2i Public Website
  • Home
  • Cloud Engineering
    • Hardening Binary Repos
    • IL5 Multi-Region
    • IL5 Secure Terraform
    • JFrog OCI Upgrade
    • K8s on OKE
    • OCI Nifi Integration
    • SCCA on OCI
  • Software Engineering
  • Data Science
  • Why Oracle Cloud
  • 2i Insights
  • 2i Team
    • 2i Advantage
  • Contact Us
Select Page

DoD IL5 Software Supply Chain Security on OCI: JFrog Blueprint

by Lydia Chan | Oct 6, 2025 | Supply Chain & Resilience

Why Supply Chain Security Matters

Your system is only as safe as its weakest link. Modern software depends on many outside components, and attackers have repeatedly exploited that trust.

The SolarWinds breach in 2020 and the MOVEit hack in 2023 are two well-known examples of how a cyber breach in the supply chain can ripple across government systems.

For federal and DoD systems, the stakes are even higher.

A single weak component in their supply chain could put mission assurance and national security at risk. That’s why having a clear inventory of software components, validating their integrity, and continuously monitoring for new vulnerabilities are essential steps in defense.

Even trusted vendors sometimes ship code with hidden flaws, so ongoing verification is critical. Securing the software supply chain is critical because your system is only as safe as its weakest link.

What’s at Stake if Unverified Software Runs in Production?

Running unverified software is like letting someone into a secure building without checking their badge. It might be harmless — or it could enable backdoors, data theft, or sabotage.

Without verifying the source and integrity of code, organizations risk running software that does more than advertised — possibly even giving attackers remote control without their knowledge.

What is Binary Repository

Safeguards like checksums and Software Bills of Materials (SBOMs) help organizations verify that software hasn’t been tampered with and reveal what’s inside every package. But these protections only work if you have a trusted place to manage them.

That’s where a binary repository for DoD environments comes in.

Think of it as a central storage hub for all your software “building blocks” — not just source code, but the actual files used to run systems. These can include container images, packages, executables, or libraries.

Instead of pulling software directly from the internet, developers can point their systems to the secure repository, which stores trusted versions of everything they need.

It also works as a proxy for open-source software, providing a copy in case the public source is unavailable or unreliable.

In other words, it’s both a distribution center and a checkpoint: it makes software easier to access while also enforcing security controls.

Examples of stored components (often called “artifacts” in tools like JFrog Artifactory) include Docker container images, Java packages (JARs), Node.js packages, and other executable libraries.

Tools like JFrog Artifactory call these “artifacts” and can support a wide variety of formats to meet different project needs.

The Solution: JFrog Artifactory & Xray in DoD Environments

At 2i, we deploy JFrog Artifactory as the binary repository in DoD environments hosted in Oracle Cloud Infrastructure (OCI). Artifactory serves as the secure “front door” for all software artifacts — both custom-built code and open-source libraries.

One of its key features is Xray, which scans every file for known vulnerabilities.

Policies can automatically block unsafe software from being used. For example, if a file has a critical vulnerability, it won’t even be available for download.

This ensures that anything integrated into Kubernetes workloads in OCI — like container images — has already been vetted for security.

It also gives DoD a consistent, centralized way to control and monitor software, no matter which cloud provider (OCI, AWS, or Azure) their teams use.

Real-World Example: Standardizing DoD Software Supply Chains

Three years ago, when 2i first helped deploy Artifactory and Xray in OCI’s DoD region, Oracle Cloud didn’t yet have a general artifact repository service. Without it, teams had less control and visibility over the software they brought in.

Before implementing Artifactory and Xray, DoD programs faced a fragmented process for handling software dependencies. Teams often had to pull open-source packages directly from the internet or rely on cloud provider–specific registries, each with different limitations and approval timelines.

This created blind spots: there was no single place to verify what was being used, and no consistent way to enforce security controls.

By introducing Artifactory into the OCI DoD region, 2i and our partners provided a single entry point for all artifacts. This not only simplified workflows across projects but also created a uniform security perimeter that aligned with IL5 controls.

Every binary brought into the environment was automatically scanned by Xray, and unsafe components could be blocked before they ever reached a production system.

For DoD mission owners, this meant fewer unknowns and fewer surprises. Instead of scrambling to patch systems after a vulnerability was discovered, they could stop unsafe code at the door.

That shift — from reactive firefighting to proactive defense — is a major cultural and operational change.

By standardizing on Artifactory, the DoD gained:

  • A single entry point for all software artifacts.
  • Automatic vulnerability scanning and enforcement of security policies.
  • Consistency across different programs and cloud providers.
  • Improved risk awareness, since they could now inventory everything being used and match it against known vulnerabilities.

Benefits of a Secure Binary Repository for DoD Missions

The impact of using a secure binary repository with OCI and Kubernetes has been significant, especially when viewed through the lens of DoD compliance and mission assurance:

  • FedRAMP High and IL5 Alignment: Artifactory + Xray supports controlled environments where only vetted, documented software can enter production. This provides the audit trail and visibility needed for IL5 environments and simplifies compliance with FedRAMP High requirements.

  • STIG Enforcement: By blocking unverified or vulnerable components, the repository helps ensure that only software aligned with DISA STIG baselines is deployed, reducing the risk of findings during inspections.

  • CUI Protection: Many DoD systems process Controlled Unclassified Information (CUI). A secure repository reduces the risk that malicious or tampered code could compromise environments handling sensitive but unclassified data.

  • Resilience and Continuity: Caching critical software internally avoids reliance on public repositories that may be unavailable or compromised, ensuring continuity of operations during missions.

  • Operational Efficiency: Developers and system integrators can pull everything from a trusted, IL5-compliant repository, shortening development and deployment cycles while reducing the risk of compliance drift.

  • Consistency Across Clouds: Whether teams are operating in OCI, AWS, or Azure, the same process and security controls apply, giving procurement officers confidence that approved policies are enforced everywhere.

Taken together, these benefits reduce cyber risk, streamline compliance, and help DoD teams move faster — all while protecting mission-critical systems from supply chain threats.

Conclusion: From Best Practice to Mission Assurance

A secure binary repository, integrated with Kubernetes and OCI, is not just an IT best practice — it is a mission assurance requirement, ensuring that every piece of software in DoD systems is verified, compliant, and ready to support war efforts without compromise.

Ready to unlock the next level of secure, cloud-native productivity?

Explore our suite of services or dive into the experts insights below. You will discover how we help federal teams modernize, protect, and accelerate their missions.

Cloud Engineering
More 2i Insights
Contact our Team

Home

Privacy Policy

Contact Us



Copyright 2025 Ikeda Innovations LLC. All rights reserved.