Summary of key recommendations
In the Command, Control, Communications, and Computers (C4) domain, the DSR recommends that:
In the Cyber domain, the DSR recommends that:
What does this mean for Defence procurement?
Despite the DSR only making three recommendations across the C4 and Cyber domains, significant changes have been proposed to Defence’s C4 and Cyber capability investment priorities, systems and networks architectures, and procurement processes.
Open architecture approach
In the C4 domain, the DSR recommends that Defence adopt an open architecture approach to hardware and software, resulting in the reduction of integration complexity and costs, and the removal of technical barriers for Australian industry involvement in Defence’s major software and hardware procurement processes.
Of the 62 total recommendations made by the DSR, the adoption of an open architecture approach to hardware and software was one of only 13 that were agreed-in-principle by the Government, with greater fidelity on its implementation to be provided in the 2024 National Defence Strategy. Deliberation on how this recommendation is to be implemented and adopted is a testament to its technical complexity.
Defence currently adopts a closed architecture approach, meaning the technical guidelines and specifications of its foundational hardware and software systems are proprietary, and not widely disclosed to other vendors. This approach is analogous to the system architecture approach taken by Apple, who tightly controls what hardware devices can run Apple iOS, and which software vendors are able to write and install applications on their operating system.
An open architecture approach would require the technical guidelines and specifications of Defence’s major C4 networks and systems to be more widely accessible by other vendors, making the integration and further development of software applications hosted on these networks and the upgrading of hardware components less technically challenging, and ultimately involve less integration risk for any new platforms or systems that are required in the future to inter-operate with the original platform.
Just how widely accessible these technical guidelines and specifications can be made is an open question, particularly where Defence has an obligation to maintain the security and integrity of its operational networks and systems to protect them from attacks by malicious actors.
Network resilience to cyber attacks
While not a formal recommendation, the DSR observes that Defence’s networks and architectures need to be resilient to persistent penetration attempts and cyber-attacks.
Reconciling the need to adopt an open architecture approach with the need for continued resilience to cyber-security threats will present a major challenge for Defence – one that it has previously mitigated through strict closed architecture controls.
Cyber capability enhancement
Within the Cyber domain, the DSR recommends that Defence enhance its cyber domain capabilities to deliver greater support to ADF operations. The recommended focus of these enhancements is:
Investments in targeting capabilities
The DSR proposes that Defence invest in targeting systems to support the use of advanced and long-range weapons, undersea warfare, and integrated air and missile defence capabilities.
This is closely related to the recommendation to enhance Defence’s cyber capabilities to better support ADF operations. Defence will need to upgrade existing targeting systems, and in some cases rapidly acquire entirely new targeting systems, to support newly introduced capabilities across all domains.
Open architecture and collaborative contracting
To achieve an open software and hardware architecture within the C4 domain, Defence may wish to consider adopting an ‘agile’ approach to contract delivery, which includes a framework for iterative delivery under the agile methodology for software development (ie, an iterative ‘feed-back’ loop which validates and corrects errors quickly, and can foster new innovations throughout the development cycle), rather than strictly defined entry and exit criteria commonly applicable under a ‘waterfall’ milestone-based delivery method. This would require operational and functional requirements to be defined in the relevant contract, but with a less prescriptive process as to how those requirements are ultimately met.
Traditional ICT hardware and software development and delivery contracting approaches, including the approach taken under the ASDEFCON suite of contract templates, predominantly focus on arms-length ‘waterfall’ delivery models wherein the principal provides payment, and the contractor delivers supplies or services.
More specific considerations may include:
In particular, software design data and source code are commonly excluded (often by default) from the Commonwealth’s IP licence under ASDEFCON contract templates. Additionally, under the Technical Data and Software Rights Schedule (TDSR), contractors are presented with the opportunity to designate source elements of their software and hardware products as Highly Sensitive Software and Technical Data, and impose restrictions on access by third parties.
Allowing other software and hardware vendors (including potential competitors) access the software design data, source code, and hardware technical configurations of products of the developing party, may present challenges and commercial risks to their proprietary tools.
For more information regarding the potential benefits of utilising collaborative contracting approaches, refer to our recently published article on this topic.
Penetration testing and ‘cyber-worthiness’
To strengthen the resilience of Defence’s C4 networks and systems, Defence may wish to explore the introduction of penetration testing requirements as part of the V&V process under ASDEFCON contracts.
Sole-source and off-the-shelf procurements
As noted in several of our entries in this series, the DSR has formally recommended that Defence utilise limited-tender and sole-source procurement methods more frequently, in particular where circumstances demand rapid delivery of ‘in-service’ capabilities that are utilised by Australia’s international partners.
Within the C4 and Cyber domains, Defence may achieve a faster speed to capability through the acquisition of software and hardware products from suppliers with a proven record of delivering similar capabilities to Australia’s key operational partners. Where such products can be readily identified in the market, limited tender and sole-source approaches to market may accelerate the procurement process, noting that an expedited procurement process does not always lead to expedited delivery of the required capability once in-contract.
Defence would need to carefully mitigate the risks associated with ‘limiting the field’ of potential suppliers, including through clear requirements setting prior to approaching the market, and the incorporation of contractual mitigations to closely manage schedule and delivery. Importantly, Defence would need to ensure compliance with the Commonwealth Procurement Rules (CPRs) and Defence procurement policies in respect of any limited tender approaches to market.
If you have any questions or would like further information on the commercial and legal impacts of DSR in the C4 and cyber domains, please feel free to contact us.
Authors:
Rory Alexander, Principal
Nick Faulks, Senior Associate