iTnews
  • Home
  • News
  • Business
  • Strategy

Defence urged to use open architecture approach for IT

By Richard Chirgwin
Apr 26 2023 6:56AM

Strategic review also elevates cyber domain.

The Australian Defence Force should adopt “open” IT platforms, according to a sweeping Defence strategic review released this week.

Defence urged to use open architecture approach for IT

The review findings give only limited specific attention to ICT, with the most prominent other recommendations covering cyber security and the use of contractors.

The review does, however, state that the cyber domain should be considered equal to Defence’s other four domains – land, sea, air and space.

Previous reviews of the department’s sprawling tech spend in recent years have included asking McKinsey to assess its operating model in 2020, and data centre, ICT and cyber security strategies announced last September.

Today’s review states simply that "an open architecture approach should be adopted by Defence in both hardware and software.”

Noting that C4 – command, control, communications, computer networks – have now become “the critical backbone for providing connectivity of trusted and relevant information and data exchange”, the review said "open" hardware and software could "reduce integration complexity and costs, and break down barriers for Australian industry participation.”

iTnews has asked Defence what constraints may apply to the open architecture approach, given how much of its IT is embedded in systems purchased from overseas, including vehicles, aircraft, watercraft, weapons systems and so on.

The review also called for enhanced cyber domain capabilities, with a view to delivering “a coherent and, where possible, centralised cyber domain capability development and management function”, as well as enhancing its cyber skills base.

However, the review’s recommendations were only for the development of a “comprehensive framework” for cyber domain operations “that is consistent with the other domains”, and strengthened cyber domain capabilities.

In addition, the review calls for the Defence CIO Group (DCIOG) to have two new senior officials, one responsible for capability management, and one to manage the secret network, as part of a “rebalancing” of capabilities away from external contractors.

The review stated as well that “the CIOG workforce should be rebalanced to a 60:40 APS- and ADF-to-contractor ratio”, and added that legacy systems and platforms should be decommissioned.

On the topic of calling for the recognition of the importance of the cyber domain, the review stated that “more attention and resources must be devoted to crucial future-focused joint capabilities such as information warfare, cyber capabilities, electronic warfare, and guided weapons and explosive ordnance.”

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
australian defence forcedefencestrategy

Related Articles

  • Governments back microservices over monoliths Governments back microservices over monoliths
  • NSW gov asked to employ multiple 'chief AI officers' NSW gov asked to employ multiple 'chief AI officers'
  • Defence is making over 500 new ICT hires Defence is making over 500 new ICT hires
  • DTA, Finance asked to check IT vendors' relationship-building with government DTA, Finance asked to check IT vendors' relationship-building with government

Partner Content

AFL and Okta Team Up for a Game-Changing Play in Digital Security and Identity Management
Partner Content AFL and Okta Team Up for a Game-Changing Play in Digital Security and Identity Management
Unlocking Cloud Potential: The Fusion5 Approach to Seamless Migration
Partner Content Unlocking Cloud Potential: The Fusion5 Approach to Seamless Migration
Dual Challenge: Securing Modern Enterprises While Enabling Remote Work
Partner Content Dual Challenge: Securing Modern Enterprises While Enabling Remote Work
Non-technical job seekers are missing out on this in-demand cybersecurity career
Partner Content Non-technical job seekers are missing out on this in-demand cybersecurity career

Sponsored Whitepapers

Nine Ways To Prepare Your Database for a High-Traffic Event
Nine Ways To Prepare Your Database for a High-Traffic Event
How to Put AI at the Heart of Business Growth
How to Put AI at the Heart of Business Growth
Streamline Your Processes and Reduce Managed File Transfer Expenses
Streamline Your Processes and Reduce Managed File Transfer Expenses
Maximise Your Azure Investment with Fusion5
Maximise Your Azure Investment with Fusion5
CyberArk's 2024 Playbook: Identity Security and Cloud Compliance
CyberArk's 2024 Playbook: Identity Security and Cloud Compliance

Events

  • Integrate Integrate
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Governments back microservices over monoliths

Governments back microservices over monoliths

Defence is making over 500 new ICT hires

Defence is making over 500 new ICT hires

Apollo, Kyndryl in bid for DXC Technology

Apollo, Kyndryl in bid for DXC Technology

NSW gov asked to employ multiple 'chief AI officers'

NSW gov asked to employ multiple 'chief AI officers'

Digital Nation

More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
State of Security 2023
State of Security 2023
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.