Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY - FEDBIZOPPS ISSUE OF JULY 25, 2015 FBO #4992
SOURCES SOUGHT

63 -- Identity Management System (IDMS) -- Request for Information

Notice Date
7/23/2015
 
Notice Type
Sources Sought
 
NAICS
561621 — Security Systems Services (except Locksmiths)
 
Contracting Office
Department of State, Office of Acquisitions, Acquisition Management, 1735 N. Lynn St., Arlington, Virginia, 22209, United States
 
ZIP Code
22209
 
Solicitation Number
SAQMMA15I0054
 
Archive Date
8/28/2015
 
Point of Contact
Steven G. Haines, Phone: 7033123676
 
E-Mail Address
hainessg@state.gov
(hainessg@state.gov)
 
Small Business Set-Aside
N/A
 
Description
Agency: U.S. Department of State Program Office/Requiring Activity: Bureau of Diplomatic Security, Security Technology, Facility Security Engineering 1.Purpose This is a Request for Information (RFI) as outlined in the Federal Acquisition Regulation (FAR-52.215-3, Oct 1997, hereby incorporated by reference), request for information or solicitation for planning purposes. The purpose is to accomplish extensive market research relating to the Identity Management System (IDMS). The government is seeking information regarding the availability and feasibility of attracting providers to support the requirements of the Department of State (DOS), Bureau of Diplomatic Security (DS), Security Technology (ST), Facility Security Engineering (FSE), and Identity Management Program. Issuance of this notice is solely for information and planning purposes and does not constitute a Request for Proposal (RFP), or a commitment on the part of the government to conduct a solicitation for the below-listed products in the future. Please note that a decision not to submit a response will not preclude a vendor from participating in any future solicitation. 2. Background The Bureau of Diplomatic Security (DS) is the security and law enforcement arm of the U.S. Department of State (the Department). DS is a world leader in international investigations, threat analysis, cyber security, counterterrorism, security technology, and protection of people, property, and information. Its' primary mission is to provide a safe and secure environment for the conduct of U.S. foreign policy. The Office of Security Technology (ST) supports the DS mission through the application and use of appropriate technical security countermeasures. The Homeland Security Presidential Directive 12 (HSPD-12) was signed on August 27, 2004, in response to the general threat of unauthorized access to physical facilities and logical IT assets. HSPD-12 applies to all government employees and contractors. The HSPD-12 program utilizes Personal Identity Verification (PIV) Credentials and services; this facilitates trusted physical and electronic access to government facilities and networks using smart card technology. 3.Prerequisites The overall security requirement of the future IDMS requirement would be Top Secret Facility Clearance/Top Secret level of safeguarding. 4.General HSPD-12 Requirements The DOS DS/C/ST/FSE is seeking information pertaining to models and solutions for providing these supplies and services. Consequently, all sources are invited to submit information, experience, comments, feedback, and recommendations for implementation of HSPD-12 related PIV services as identified below: 4.1.PIV Issuance System: Full-featured system that meets the requirements of FIPS 201-2 and all relevant and supporting Special Publications (SP). 4.2.Security: Compliant with requirements defined in NIST and GSA security policies and procedures for a FIPS-199 security level of HIGH. 4.3.System Interface: Options for supporting multiple interfaces related to data and access consumption and distribution to differing system components throughout the current enterprise; as well as future considerations. 4.4.Card Issuance: Must meet PIV Credentials issued in accordance with FIPS 201-2 and supporting SP. 4.5.Training: Delivery mechanisms and content for training system role holders and individual credential holders, to include certification and refresher trainings. 4.6.Helpdesk Services: Describe past experiences for providing helpdesk services for system users and administrators. 4.7.System Reporting: At a minimum, activity and transaction reports, with robust customization capabilities. 4.8.PIV Issuance Architecture: Support for additional credential types, such as temporary badges, PIV interoperable credentials, and tokens. Provide capability to support additional uses and technologies to support derived credentials. 