IT System

USA(Alaska)
SYS-4470

RFP Description

The Vendor is required to provide IT systems and subsystems described in section four and their supporting infrastructure, databases, interfaces, and data flows.
- Project initiation and confirmation of scope
•    Schedule and conduct formal kickoff meetings with the division, designated stakeholders, and representatives from the departments managing the IT systems in section four. 
•    Develop and document a detailed project work plan, including milestones, deliverable timelines, and resource assignments, in collaboration with division representatives and the departments managing the in-scope applications. 
•    The work plan should include dates for onsite work. 
•    Define and document communication protocols, escalation paths, and project management tools to be used throughout the project. 
•    Identify and document key risk factors, including infrastructure, vendor interfaces, data flows, database structures, and monitoring processes (intrusion detection system and intrusion prevention system (IDS/IPS), incident response), in consultation with IT and business stakeholders from the relevant departments. 
•    Ensure all assessment activities are aligned with the requirements of institute center and cis controls. 
•    Obtain written approval of the finalized work plan and communication protocols from division prior to commencing substantive assessment activities.
- Asset identification and classification
•    Conduct interviews and workshops with system owners and IT staff from the responsible departments to identify all in-scope assets (hardware, software, databases, interfaces, data flows). 
•    Perform onsite and remote reviews of system inventories, network diagrams, and asset management records specific to these applications and their supporting environments. 
•    Classify each asset based on sensitivity, business impact, and regulatory requirements, referencing the institute controls. 
•    Document asset ownership, criticality, and classification in a structured asset register for each application and ITs department. 
•    Develop and submit data flow diagrams for all critical applications and supporting infrastructure. 
•    Identify and document any gaps in asset inventory or classification.
- Risk assessment methodology
•    Document a risk-based assessment methodology aligned with institute center and cis controls, tailored to the three in-scope applications and their departments. 
•    Define and document risk criteria, ranking, and prioritization methods to be used throughout the engagement. 
•    Conduct risk identification workshops with stakeholders from the department’s responsible departments to capture potential threats and vulnerabilities. 
•    Rate and prioritize risks, documenting rationale and supporting evidence for each risk rating. 
•    Obtain written approval from division for all risk assessment tools and methodologies prior to commencing assessment activities.
- Threat and vulnerability assessment
•    Identify potential internal and external threats through interviews, threat intelligence review, division and analysis of prior incidents, in collaboration with the departments managing the in-scope applications. 
•    Develop and document a “rules of engagement” for penetration testing, including scope, timing, and notification protocols.
•    Perform external and internal penetration tests on state and supporting infrastructure using both automated and manual techniques, with prior written authorization from division. 
•    Tests should have minimal impact on production systems, unless otherwise agreed to by division
•    Conduct comprehensive vulnerability scans of all relevant systems, databases, and network components using industry-standard tools and methodologies aligned with institute center and cis controls. 
•    Validate identified vulnerabilities through manual testing and exploitation (where authorized). 
•    Document detailed findings, including risk ratings, supporting evidence, and recommendations. 
•    Develop a prioritized remediation plan and timeline for all findings.
- Network architecture and security assessment
•    Review and document current network architecture, including segmentation, demilitarized zones (DMZS), and cloud components, as they relate to the in-scope applications and their departments.
•    Evaluate network design, segmentation, and access controls for the in-scope applications and their supporting environments. 
•    Evaluate and review system configurations, firewalls, IDS and IPS, DMZS, and cloud infrastructure security, in addition to access controls through configuration reviews and sample testing. 
•    Assess cloud infrastructure security measures and remote access mechanisms used by the departments managing the applications. 
•    Test for compliance with state security architecture standards, institute center, and cis controls. 
•    Document findings and provide recommendations.
- Application security assessment
•    Review authentication, authorization, and session management mechanisms for each application. 
•    Test for common vulnerabilities using automated and manual methods. 
•    Assess secure coding practices and configuration settings. 
•    Validate input validation and error handling controls. 
•    Document findings and provide recommendations.
- Database security review
•    Review database access controls, encryption, and audit logging for databases supporting the three in-scope applications. 
•    Validate backup and recovery procedures for critical datasets. 
•    Assess compliance with institute controls. 
•    Document findings and provide recommendations.
- Identity and access management (IAM) review
•    Interview IAM owners and relevant IT staff from the departments managing the inscape applications. 
•    Review user provisioning, de-provisioning processes, including periodic access re-certifications. 
•    Assess privileged access management controls and related workflows. 
•    Evaluate authentication mechanisms such as MFA and SSO. 
•    Document findings and provide recommendations.
- Data protection and privacy
•    Review encryption practices, including algorithms and key management, for data associated with the three in-scope applications. 
•    Validate data classification, lifecycle management (retention, archival, destruction), and privacy controls. 
•    Review data destruction processes and compliance with state policy and referenced standards. 
•    Document findings and provide recommendations.
- Cloud security assessment
•    Review identity and access management configurations for cloud environments supporting the in-scope applications. 
•    Assess network segmentation and firewall rules in cloud environments. 
•    Validate encryption and data residency controls. 
•    Document findings and provide recommendations.

Timeline

RFP Posted Date: Friday, 13 Mar, 2026
Proposal Meeting/
Conference Date:
Non-mandatory
Friday, 13 Mar, 2026
Deadline for
Questions/inquiries:
Friday, 20 Mar, 2026
Proposal Due Date: Tuesday, 31 Mar, 2026
Submission via: Not provided
Authority: Government
Acceptable: Only for USA Organization
Work of Performance: Remotely Work
RFP Budget: NA
Contract Term: NA
Download Documents

Similar RFPs


USA(South Carolina)

USA(California)


Never Miss a Government RFP Again

Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.