DISA looking for more PKI support
Market research phase launched for new contract
- By Mark Hoover
- Mar 13, 2013
The Defense Information Systems Agency is developing a new cyber security contract and has stared collecting market data on possible providers of public key infrastructure services.
DISA released a request for information for Defense Department public key infrastructure operations and sustainment and a performance work statement for contractors.
The target audience for this request for information is all contractors, but the requirement is currently contracted through the General Services Administration 8(a) STARS II. There is no final decision on acquisition strategy.
The objective of the performance work statement is to define support for the operation, maintenance and performance of the Defense Department public key infrastructure architectures, as well as the directory services on the nonsecure internet protocol routing network, known as NIPRNet, and the secret internet protocol routing network or SIPRNET.
Most of the work performed under this performance work statement is meant to facilitate issuance and distribution of PKI credentials.
There will be 6 task areas for this contract:
- Task Area 1 Programmatic and policy support
- Task Area 2 Architecture research, requirements, design, build
- Task Area 3 Integration, testing and installation
- Task Area 4 Operations, maintenance and systems engineering
- Task Area 5 Sustainment Engineering
- Task Area 6 Accreditation and Information Assurance and Certification Support
The agency wants responses/questions to the request for information and the performance work statement via E-Buy no later than noon Eastern time March 19. Proprietary information and trade secrets must be clearly marked on all materials.
Points of contact are listed on the request for information. To read through the performance work statement, click here.
Mark Hoover is a senior staff writer with Washington Technology. You can contact him at email@example.com, or connect with him on Twitter at @mhooverWT.