Case study

Registration, Compliance, and Verification (RCV) Cloud Refactoring System and Modernization – Agile Modernization for the Selective Service System

Project Details: 

Client: Selective Service System (SSS)

Industry: Federal Government, Cloud Modernization

Summary

Cloud7Works, as the prime contractor, is leading a comprehensive 24-month modernization of the Selective Service System’s Registration, Compliance, and Verification (RCV) platform. This initiative transitions the legacy .NET monolith into a cloud-native architecture built on Java/JEE, React, Angular, and microservices. The solution integrates NIST 800-53 R5 security compliance, Agile delivery, and DevSecOps practices, ensuring performance, resilience, scalability, and operational transparency.

 

Challenge

SSS’s legacy RCV platform presented major operational and technical risks:

  • Obsolete technologies and a tightly coupled monolithic .NET architecture

  • Lack of scalability, redundancy, and modern security controls

  • Complex system dependencies that inhibited future enhancements

  • Incompatibility with federal cloud-first modernization mandates

Solutions Delivered

1. Application Rationalization

Cloud7Works conducted a rigorous application assessment leveraging the CIO.gov framework.

Key Activities:

  • Applied the CIO.gov Application Rationalization Playbook over 12 weeks

  • Developed business value and technical fit reports to identify technical debt

  • Created application scorecards rating risk, readiness, and cloud alignment

  • Proposed a cloud-aligned target architecture across application, data, and security domains

 

2. Cloud Refactoring and Modernization

The application was transformed into a modern, scalable architecture.

Key Highlights:

  • Migrated from .NET to Java/JEE with React and Angular front-ends

  • Refactored over 500,000 lines of VB.Net to Spring/Java

  • Established AWS Organization and integrated user federation

  • Adopted autoscaling, fault-tolerant microservices

  • Implemented warm-standby Disaster Recovery

 

3. DevSecOps and CI/CD Implementation 

Security and automation were embedded from the start.

Key Actions:

  • Built secure CI/CD pipelines using AWS FedRAMP-compliant tooling

  • Automated infrastructure deployment with Terraform

  • Integrated unit and regression testing

  • Implemented AWS SecurityHub and Config to identify and resolve security gaps

 

4. Database Migration to Cloud 

The team ensured secure, performant, and compliant data migration.

Implementation Details:

  • Analyzed downtime tolerance and interdependencies

  • Right-sized AWS RDS using telemetry and performance requirements

  • Enabled Transparent Data Encryption (TDE) and SSL/TLS for secure transport

  • Deployed SQL Server Audit and CloudTrail for logging

  • Provisioned multi-AZ and cross-region DR with automated backups

  • Achieved short RTO and zero RPO targets

 

5. Quality Assurance

A robust testing framework supported stability and early defect detection.

Tools and Technologies:

  • Postman for API testing

  • Cypress for front-end automation

Implementation Highlights:

  • Maintained critical path test suites

  • Developed reusable Agile-aligned test cases

  • Conducted load and cross-browser testing (Chrome, Firefox, Edge)

  • Performed exploratory testing in every sprint

Challenges & Mitigations:

  • Used environment-specific data scripts to handle volatile test data

  • Optimized Playwright timing to reduce flakiness

  • Standardized configuration baselines across test environments

  • Simulated attack scenarios to validate QA security coverage

Results Achieved:

  • Accelerated release cycles

  • Reduced defect rates and time-to-resolution

  • Strengthened ATO readiness via embedded security QA

  • Fostered collaboration through QA involvement from project inception

 

6. Cloud Architecture, Design, and Runbooks

An AWS-native architecture was built for resiliency, observability, and cost efficiency.

Key Design Principles:

  • Built on the AWS Well-Architected Framework

  • Amazon ECS with Fargate for serverless container orchestration

  • ALB with AWS WAF for secure ingress traffic control

  • RDS deployed with least-privilege IAM and secure subnets

  • CI/CD integrated via AWS CodePipeline, CodeBuild, CodeCommit, and ECR

Operational Visibility:

  • Amazon CloudWatch and CloudTrail for monitoring, logs, and auditing

  • Centralized dashboards and alerts for rapid incident detection

Cost Optimization:

  • Fargate-based autoscaling for compute efficiency

  • RDS right-sizing and intelligent storage tiering

  • Route 53 with ALB for high availability at minimal cost

Environment Support:

  • DEV, TST, and PROD managed via IaC templates in isolated AWS accounts

Runbook Highlights:

  • ECS deployment, secret rotation, health checks, and snapshot recovery procedures

  • Designed for use by DevOps engineers and on-call support teams

 

7. Cybersecurity & ATO Compliance

Compliance was prioritized through structured security engineering and documentation.

IAM Access:

  • AWS Managed Microsoft AD

  • IAM Identity Center to Manage Users/RBAC based on On-Prem AD

  • AWS Account IAM for MFA and SSO

  • Keycloak

Steps Taken:

  • Implemented CSPM compliance scanning with AWS Security Hub (NIST 800-53 R5 aligned)

  • Performed CWP vulnerability scanning with Amazon Inspector for VMs and containers

  • Conducted code analysis using Veracode (SAST, SCA, DAST)

  • Developed SSP documentation with FedRAMP Moderate CRM artifacts

  • Authored SOPs covering patching, encryption, access control, and IR

  • Integrated AWS logs with Splunk (SIEM)

  • Delivered training on CloudTrail/CloudWatch log insights and alerting

 

8. Project Management/Agile Management

Delivery was structured through disciplined Agile project governance.

