Here's one contract of many large contracts just w
Post# of 82672
950M Pentagon Cloud Contract:
http://www.nextgov.com/it-modernization/2018/...ud/145804/
Quote:
Virginia-based REAN Cloud , an Amazon Web Service Premier Partner, will provide cloud services such as infrastructure as a service, application assessments, migrations and operations to the department under a five-year, Other Transaction Authority production contract.
Quote:
OTAs fall outside of the Federal Acquisition Regulation and have become increasingly popular as the Pentagon looks to speed up tech purchases. Congress must grant an agency the power to enter such agreements, and in the Defense Department’s case, allows the department to engage in OTAs for research and prototyping when a “non-traditional” defense contractor plays a “significant” role or when one-third of costs come from non-federal sources in a cost-sharing agreement.
https://www.reancloud.com/industries-served/p...overnment/
Quote:
FAST TRACK YOUR COMPLIANCE
FedRAMP
DoD and NIST RMF
DoD CC SRG IL 2,3,4,5,6
NIST RMF:
https://csrc.nist.gov/projects/risk-managemen...Overview#3
Using SP 800-53 security and privacy controls!
http://nvlpubs.nist.gov/nistpubs/SpecialPubli...0-53r4.pdf
Quote:
(1) IDENTIFICATION AND AUTHENTICATION | NETWORK ACCESS TO PRIVILEGED ACCOUNTS The information system implements multifactor authentication for network access to privileged accounts. Supplemental Guidance: Related control: AC-6. (2) IDENTIFICATION AND AUTHENTICATION | NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS The information system implements multifactor authentication for network access to nonprivileged accounts.
(3) IDENTIFICATION AND AUTHENTICATION | LOCAL ACCESS TO PRIVILEGED ACCOUNTS The information system implements multifactor authentication for local access to privileged accounts. Supplemental Guidance: Related control: AC-6.
(4) IDENTIFICATION AND AUTHENTICATION | LOCAL ACCESS TO NON-PRIVILEGED ACCOUNTS The information system implements multifactor authentication for local access to non-privileged accounts.
(5) IDENTIFICATION AND AUTHENTICATION | GROUP AUTHENTICATION The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed. Supplemental Guidance: Requiring individuals to use individual authenticators as a second level of authentication helps organizations to mitigate the risk of using group authenticators.
(6) IDENTIFICATION AND AUTHENTICATION | NETWORK ACCESS TO PRIVILEGED ACCOUNTS - SEPARATE DEVICE The information system implements multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements]. Supplemental Guidance: Related control: AC-6.
(7) IDENTIFICATION AND AUTHENTICATION | NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS - SEPARATE DEVICE The information system implements multifactor authentication for network access to nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements].
(11) IDENTIFICATION AND AUTHENTICATION | REMOTE ACCESS - SEPARATE DEVICE The information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements].
http://www.nextgov.com/topic/ng-defense-depar...cle-topics
Pentagon Warns CEOs: Protect Your Data or Lose Our Contracts
That's right and NIST SP 800-171 baby! This is going to be so friggin HUGE and it's coming THIS YEAR!
I have more, but need to call it for now.
WE ARE GOLDEN!
$SFOR/BST STRONG!!!!
Zerify Inc (ZRFY) Stock Research Links
Parent: https://www.strikeforcetech.com
Subsidiary: https://www.blocksafetech.com