iTnews
  • Home
  • News
  • Business
  • Strategy

Defence urged to use open architecture approach for IT

By Richard Chirgwin
Apr 26 2023 6:56AM

Strategic review also elevates cyber domain.

The Australian Defence Force should adopt “open” IT platforms, according to a sweeping Defence strategic review released this week.

Defence urged to use open architecture approach for IT

The review findings give only limited specific attention to ICT, with the most prominent other recommendations covering cyber security and the use of contractors.

The review does, however, state that the cyber domain should be considered equal to Defence’s other four domains – land, sea, air and space.

Previous reviews of the department’s sprawling tech spend in recent years have included asking McKinsey to assess its operating model in 2020, and data centre, ICT and cyber security strategies announced last September.

Today’s review states simply that "an open architecture approach should be adopted by Defence in both hardware and software.”

Noting that C4 – command, control, communications, computer networks – have now become “the critical backbone for providing connectivity of trusted and relevant information and data exchange”, the review said "open" hardware and software could "reduce integration complexity and costs, and break down barriers for Australian industry participation.”

iTnews has asked Defence what constraints may apply to the open architecture approach, given how much of its IT is embedded in systems purchased from overseas, including vehicles, aircraft, watercraft, weapons systems and so on.

The review also called for enhanced cyber domain capabilities, with a view to delivering “a coherent and, where possible, centralised cyber domain capability development and management function”, as well as enhancing its cyber skills base.

However, the review’s recommendations were only for the development of a “comprehensive framework” for cyber domain operations “that is consistent with the other domains”, and strengthened cyber domain capabilities.

In addition, the review calls for the Defence CIO Group (DCIOG) to have two new senior officials, one responsible for capability management, and one to manage the secret network, as part of a “rebalancing” of capabilities away from external contractors.

The review stated as well that “the CIOG workforce should be rebalanced to a 60:40 APS- and ADF-to-contractor ratio”, and added that legacy systems and platforms should be decommissioned.

On the topic of calling for the recognition of the importance of the cyber domain, the review stated that “more attention and resources must be devoted to crucial future-focused joint capabilities such as information warfare, cyber capabilities, electronic warfare, and guided weapons and explosive ordnance.”

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
australian defence forcedefencestrategy

Related Articles

  • Australia Post to reduce number of IT services providers it works with Australia Post to reduce number of IT services providers it works with
  • Defence sets specific goals for next three years of IT modernisation Defence sets specific goals for next three years of IT modernisation
  • DTA creates ongoing CIO role DTA creates ongoing CIO role
  • WA Police to shop "hundreds of millions of dollars" in IT services WA Police to shop "hundreds of millions of dollars" in IT services

Partner Content

Cost-Effective Maintenance for Aging IT Equipment: How Interactive Keeps Systems Running Smoothly
Partner Content Cost-Effective Maintenance for Aging IT Equipment: How Interactive Keeps Systems Running Smoothly
Why a speedy response is critical for hardware maintenance
Partner Content Why a speedy response is critical for hardware maintenance
Why maintaining your hardware can improve your cloud journey
Partner Content Why maintaining your hardware can improve your cloud journey
Securing Modern Enterprise: IT Leaders Address Third-Party Risk Management
Partner Content Securing Modern Enterprise: IT Leaders Address Third-Party Risk Management

Sponsored Whitepapers

Redefining Vulnerability Management
Redefining Vulnerability Management
How JLL gained visibility into nearly 100K endpoints with Tanium
How JLL gained visibility into nearly 100K endpoints with Tanium
Why a holistic approach to managing risk is key to solving complex IT problems
Why a holistic approach to managing risk is key to solving complex IT problems
High Availability: The Foundation of Digital Transformation
High Availability: The Foundation of Digital Transformation
Nine Ways To Prepare Your Database for a High-Traffic Event
Nine Ways To Prepare Your Database for a High-Traffic Event
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Australia Post to reduce number of IT services providers it works with

Australia Post to reduce number of IT services providers it works with

Defence sets specific goals for next three years of IT modernisation

Defence sets specific goals for next three years of IT modernisation

Apollo, Kyndryl in bid for DXC Technology

Apollo, Kyndryl in bid for DXC Technology

NT appoints Department of Corporate and Digital Development chief

NT appoints Department of Corporate and Digital Development chief

Digital Nation

More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
State of Security 2023
State of Security 2023
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.