From: Federal Government(Federal)
Basic Details | Start Date31 Jan, 2023 (14 months ago)Due Date10 Feb, 2023 (14 months ago) |
Customer / Agency | |
Attachments (1) | |
(Additional Informaiton Attached)(U) Information Sought (U) AFLCMC/HNC requests industry provide information on available or in development solutions that can be used to provide Short-Term Contract Support for RRK.(U) For each solution, request your company provide information addressing the following:(U) The offeror shall perform and participate in program management, engineering, logistics, safety and cybersecurity activities for the period of performance of the contract. (U) The offeror shall, as part of the engineering process, manage technical processes and plan for, schedule, and conduct technical reviews and audits related to RRK integration, certification, documentation, deployment, and training.(U) Through telephone and, if applicable, on-site support, the offeror shall track common field issues identified and provide updates during regularly scheduled meetings.(U) As required, the offeror shall work with the Government Configuration Manager (CM) to ensure a proper baseline
is managed.(U) . Offeror shall maintain and share field issues and resolution with the Depot Equipment Specialist and System Manager.(U) The offeror shall perform, participate in and support logistics requirements. Typically, data will be required to support field and depot users. (U) For potential software bug fixes addressing issues or anomalies discovered through the end of July 2023. The offeror will execute and provide test plans, procedures, and reports required to verify all RRK requirements incorporating software updates. The offeror shall perform integration and testing to ensure compatibility with existing system components at the earliest opportunity. (U) In accordance with DoDI 5000.02 dated June 8, 2022-Change 1 and with particular emphasis on Enclosure 14, “CYBERSECURITY IN THE DEFENSE ACQUISITION SYSTEM”, the offeror shall pay particular attention to the program and system elements that are vulnerable to cyber targeting. The offeror shall rely on existing cybersecurity standards tailored to reflect analysis of specific program risks and opportunities to determine the level of cyber protections needed for RRK program information, enabling and support systems, and information types that reside in or transit the fielded system. (U) Appropriate cyber threat protection measures include information safeguarding, designed in system protections, supply chain risk management (SCRM), software assurance, hardware assurance, anti-counterfeit practices, anti-tamper (AT), and program security related activities such as information security, operations security (OPSEC), personnel security, physical security, and industrial security.