SOURCES SOUGHT
A -- Sources Sought Notice for Identity, Credential, and Access Management (ICAM) and dynamic access control solutions
- Notice Date
- 6/24/2022 8:36:22 AM
- Notice Type
- Sources Sought
- NAICS
- 541715
— Research and Development in the Physical, Engineering, and Life Sciences (except Nanotechnology and Biotechnology)
- Contracting Office
- W6QK ACC-APG ABERDEEN PROVING GROU MD 21005-1846 USA
- ZIP Code
- 21005-1846
- Solicitation Number
- W56KGU-22-RFI-ICAM
- Response Due
- 7/24/2022 1:00:00 PM
- Point of Contact
- Ogedi C. Okwudishu
- E-Mail Address
-
ogedi.c.okwudishu.civ@army.mil
(ogedi.c.okwudishu.civ@army.mil)
- Description
- �Sources Sought Notice for Identity, Credential, and Access Management (ICAM) and dynamic access control solutions DISCLAIMER: THIS IS NOT A SOLICITATION: No award will be made as a result of this request. This RFI is for informational and planning purposes only; this is not an Invitation for Bid, a Request for Proposal, or a Request for Quotation. No solicitation document exists, and a formal solicitation will not be issued by the Government after receiving responses to this RFI. The Government will not be liable for payment of any costs incurred in response to this RFI and is under no obligation to act in any way on the information received. No costs incurred by interested companies in response to this announcement will be reimbursed. The information provided may be used by the Army in developing a future acquisition strategy, Performance Work Statement, Statement of Objectives and/or Performance Based Specification(s). Interested parties are responsible for adequately marking proprietary or competition sensitive information contained in their response. PURPOSE: The U.S. Army Combat Capabilities Development Command (DEVCOM), Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center is surveying the market to locate/identify interested Business Concerns. The US Army C5ISR Center, Engineering & Systems Integration (ESI) is interested in receiving information from companies that have policy driven technologies for Identity, Credential and Access control (ICAM) and dynamic access control solutions at a technology readiness level (TRL) of 6 or higher. Technologies/ products presented should be capable of being matured to at least a TRL 7 within approximately two years.� To enable interoperability any solutions proposed should comply with industry standards for identity and access control. Solutions must also support use in resource constrained environments such as limited bandwidth, high latency and size weight and power constraints. BACKGROUND: The program is focused on Identity, Credential & Access Management (ICAM) as the foundation upon which cyber security is built for every network, system, service, or application. ICAM provides the credentials that prove the identity of who people (Person Entities - PEs) and what devices, services, applications, sensors, RPAs, (Non-Person Entities � NPEs) are on the network. ICAM also provides the access control decisions on whether a given identity is authorized to access information, resources, systems, or services. Enterprise ICAM capabilities have made significant advancements over time. However, on the tactical side, soldiers still rely on coarse grained, manually provisioned rules for access. To enable interoperability any solutions proposed should comply with industry standards for identity and access control. Solutions must also support use in resource constrained environments such as limited bandwidth, high latency and size weight and power constraints. As the army moves towards adoption of a Zero Trust Architecture (ZTA), the Army will need to move away from manual/static provisioning and access control assignments to automated account provisioning and access to data and resources for soldiers, devices, sensors, radios etc and move away from manual/static access control to a dynamic access control approach. SCOPE: The objective of this RFI is to solicit information regarding technologies that can provide the capabilities listed below.� DEVCOM C5ISR will be evaluating the responses to help shape and validate feasible requirements. Highly Desired Capabilities: 2 or more of the following highly desired capabilities. 1. Identity for People and Non-Person Entities (NPEs) (U) Provides an Identity, Credential & Access Management (ICAM) capability to identify, authenticate and authorize personnel accessing data and resources using Multi-Factor Authentication (MFA) capabilities (U) Supports a variety of credential types & authentication mechanisms. i.e username/password, person entity (PE), Non-Person Entity (NPE) PKI for devices, web services, FIDO, federated identity, etc (U) Supports a zero-trust model. i.e every connection is TLS enabled for mutual authentication 2. Dynamic Access Control: (U) Supports the ability to make fine grained access control decisions in alignment with Zero Trust principles, (U) Supports standards-based access control assertions. INFORMATION REQUESTED: Interested parties with the ability to design, prototype, and build an ICAM should submit a Whitepaper not to exceed 15 pages in length. At a minimum, the Whitepaper should address the following information: Note: All correspondence including the Request for the Reference Design Document and Whitepaper shall have correct CUI markings in accordance with DoDI5200.48 �Controlled Unclassified Information (CUI).� Familiarity and Understanding of ICAM best practices, guidelines, and reference designs Experience and capability developing similar technology Design, testing, manufacturing approach, and what info you would provide for the capability to go through an approval process or certification process to ensure requirements are met (if applicable) Description of existing or planned work in this area.� Include strategies for embedding end products into both commercial and Government off the shelf (GOTs).� Provide information on partnerships agreements planned or existing.� A description of products/technologies that meet the description of capabilities and features listed in the background and highly desired capabilities section above� All whitepapers will be submitted via DoD SAFE. Please reach out to the technical POC: Ogedi C. Okwudishu (ogedi.c.okwudishu.civ@army.mil) in order to request the DoD Drop off Link when ready to submit your white paper. Your white paper submission should include a Cover Page (excluded from page count) that includes: Note: All correspondence including the Request for the Reference Design Document and Whitepaper shall have correct CUI markings in accordance with DoDI5200.48 �Controlled Unclassified Information (CUI).� Point of contact information to include: company name, contact name, company address CAGE Code and DUNS Number
- Web Link
-
SAM.gov Permalink
(https://sam.gov/opp/7fb8f5bc588f4f3b820985be0fb17da4/view)
- Record
- SN06369157-F 20220626/220624230102 (samdaily.us)
- Source
-
SAM.gov Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's SAM Daily Index Page |