Utilities
Software Factory Utilities are integral components of our software development methodology, working in sync with the Intake Process and other SWF Model elements. They serve as the backbone, ensuring the provision of standardized tools and practices.
Better
Utilities lay the foundation for consistent, quality software delivery, aligning with VA's strategic objectives and ensuring every project, legacy or new, receives the necessary tools and resources.
Faster
By providing readily accessible resources, Utilities reduce time spent on redundant tasks, accelerating the software development process.
Safer
The integration of Utilities into the SWF Model ensures a streamlined, effective approach, promoting consistency and efficiency across all software projects.
Internal Developer Resources
Internal Developer Portal requires VPN access
SWF Utilities: Enhancing Efficiency and Security across Key IT Functions
The chart below outlines the various utility categories integral to the Software Factory Model, each serving specific functions that bolster efficiency, security, and compliance within VA's software development process. Key categories include:
Category | Purpose |
---|---|
Certificate Management | Provision and manage TLS/SSL certificates |
Communications | Facilitate external communications to provide updates, notifications, or other information to Veterans, their families, or other VA customers |
Dashboarding | Visualize application or system data in a consumable fashion |
Design | Enable design / development of consistent, accessibility-compliant user interfaces |
Event Management | Provide a common tool for incorporating event streaming into products |
Identity and Access Management (IAM) | IAM services identify and manage access controls to authenticate users and grant or deny access rights to data and applications |
IT Service Management | Facilitate incident, configuration, and change management across VA |
Monitoring | Gather data on real-time application or system health |
Planning | Support planning and workflow for project teams; track progress metrics |
Secrets Management | Store sensitive configuration and credentials safely |
Static Application Security Testing (SAST) | Store code in a securely managed, centralized repository |
Static Analysis | Analysis of source code (e.g., for vulnerabilities) without executing |