CONTROLLED DATA
Leidos Proprietary - US Citizens ONLY
The information contained herein is proprietary to Leidos, Inc. It may not be used, reproduced, disclosed, or exported without the written approval of Leidos.
The following bullets are a quick look at SDOs Security Posture
- FIPS 140-2
- McAfee
- Nessus Scans
- Security Groups
- Forwarding Logs to Splunk for SOC monitoring
- Encrypted AMIs
- Encrypted Volumes
- Encrypted Communications (Except SoftNAS) Control communication for Per Build Containers inside the Cluster
- Every POD has this proxy sidecar… mutual TLS between all of them Do an egress gateway to resources outside the cluster.
- Edge cases – need to encrypt something before it is stored if app is not using strong enough cyphers. Edge of the PODS.
Overview
Content Tools
Apps