8.3 Design
In this section we describe design guidance for AAM projects use cases that are targeted for automated application modernization and migration to the Cloud.
In the Design stage, the target architecture is developed and documented. The target architecture includes application architecture, and supporting operational components and processes. Members of the sprint team and contractor engineering support team use the information collected during the Discover stage (see Section 8.1) to design the application for the targeted cloud environment. This work depends on the migration pattern and includes a cloud infrastructure architecture document that outlines what services to use. The document also includes information about data flow, foundational elements, database migration, monitoring design, and how the application will consume external resources.
In a typical design phase workflow, the “legacy” Application Blueprint report generated in the Discover phase is used to enable a detailed evaluation of the existing system’s design and architecture. The following tasks are performed:
It is considered a best practice to run Static Application Security Test (SAST) tools and Dynamic Application Security Test (DAST) tools on the modernized code to validate developers have applied secure coding standards and the required security controls are properly implemented. DAST tools provide penetration testing and verify that cybersecurity vulnerabilities (i.e. the OWASP Top 10) have been tested for and remediated.
The Air Force Common Computing Environment program worked with Amazon AWS and Microsoft Azure to implement the Defense Information System Agency (DISA) add on cloud security features to AWS GovCloud and Azure Government. These add-ons consist of Virtual Data Center Security Stack (VDSS) which provides traditional DMZ security for web applications and a next generation firewall for VPN access to protect cloud hosted workloads. Also implemented in the cloud were DISA’s Virtual Data Center Managed Services (VDMS) to provide cloud connected management and security tools and privileged user access and management for DoD networks and users.