Search Contract Opportunities

Zero Trust Identity

ID: A23-009 • Type: SBIR / STTR Topic • Match:  85%
Opportunity Assistant

Hello! Please let me know your questions about this opportunity. I will answer based on the available opportunity documents.

Please sign-in to link federal registration and award history to assistant. Sign in to upload a capability statement or catalogue for your company

Some suggestions:
Please summarize the work to be completed under this opportunity
Do the documents mention an incumbent contractor?
Does this contract have any security clearance requirements?
I'd like to anonymously submit a question to the procurement officer(s)
Loading

Description

OUSD (R&E) CRITICAL TECHNOLOGY AREA(S): Advanced Computing and Software OBJECTIVE: Determine the level of risk when a person uses a personal device to access Army resources (i.e., Bring Your Own Device (BYOD)) in accordance with Zero Trust principles DESCRIPTION: As per NIST 800-207, one of the basic tenets of Zero Trust is Access to resources is determined by dynamic policy including the observable state of client identity, application/service, and the requesting asset and may include other behavioral and environmental attributes . When the requesting asset is an approved managed device, the security and trustworthiness of the device can be determined using the one of the many agents that are already installed on the asset and are used to control the asset configuration. In a Bring Your Own Device (BYOD) scenario the device is not managed by the Army and the state and trustworthiness of the asset is unknown. Additionally, people are highly reluctant to install monitoring software (e.g., agents) on their personal device to allow the Army to determine the state of the device. Without an understanding of the state of the device, the device is considered untrustworthy and it is prevented from accessing Army resources. This results in the Army having to purchase, provide, manage and maintain equipment (e.g., laptops, mobile phones etc.) for people to access Army resources. This cost grows very large when considering the large quantity and variety of users, such as active-duty military, guard, reserves, civilians and contractors that utilize Army resources. The purpose of this SBIR is to research and develop innovative ways to determine the trustworthiness of a personal device, without requiring software to be installed on the device. A solution to this problem would enable any user to utilize personal devices, such as mobile devices and personal computers, to access Army resources, while still providing the Army with a dynamic risk analysis that help protect Army resources from being accessed from untrustworthy devices. PHASE I: Determine the feasibility of the proposed solution. The solution should describe in detail the approach to be used for determining the trustworthiness of the device without installing software on the device. The solution should also describe the technical challenges, the risks and how they will be mitigated and any dependencies that are required for the solution to work. The approach should be designed with open architecture and industry standards and protocols in mind. PHASE II: Develop the solution outlined in Phase I. A demonstration of the solution determining the trustworthiness of a BYOD (specific device information will be provided after award). The demonstration should include the ability for the observers to determine how the level of trustworthiness for a given device was measured (e.g., what specific device factors were used to determine the level of trustworthiness of the device, any configuration data used in the decision and how that data was mapped to a level of trustworthiness etc.). PHASE III DUAL USE APPLICATIONS: Expand the solution to enable determining trust on additional devices (examples information will be provided after award). The demonstration in Phase II is expected to utilize a small number of trust factors, so in Phase III the solution should be enhanced to include additional trust factors for the types of devices supported in Phase II. REFERENCES: 1. NIST Special Publication 800-207 Zero Trust Architecture https://csrc.nist.gov/publications/detail/sp/800-207/final 2. DOD Zero Trust Reference Architecture v2.0 https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v2.0(U)_Sep22.pdf KEYWORDS: ZERO TRUST, DEVICE, RISK, TRUST, BYOD, CYBERSECURITY

Overview

Response Deadline
June 14, 2023 Past Due
Posted
April 19, 2023
Open
May 17, 2023
Set Aside
Small Business (SBA)
Place of Performance
Not Provided
Source
Alt Source

Program
SBIR Phase I / II
Structure
Contract
Phase Detail
Phase I: Establish the technical merit, feasibility, and commercial potential of the proposed R/R&D efforts and determine the quality of performance of the small business awardee organization.
Phase II: Continue the R/R&D efforts initiated in Phase I. Funding is based on the results achieved in Phase I and the scientific and technical merit and commercial potential of the project proposed in Phase II. Typically, only Phase I awardees are eligible for a Phase II award
Duration
6 Months - 1 Year
Size Limit
500 Employees
On 4/19/23 Department of the Army issued SBIR / STTR Topic A23-009 for Zero Trust Identity due 6/14/23.

Documents

Posted documents for SBIR / STTR Topic A23-009

Question & Answer

The AI Q&A Assistant has moved to the bottom right of the page

Contract Awards

Prime contracts awarded through SBIR / STTR Topic A23-009

Incumbent or Similar Awards

Potential Bidders and Partners

Awardees that have won contracts similar to SBIR / STTR Topic A23-009

Similar Active Opportunities

Open contract opportunities similar to SBIR / STTR Topic A23-009