4.9.Transition: Discuss experience and strategies for HSPD-12 system transition with minimal operational impacts. 4.10. Service Level Agreements (SLAs): Provide metrics for the evaluation and management of performance. 4.11.Systems Solutions: Describe system capabilities addressing the convergence of Physical and Logical Access Control Systems across an enterprise. 4.12.Authentication: Illustrate support of multiple authentication modes for controlling access (e.g., PKI, ID factors, etc.). 4.13.Visitor Management: Provide visitor access management capabilities. 4.14.Credential Issuance: Experience issuing and managing PIV-like credentials (PIV-I, Facility and Logical Access Credentials, Facility Access, and non-PIV cards. 4.15.Physical Access Control System (PACS) Integration: Describe capabilities and experience integrating with legacy and distributed PACS infrastructures and strategies to achieve integrated, interconnected and secure access; specifically identify experience with symmetric key based authentication, and Software House C-Cure 9000. 4.16.Path Validation: Perform full path, attribute and access validation of the individual, their credential and access privileges. 4.17.Internal Systems Interoperability: Integrate with existing DOS infrastructure authoritative data sources for provisioning, authentication, authorization, audit, personnel security, and access management (i.e., active directory, HR Services, clearance verification systems, etc.). 4.18.External Systems Interoperability: Describe your experience addressing Federal Agencies and DOD interoperability, to include issuing and managing subordinate and partner agency credentials using various topologies. 4.19.System Administration: Experience supporting, training, and managing system administrators and other individuals whose job function requires multiple credentials. 4.20.Engineering Capabilities: Experience in modifying and customizing non-PIV applets and containers. Additionally, provide description of derived credential production and management capabilities. 4.21.Location Requirement: Experience delivering full-scale solutions including management, maintenance and customization at a government facility without an external physical system. 5.Instructions 5.1.Responses 5.1.1.Responses must be limited to 20 letter-size pages or fewer, single-spaced, in Microsoft Word or Portable Document format (PDF), using Times New Roman 12-point font. 5.1.2.Include your company Data Universal Numbering System (DUNS) number, Commercial and Government Entity (CAGE) code, company point of contact (POC) and socioeconomic status under North American Industry Classification System (NAICS) code 561621. 5.1.3.Respondents must indicate whether they offer the required supplies and services on ANY Federal Supply Schedules or Government wide Acquisition Contracts (GWAC). If so, please list the schedule or contract number. 5.1.4.All responses to information in sections 5.1.2-5.1.3 may be submitted in addition to the 20 page response requirement. 5.1.5.Proprietary information, if any, should be minimized and MUST BE CLEARLY MARKED. To aid DS, please segregate and clearly mark proprietary information. Please be advised that all submissions become the property of the Government and will not be returned. 5.1.6.Responses shall be submitted by email attachment ONLY to Steven G. Haines, Contracting Officer, U.S. Department of State, Office of Acquisitions Management, HainesSG@state.gov. Responses submitted in other formats and responses submitted to other individuals or other addresses will not be accepted. 5.2.Formatting The responses should be in the following format/order: 5.2.1General Business Information: Provide general information about your business, to include the information contained in Section 5.1, as well as any National Industrial Security Program clearance information. 5.2.2Requirements: Address requirements contained in Section 4.0; weight and detail paragraphs and bullets, as appropriate. 5.2.3Experience: Provide experience, capabilities, contracts, and customer information, as appropriate. 5.2.4Points of contact: List one or more points of contact for your company. 5.2.5Summary: Provide brief concluding remarks, as appropriate. 5.3.Restrictions on Response The Government will not entertain telephone calls or questions for this RFI.
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/spg/State/A-LM-AQM/A-LM-AQM/SAQMMA15I0054/listing.html)
 
Record
SN03807973-W 20150725/150723235402-1b192452f6043907fcfa5e3c4b9a9965 (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.