The Army just made a move that will reshape how defense software gets built, secured, and deployed for the next decade. On May 14, 2025, the Modern Software Delivery (MSD) IDIQ—a $50 billion vehicle—awarded its first task orders. But the real story isn't the dollar figure. It's what's buried in the requirements: continuous Authorization to Operate (cATO) and software factory models are now table stakes.
If you're a GovCon looking to compete on this vehicle, understanding these shifts isn't optional. It's survival.
What is the Army MSD IDIQ?
The Modern Software Delivery IDIQ is the Army's strategic vehicle for acquiring software development, DevSecOps, and digital transformation services across the enterprise. Think of it as the Army's answer to the Air Force's Platform One or the DoD's broader push toward software factories.
Key Facts:
- Ceiling: $50 billion over 10 years
- Scope: Software development, cloud infrastructure, DevSecOps pipelines, continuous integration/continuous delivery (CI/CD), and application modernization
- Prime Focus: Modern development practices—Agile, DevSecOps, containerization, Infrastructure as Code (IaC)
- Critical Requirement: Continuous ATO (cATO) capability, not traditional 3-year ATOs
The first task orders emphasize rapid delivery, security by design, and continuous compliance. This isn't your grandfather's waterfall procurement.
The Death of the 3-Year ATO
For decades, the DoD security model was straightforward but painful:
- Build software
- Freeze development
- Spend 6-18 months on security assessment and testing
- Get an ATO good for 3 years
- Hope nothing breaks before you need to recertify
This model made sense in the era of shrink-wrapped software and on-premise deployments. It makes zero sense in the cloud-native, CI/CD world where teams deploy code daily—or hourly.
Enter continuous ATO (cATO).
What is cATO?
Continuous Authorization to Operate is exactly what it sounds like: security authorization that happens continuously, in real-time, as part of the development pipeline. Instead of treating security as a gate at the end of development, cATO embeds security checks into every stage of the software lifecycle.
How it works:
- Automated security testing at every code commit
- Real-time compliance monitoring against NIST 800-53, DISA STIGs, and other frameworks
- Continuous scanning for vulnerabilities, misconfigurations, and policy violations
- Automated evidence collection for auditors and authorizing officials
- Dynamic risk assessment that adjusts as the system changes
With cATO, your ATO isn't a static document that expires in 3 years. It's a living, breathing state that reflects the current security posture of your system—right now.
Why the Army Demands cATO
The Army isn't making this shift for philosophical reasons. It's operational necessity:
- Speed: Software factories need to deploy daily. Waiting months for an ATO kills agility.
- Security: Continuous monitoring catches threats faster than annual assessments.
- Cost: Automating compliance is cheaper than hiring armies of assessors every 3 years.
- Modernization: Legacy ATO processes can't handle cloud-native architectures, microservices, and ephemeral infrastructure.
The MSD IDIQ's emphasis on cATO signals that the Army is done with security theater. They want security that keeps pace with development.
The Software Factory Model
The second pillar of the MSD IDIQ is the software factory approach. This isn't just about setting up CI/CD pipelines. It's about building an entire ecosystem for rapid, secure software delivery.
What is a Software Factory?
A software factory is a standardized, repeatable platform for building, testing, securing, and deploying software at scale. Think of it as an assembly line—but for code.
Core Components:
- Shared DevSecOps Platform: Centralized CI/CD pipelines, container orchestration (Kubernetes), artifact repositories, and security scanning tools
- Automated Security Controls: Built-in compliance checks, vulnerability scanning, static/dynamic analysis, and Infrastructure as Code security
- Golden Paths: Pre-approved, hardened templates for deployment pipelines, infrastructure, and security controls
- Self-Service Developer Experience: Teams can spin up environments, deploy code, and access security reports without waiting on ops or security teams
- Continuous Monitoring & Feedback: Real-time dashboards showing build status, security posture, and compliance drift
The Army's software factory model draws from Air Force Platform One, DoD Enterprise DevSecOps Initiative, and industry best practices from companies like Netflix, Google, and Amazon.
