CONTROLLED DATA
Leidos Proprietary - US Citizens ONLY
The information contained herein is proprietary to Leidos, Inc. It may not be used, reproduced, disclosed, or exported without the written approval of Leidos.


The following bullets are a quick look at SDOs Security Posture

  • FIPS 140-2
  • McAfee
  • Nessus Scans
  • Security Groups
  • Forwarding Logs to Splunk for SOC monitoring
  • Encrypted AMIs
  • Encrypted Volumes
  • Encrypted Communications (Except SoftNAS)  Control communication for Per Build Containers inside the Cluster
  • Every POD has this proxy sidecar… mutual TLS between all of them  Do an egress gateway to resources outside the cluster.
  • Edge cases – need to encrypt something before it is stored if app is not using strong enough cyphers. Edge of the PODS.
  • No labels