services that are available throughout the department.

The computing infrastructure needs to be consolidated so that it I can offer the best possible extension. The resources will be the most efficient when they can be used both regionally and globally.

The platform for computing needs to have an independent locations. This will provide real time allocation for all of the shared resources. This infrastructure is responsible for supporting the needs and requirements of the edge environment. This doesn’t stop due to connectivity or a limited amount of bandwidth.

The implementation of the computing infrastructure needs to offer transparent interfaces. This will allow the users to always get top performance and a high quality of service. These abilities need to be agile so that they can continue to respond even when the demands for the computing increase.

With shared computing and data storage there are resources that have to be accessible for the virtual management and control with the GIG to occur. The GIG computing infrastructure needs to be certified and accredited by designated authorities.

There are some basic rules an principles that need to be covered. They will offer guidance for the department so that the environment can support net centric implementation of the applications and services for IT. Then it can meet the needs of the edge.

Next >> Department Of Defense SharePoint Architecture Guide (DSAG) Part 11 Communication Readiness


Department Of Defense SharePoint Architecture Guide (DSAG) Part 8 Shared Computing Infrastructure

There are a variety of rules and principles that have to be established so that the IT investment allows for a program that will have the best security available according to the DIEA 1.0 structure. The information assurance process must be designed and ready for operations. It all needs to work rapidly too so that there are changes that can be implemented without it harming the flow of the resources that are part of that configuration.

Through the Department of Defense programs there is the demonstration of the network and the data it offers. The applications and setting have to be controlled so that the functions will all be enabled. They also have to be validated through the security system and engineering process.

These programs also work to ensure that the changes necessary to the configuration of the network or applications can be automated in many areas. That helps to streamline the implementation of the GIG configuration process. The global mission and dispersement allows the global network to reach the right operations so that there is a line of defense for the information process.

The various Department of Defense series that are in place have to offer both sharing and transferring of the various information. It has to be able to span over many levels of security. They also have to be centralized when it comes to the planning and coordination of the various levels.

Being able to digitally identify the different users and devices is important. They have to be authenticated so that the security can be enforced according to the controls and rules of quality that are in place. The protection of the organization has to be part of the controls of these devices.

With the metadata in place there is control over the attributes of the information. This also allows for top quality information to be part of the decisions within the DIEA 1.0.
With a shared infrastructure the resources have to be available for the needs and demands of all the missions and their requirements. There has to be a way for them to support the monitoring and the management of the GIG. The infrastructure needs the ability to design and to operate the many components. This also includes for disaster recovery in the event that there are any types of attacks or failures. Some of them can be man made and others can be natural but all need to be supported.

The capabilities of the infrastructure have to be able to survive. They can’t be lost due to some type of disaster recovery program. It needs to be able to connect to all of the different users that have been authorized. It also needs to be changed and managed to continue to meet expectations of any user.

The Computing Infrastructure Readiness, Communications Readiness, and the NetOps Agility all need to be part of the Department of Defense infrastructure environment. They all need to represent the hardware layers of the GIG. At the same time the management and operation facilities need to be able to deploy those resources to any locations. That means the resources are able to be used in critical applications and for services that involve different tactical environments.

The entire network can be deployed with a range of different capabilities so that they support the operations. There are challenges here that require a very detailed infrastructure. It has to be modular and it has to be secure so that it can work well in a variety of different environments that are located within that infrastructure.

Computing Infrastructure Readiness is referred to as CIR. For the Department of Defense the net centric vision requirements are so that it can all be trusted. The information is art of the enterprise asset and it is ready to be accessed with the various needs that have been identified. It is also ready for the unanticipated needs when new circumstances occur.

That environment is one that is often dedicated for the hardware of a given application. The information has to be tied to that particular application within the operating system. The goal is for efficient utilization of the resources of the hardware and the software to be dynamic in terms of how it is used.

The option for future growth needs to be there with a contingency plan in place. The department will move down the path for the net centric operations with that infrastructure serving as the underlying foundation. The core applications and services have to be part of it so that it won’t be just pieces of technology found here and there.

With the net centric leverage in place the GIG will be responsible for distributing the resources for computing. As a result the users of the applications will have shared computing information and access to all of the data that has been stored as long as they are authorized as a user on that level.

The ideals of virtualization in terms of how the users will view the infrastructure is important. The Department of Defense has to reduce the technical and administrative barriers that pertain to shared resources. The goal is to offer a support of information that can be shared across the GIG.

The evolution of the computing infrastructure helps to offer more support for the net centric operation. It has to look at the fact though that there are many users around the edges of the mission. They need to be able to take on the agile environment and its computations. This all has to be done so that users on the support end can adhere to various challenges including not enough bandwidth.

The priority is to make sure all of these challenges within the department are able to be cared for. That where there are levels guaranteed to offer certain capabilities to the consumers. This is all in regards to the data and services offered in the department. The need for a dynamic infrastructure that is shared, adaptable, and very sufficient in the area of support for a global net centric operation can happen.