Activities:

  • Aligned PM practices with SSS QASP standards

  • Coordinated delivery via Scrum teams and cross-functional roles

  • Used Jira for sprint planning, backlog tracking, and velocity measurement

  • Held daily standups, sprint reviews, and planning sessions

Deliverables:

  • Approved Project Management Plan (PMP), Quality Control Plan (QCP), and Staffing Matrix

  • Weekly reports covering milestone progress, risks, and quality metrics

 

9. Training and Enablement

A comprehensive knowledge transfer program ensured operational readiness.

Scope:

  • Training covered database architecture, DevSecOps, DR, Security, AWS Dashboard, New System Usage, Infrastructure, Built & Deployment, and QA

  • Sessions conducted in TST and QAT environments

Resources Delivered:

  • Live walkthroughs in DEV, TST, and QAT environments

  • User guides and “How-To” manuals tailored to roles

Knowledge Retention:

  • All training sessions were recorded and shared securely for reuse and onboarding

 

10. Infrastructure as Code/DevSecOps

Terraform underpinned repeatable, secure infrastructure provisioning.

Key Capabilities:

  • Automated build, test, and deployment via CI/CD pipelines

  • IaC templates for DEV, TST, and PROD environments

  • Automated access control and log centralization

  • Ensured environment consistency for updates and promotion

  • Simplified failover/failback for DR scenarios

 

11. Vulnerability Management 

A multi-layered approach enabled secure code and infrastructure.

Tools Used:

  • Veracode (CI/CD-integrated code scanning)

  • AWS Security Hub (FedRAMP-aligned infrastructure checks)

  • Splunk (unified logging and real-time threat detection)

 

12. UX Analysis

User-centric, iterative design approach driven by real feedback and evolving needs.

Key Highlights:

  • Conducted in-depth user research and stakeholder interviews to define personas.

  • Created low- and high-fidelity wireframes using Figma for early visualization.

  • Reduced rework through iterative design and early usability testing.

  • Provided developer-ready design assets for seamless implementation.

Tools Used:

Wireframing & Prototyping: Figma

Collaboration & Brainstorming: Miro

 

13. Requirements Gathering 

An Agile, stakeholder-centric discovery process aligned technical and business goals.

Discovery Phase:

  • Facilitated Joint Requirements Planning (JRP) with IT, security, and operations stakeholders

  • Defined modernization goals and compliance expectations

Design Workshops:

  • Conducted collaborative sessions to shape UI/UX and workflows

  • Promoted early stakeholder engagement and reduced downstream rework

Agile Development:

  • Delivered functional increments via defined sprint cycles

  • Collected feedback during sprint reviews to guide iteration

Results:

  • Delivered a secure, scalable, and compliant system

  • Successfully aligned technical design with business operations and federal standards

 

14. Generative AI (using Co-Pilot)

Cloud7Works introduced Generative AI experimentation for future innovation.

Implementation:

  • Deployed open-source AI tools on EC2

  • Configured accessible web UI via Ollama for sandbox exploration

 

Tech Stack 

DevOps & Automation:

  • AWS CodePipeline

  • CI/CD Pipelines

  • Infrastructure as Code (IaC)

  • Terraform

 

Security & Compliance:

  • AWS Security Hub (CSPM Compliance)

  • AWS Inspector (CWP Vulnerabilities)

  • Veracode (SAST/SCA/DAST)

  • Splunk (SIEM)

 

Cloud Infrastructure:

  • Amazon Web Services (AWS)

  • FedRAMP-Authorized IaaS & PaaS

  • Zero Trust Network Access

 

UI/UX Design

  • Figma

  • Lucidchart

 

Databases:

  • Microsoft SQL Server

  • Transparent Data Encryption (TDE) Enabled

 

Monitoring & Logging:

  • AWS Security Hub (Compliance Monitoring)

  • Amazon Inspector (Vulnerability Monitoring)

  • Amazon CloudWatch (Logging)

  • AWS CloudTrail (Logging)

  • Secured Logging & Centralized Monitoring Systems

 

Project & Planning Tools:

  • Microsoft Project

  • Smartsheet

  • Jira

  • Confluence

Team Structure 

  • Program Manager

  • Project Manager/Scrum Master 

  • Project Coordinator 

  • Database Architect 

  • UX Designer

  • Development Lead 

  • React Engineer 

  • Full-Stack Engineer 

  • .NET Developer 

  • Java Developer 

  • Solution Architect 

  • Cybersecurity Architect 

  • Cloud Architect 

  • Enterprise Architect 

  • DevSecOps Engineer 

  • Cloud Engineer 

  • QA/Test Engineer 

Contract Details 

1. Contract Number# 90MC0023P0041

Results

Status: Project Currently In Progress

Client Testimonial /CPAR/Past Performance 

Project Currently In Progress