DOD IT Programs Operating at Lower Cost Estimates, Reports GAO
GAO found that 11 surveyed DOD IT programs have reduced their cost estimates, while four others increased their life-cycle cost estimates, it said Wednesday. Ten of the programs reported schedule delays of up to five years, GAO said. Ten of…
Sign up for a free preview to unlock the rest of this article
Export Compliance Daily combines U.S. export control news, foreign border import regulation and policy developments into a single daily information service that reliably informs its trade professional readers about important current issues affecting their operations.
the 15 programs reported using commercial off-the-shelf software, which reduces development time and costs, the report said. Fourteen programs use an “iterative software development approach” that “may help reduce cost growth and deliver better results to the customer. However, programs also reported using an older approach to software development, known as waterfall, which could introduce risk for program cost growth because of its linear and sequential phases of development that may be implemented over a longer period of time.” All 15 surveyed programs are “developing cybersecurity strategies, which are intended to help ensure that programs are planning for and documenting cybersecurity risk management efforts,” GAO said. But “only eight” reported “conducting cybersecurity vulnerability assessments.” DOD reported it “continues to evolve its acquisition processes to reduce software development time, allow for faster delivery of capabilities, and lower life-cycle costs,” GAO said. The department said "the report highlighted opportunities for continued improvement in its efforts to acquire IT capabilities,” and it believes “implementation and wider adoption of the software acquisition pathway will assist in reducing risks and challenges, as will continued implementation of the DOD Cyber Strategy, which includes a line of effort aimed at improving the DOD cyber workforce by investing in future talent, identifying and recruiting sought-after talent, and retaining the current cyber workforce.”