Next >> Department Of Defense SharePoint Architecture Guide (DSAG) Part 9 Net Centric Computing Infrastructures


Department Of Defense SharePoint Architecture Guide (DSAG) Part 7 Secured Availability

The various Department of Defense activities that are offered allow for decisions to be made based on various types of information. Security is as much of a priority as availability. The network of information may have various threats that take place. Some of them can be internal but others are external including threats from terrorists or criminals.

Hacking is also a concern and so a line of defense has to be in place to help offset such problems. The information has to be maintained through the information assurance which is a foundation for addressing these various concerns. By delivering information on the Department of Defense net centric visions there is place of ability here. The sharing of the information around the various government organizations is only one of them. The partnerships shouldn’t be compromised and so efforts have to be in place to continually counteract such threats that may exist.

Secured availability makes sure that the challenges of the department are met continuously in that net centric environment. The idea is for protection and security to be essential parts of the criteria offered. The IT infrastructure allows for data to be exchanged and for the authentication of the GIG information to be secured for all of the transactions.

This same process makes it possible for securely respond to any types of events that will threaten the operations of the GIG. The Department of Defense has to make a transition to the net centric environment that is in place. There will be a variety of rules and principles in place here. The shift will be towards the entire enterprise though so that solutions within the program work across the board.

When you implementing the secure availability in the net centric environment there needs to be the addition of new technology as well as new policies. All of this will be collaborated in the department. This will affect it on local, state, and Federal levels. It will also affect the various coalition partners that they have in place. Successfully implementing the abilities of the secured availability will result in the Department of Defense covering a variety of key elements. These include:

Managing identities for all users and services so that they can function in a dynamic environment. This also will allow for them to share information across the various networks of organizations out there, even though various levels of trust will be found among them.

To permanently bind the metadata so that it is done at the time that an object is created. This is going ensure that the data is visible as well as properly handled. The risks and threats out there will be carefully assessed in regards to the software, hardware, and services available. The level of trust will be determined by the IT managers.

The modification of resources quickly and effectively should be a priority. This includes bandwidth, storing, and processing. This covers the entire span of the enterprise and all of the policies that are in place.

Making improvements to the management of the security services that are offered within the infrastructure. This includes the encrypted information, the identity, and the security configurations of the management. An audit should also be conducted in that system for effective control in the area of checks and balances.

The reality of it is that the threat to security is one that can be constant. Therefore the community needs to have methods in place to counter any and all threats within the Department of Defense systems. Effectively assessing the security of the changes is important. It will ensure that even with new technology coming along that the environment can be modified as needed in order to make sure the level of security remains constant for the Department of Defense.

There are initiatives though that require solutions to offer an immediate return on such investments. At the same time they have to be able to both expand on and maintain the quality of the computer network defense abilities. This is a huge advantage which is offered through the net centric operations. The GIG has to be able to fight and to continue to move forward in spite of such attacks. It is critical that everything continues to operate before, during, and after such attempts have been made.

The priorities of the department mean that it is very likely for features to be offered in order to adequately represent the progress of the security. It can be implemented as it needs to be across the entire net centric environment. There are a variety of commitments that need to have such high levels of protection in place while the data is being transferred.

The department has to ensure that all of the parts of the mission will be addressed as part of the overall risk assessment that is being done by the Department of Defense. The framework of policies, procedures, and initiatives that are in place will help to offset any concerns of violations occurring.

The Department of Defense has information programs and applications in place for the various computer networks. This is a way for all of the data to be protected while it is being transferred. The level of confidentiality that is in place will help to determine this. The mission assurance and level of exposure also influence this information.

The infrastructure of the applications and services need to have boundaries that are able to be configured for the operations. This all has to be in compliance with the various policies. Those policies have to adequately address different types of systems within the enterprise. This means the community is able to have an interest and to support the operational needs of the mission.

The Department of Defense also offers services for various computer networks so that they can be monitored. This is all in compliance with the different detections and reactions to any possible intrusions. The goal is to limit the interruption of service due to any threats that may be in progress against the department of defense.

The roles of management and administration need to be very clear to so that the security of the operation can be maintained. The provisions that need to be made for training various users in the area of security operations have to be clearly defined as well.

The information technology that is used can be on a global scale. The international aspect of the hardware and software need to be in place due to the increasing need for global providers. The IT communications and services here do introduce some new challenges when it comes to security. The resources of the GIG have to be managed and protected at all times so that there aren’t any breaches to this level of security.

The assets of the GIG have to establish a mission assurance ability that allows the hardware and software to be supplied adequately. This is all done through the engineering of the program. Assessments have to be done in order to reduce vulnerability.

Next >> Department Of Defense SharePoint Architecture Guide (DSAG) Part 8 Shared Computing Infrastructure