Why Software Factories Matter for the MSD IDIQ
Task orders on the MSD IDIQ will increasingly require contractors to:
- Operate within existing software factories (e.g., Army Cloud Platform, cARMY environments)
- Build new software factories for specific mission systems or program offices
- Integrate with DoD-wide platforms like Platform One, Iron Bank (hardened container images), and the DoD Secure Cloud Computing Architecture (SCCA)
If your team can't demonstrate experience with Kubernetes, GitLab CI/CD, Terraform, container security, and automated compliance tools, you're going to struggle.
Implications for GovCon Contractors
The MSD IDIQ isn't just another contract vehicle. It's a forcing function that will separate modern software shops from legacy systems integrators.
What the Army is Really Buying
The Army doesn't want more bodies writing code. They want:
- Platform engineers who can build and maintain software factories
- DevSecOps specialists who can automate security and compliance
- Cloud architects with hands-on experience in AWS GovCloud, Azure Government, and DoD IL5/IL6 environments
- Site reliability engineers (SREs) who can ensure uptime, observability, and incident response
- Security automation engineers who can integrate tools like Twistlock, Anchore, SonarQube, and Nessus into CI/CD pipelines
Technical Capabilities You Need
To compete on MSD IDIQ task orders, your team needs demonstrable experience with:
DevSecOps Tools:
- CI/CD: GitLab, Jenkins, GitHub Actions, Tekton
- Container orchestration: Kubernetes, OpenShift, Rancher
- IaC: Terraform, Ansible, CloudFormation
- Security scanning: Twistlock, Aqua, Anchore, Clair, SonarQube, Checkmarx
- Artifact management: Nexus, Artifactory, Iron Bank
Cloud Platforms:
- AWS GovCloud (FedRAMP High, DoD IL5/IL6)
- Azure Government
- DoD Cloud One, Platform One
Security & Compliance:
- NIST 800-53 automation
- DISA STIG hardening
- Continuous monitoring tools (Splunk, ELK, Prometheus, Grafana)
- Risk Management Framework (RMF) automation tools
Agile & Lean Practices:
- SAFe, Scrum, Kanban
- Lean UX, Design Thinking
- Product management, not just project management
Positioning Strategy
If you're targeting the MSD IDIQ, here's how to position:
- Lead with cATO Experience: Highlight past work automating ATOs, integrating security into pipelines, or operating in continuous compliance environments.
- Showcase Software Factory Work: Case studies where you built or operated DevSecOps platforms, preferably for DoD or federal agencies.
- Emphasize Platform Engineering: Don't just say you do DevOps. Talk about platform teams, golden paths, and developer experience.
- Demonstrate Tool Fluency: List specific tools you've deployed and integrated. The Army wants practitioners, not consultants who read blog posts.
- Highlight DoD IL5/IL6 Experience: Generic cloud experience won't cut it. You need hands-on work in DoD-accredited environments.
- Build Partnerships: If you're strong on software but weak on security, or vice versa, team up. The Army wants full-stack capabilities.
The Broader Trend: Continuous Everything
The MSD IDIQ's focus on cATO and software factories is part of a broader DoD shift toward continuous everything:
- Continuous authorization (cATO)
- Continuous integration / continuous delivery (CI/CD)
- Continuous monitoring (security, compliance, performance)
- Continuous testing (automated functional, security, and load testing)
- Continuous improvement (feedback loops, DevOps metrics, blameless post-mortems)
This is the DevSecOps maturity model fully realized. And it's becoming the baseline expectation across DoD software acquisition.
Final Thoughts
The Army MSD IDIQ represents a fundamental shift in how defense software gets built and secured. The $50 billion ceiling is impressive, but the real transformation is in the requirements: continuous authorization, software factories, and modern DevSecOps practices are now non-negotiable.
For contractors, this is both a challenge and an opportunity. The old playbook—staff augmentation, waterfall processes, manual security assessments—won't work here. But if you've invested in modern engineering practices, cloud-native architectures, and security automation, the MSD IDIQ could be a game-changer.
The Army is betting $50 billion that software factories and cATO are the future of defense software delivery. If you're in GovCon, you should probably take that bet seriously.
About the Author: Amyn Porbanderwala is a GovCon professional specializing in software delivery, DevSecOps, and federal technology strategy. He helps defense contractors navigate the shift to modern software practices and position for next-generation contracts like the MSD IDIQ.
Want to discuss how your team can prepare for the MSD IDIQ? Get in touch.