Preview

Request for Proposals

Powerful Essays
Open Document
Open Document
26335 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Request for Proposals
RFP-427.04-107-08

STATE GOVERNMENT DEPARTMENT OF FINANCE AND ADMINISTRATION

REQUEST FOR PROPOSALS FOR INFORMATION SECURITY ASSESSMENT SERVICES (ISAS) RFP NUMBER: 427.04-107-08

CONTENTS
SECTION 1 2 3 4 5 INTRODUCTION RFP SCHEDULE OF EVENTS PROPOSAL REQUIREMENTS GENERAL REQUIREMENTS & CONTRACTING INFORMATION PROPOSAL EVALUATION & CONTRACT AWARD

RFP ATTACHMENTS: 6.1 Pro Forma Contract Contract Attachment A: Attestation Re Personnel Used in Contract Performance Contract Attachment B: Memorandum of Understanding (MOU) Contract Attachment C: HIPPA Business Associate Agreement 6.2 6.3 Proposal Transmittal/Statement Of Certifications & Assurances Technical Proposal & Evaluation Guide Section A – Mandatory Requirements Section B – Qualifications & Experience

RFP-427.04-107-08

Section C – Technical Approach Section D – Security Gap Analysis Section E – Privacy Data Section F – Security Assessment Section G – Security Assessment Report Section H – Mitigating Risks Section I – BIA, BCP, and DRP Section J – Layered Security Solution 6.4 6.5 6.6 6.7 Cost Proposal & Scoring Guide Proposal Score Summary Matrix Reference Questionnaire Supplemental Templates

2

RFP-427.04-107-08

1 1.1

INTRODUCTION Statement of Purpose The State Government, Department of Finance and Administration, hereinafter referred to as the State, has issued this Request for Proposal (RFP) to define the State's minimum service requirements; solicit proposals; detail proposal requirements; and, outline the State’s process for evaluating proposals and selecting the contractor. Through this RFP, the State seeks to buy the best services at the most favorable, competitive prices and to give ALL qualified businesses, including those that are owned by minorities, women, persons with a disability, and small business enterprises, opportunity to do business with the state as contractors and sub-contractors. The State intends to secure a contract for Information Security Assessment Services

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The applicant submitted a staffing plan as well as shared detailed plans for managing the AFIX project.…

    • 870 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    No information included in this document or in discussions connected to it may be disclosed to any third party. The parties enter into this Stipulation and Protective Order under Federal Rule of Civil Procedure 26 to establish procedures for the handling of documents produced by the parties in response to requests from the parties.…

    • 1200 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    8 CONSULTANT’S PROPOSED DESIGN & CONSTRUCTION SCHEDULE ........................... 8 CONSULTANT DESIGN SCHEDULE ........................................................................................ 9 BID DOCUMENT CONSTRUCTION SCHEDULE…

    • 13739 Words
    • 88 Pages
    Powerful Essays
  • Powerful Essays

    The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.…

    • 1810 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Submit a formal written proposal in response to the opportunity that you have selected.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    This essay will examine how to best prepare a contract administration plan. The contract administration plan will examine different methods used in preparing a plan. This essay will explain how important it is to have technical and other support of personnel, the importance of surveillance, and to determine what functions need to be delegated, identify qualified personnel as well as authorized, it is necessary for the Contracting officer to be represented in administering contract requirements. Also there will be a discussion on what is determined from the contract administration functions and how they will be delegated.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The Children 's Internet Protection Act (CIPA) was brought before legislation in December of 2000 and signed off by President Clinton. The law was brought about to protect children from certain internet usage that could be accessed at public and school libraries. Although there were officials that tried to overturn this bill, stating that the bill limited ones First Amendment Rights the law is still in place and helps in the protection of children as they search the internet in federally funded libraries.…

    • 496 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    • *Villarroel, R, Fernandez-Medina, E. and Piattini, M., “Secure information systems development ' ' a survey and comparison”, Computers and Security, 24, 4, 2005, 308-321.…

    • 2113 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Overview of the Data Mining

    • 8497 Words
    • 34 Pages

    Jeffrey W. Seifert Analyst in Information Science and Technology Policy Resources, Science, and Industry Division…

    • 8497 Words
    • 34 Pages
    Good Essays