Red Hat’s David Egts: Agile Principles Could Help Agencies Improve FITARA Scores

David Egts
David Egts

David Egts, chief technologist at Red Hat’s North American public sector business, wrote in an article published Friday on FedScoop about how federal agencies can develop and implement Agile principles to improve their ratings on the Federal Information Security Modernization Act scorecard.

One of the things agencies should do is to initially focus on the most important things. “For example, perhaps datacenter optimization is not as critical right now to an agency in dire need of improving cybersecurity,” Egts wrote. “That agency should prioritize shoring up its approach to risk management.”

Egts said agencies should foster open communication and collaboration to ensure that the applications they are working on are aligned with their organizational requirements.

“Successful agencies tend to have FITARA coordinators within the CIO shop. These coordinators work closely with IT teams to help them follow FITARA maturity model guidance,” he added.

Agencies should advance continuous improvement and automate the software development process to allow personnel to focus on more important tasks, Egts wrote.

Check Also


StackRox to Help Secure Cloud-Based Financial Infrastructure Under DHS Contract

StackRox has received a contract from the Department of Homeland Security to help a large U.S. financial services provider  protect cloud-based applications through the implementation of a Kubernetes and container security platform.


Space Force Taps Net-Centric for Battlespace Awareness Center Support

Boulder, Colo.-based engineering company Net-centric Design Professionals has secured a two-year, $28.6M contract from the U.S. Air Force to support the Overhead Persistent Infrared Battlespace Awareness Center at Buckley Air Force Base.


DARPA Seeks Security Tech for Internet of Things Devices Under CHARIOT Program

The Defense Advanced Research Projects Agency has asked industry to submit research concepts for “revolutionary security technologies” that can help protect the increasing number of internet of things-based devices.