The Downside of Not Exhausting a $6 Billion Cyber Contract

Maksim Kabakou/Shutterstock.com

Agencies are partially taking advantage of a bulk-price deal to automate network threat-tracking.

Agencies are partially taking advantage of a huge bulk-price governmentwide deal to help automate network vulnerability-tracking and fix problems in real-time, according to federal officials.

If departments underutilize the arguably complex acquisition program, the upshot could be saving money on a potentially $6 billion contract.

But if agencies latch onto the five-year endeavor, they could save money elsewhere, by eliminating the hundreds of millions of dollars currently spent on audit paperwork and incident response, advocates say.

The so-called continuous diagnostics and mitigation project -- funded by the Homeland Security Department -- aims to supply all agencies with products to move from traditional three-year vulnerability checks to three-day fixes.

Parts of DHS itself are using established tools and also must wait for current network surveillance contracts to expire. 

The department’s Transportation Security Administration is working with headquarters and other DHS agencies to identify gaps in threat-tracking to strategize purchases, TSA Deputy Chief Information Officer Jill Vaughan said at an (ISC)2 cyber professional conference earlier this month.

"Each component is a little bit different and farther behind in certain areas," she said. TSA officials "need to look at our existing contract vehicles to determine when is the best kind of stepping off point to leverage the vehicle, depending on which area, so we don’t lose money on our existing contract structures."

By negotiating a blanket purchase agreement last August with 17 contractors who will compete for jobs, the Obama administration strove to damp technology and service prices.

Many agencies for years have been using their own methods to reach the holy grail of ongoing “authorization” – White House memo-speak for managing system risks.

A few years ago, the Transportation Security Administration launched, "CARMA," the cybersecurity assessment and risk management approach, "to try to blend some automated tools together, so we could get kind of our own homegrown tool to start down that path" to automated continuous monitoring "before we knew what the CDM contract vehicle was going to look like," Vaughan said.

The Obama administration's continuous monitoring requirements involve deploying sensors and human experts across the dot-gov domain to check for and reduce vulnerabilities at least every 72 hours. Agencies have a 2017 deadline to achieve continuous monitoring. 

Cyber contracting specialists see the new deal as a potential cost-saver– if it does not bog down the purchasing process.

The procurement was stymied at the start by across the board spending cuts known as sequestration and then by last fall’s government shutdown. “So they are put at a little disadvantage -- and it's just a year anyway -- that might result in less spending but not in a good way,” said John Pescatore, director of Emerging Trends for the SANS Institute. “The use of continuous-monitoring-as-a-service can reduce spending in a good way.”

Among the 17 vendors vying to service agencies are Booz Allen Hamilton, CGI Federal, General Dynamics, Lockheed Martin, Northrop Grumman and SAIC. 

Multiple task orders are expected to be released during the next few months. Only one has come out so far. The $59.5 million order, awarded in January, was for endpoint protection, which involves checking device configurations and making sure patches have been applied to buggy devices. 

The bulk purchasing strategy yielded an average 30 percent savings, compared to traditional General Services Administration pricing for the products bought, DHS officials told Nextgov. Homeland Security has requested $143.5 million from Congress to fund the program for fiscal 2015. 

If DHS has to evaluate 17 proposals for each order and protests happen, “you can easily see how the procurement process could end up being so slow that they just can't spend the money,” Pescatore said. But if the vendors team together and submit fewer proposals, “that would be a good sign that they would meet the goals and spend all the money.”

Current federal law requires manual system inspections every three years and dates back to 2002, when high-profile data breaches were not a daily phenomenon. In 2010, the administration pushed for a move to live surveillance, shortly after the State Department tried the approach. 

Pete Gouldmann, director of information risk programs in State's Office of Information Assurance, said his department will crossbreed internal tools with the new outsourced offerings.

When deploying State’s own operations, officials are “making sure that they are named in the DHS program -- or we’re working directly with DHS on bringing in some products that they have made available to us," he said at the recent event. 

At the very least, agencies should be able to use the contract to obtain lower prices on products they already had licensed, Pescatore said. He cited Tenable Network Security’s Nessus vulnerability scanner and ForeScout’s network access control program as examples of widely used tools.

Dan Waddell, (ISC)2 director of U.S. government affairs, said in an interview that deep utilization of the contract might lag because of hidden costs, such as training and concerns about duplicative spending.

By taking on new vendors, some agencies will lose the contractor teams they have grown to trust. "So, it’s going to take me probably a year to get the new guys up to speed, get comfortable with them. It’s hard to put a dollar figure on those amounts," he said.

Fifty agencies, covering 96.7 percent of the civilian workforce, have signed memoranda of agreement with DHS to use the contract in some capacity, Homeland Security officials said. 

They say the project will benefit agencies regardless of the maturity of their current monitoring approach.  "Participating departments and agencies will be able to enhance their cybersecurity assessments by implementing automated network sensor capacity and prioritizing risk alerts," DHS spokesman S.Y. Lee said. 

Waddell called it "encouraging" that the majority of civilian agencies have agreed to participate, but he said the vision of governmentwide threat-tracking has yet to take shape, he said. 

Under the program, DHS will provide each agency with a diagnostic dashboard, informed by the sensors, so problems can be prioritized. All the data collected will feed into a forthcoming federal-wide dashboard, acquired through a separate contract. That display is expected to become operational early in 2015. 

"We’re still waiting to see what the federal dashboard is going to look like. How agencies will be able to look across data sets horizontally will be critical to helping better prepare them for threats and to respond faster to vulnerabilities," Waddell said.

The next phase of the program will address a people problem – preventing employees from accessing government data they don’t need -- and infrastructure integrity. The final phase will concentrate on handling actual breaches, as well as encryption protections and remote access. 

Waddell said, "Tracking how extensively the BPA is being leveraged across the federal government is important, but of much greater value is being able to chart how the BPA ultimately improves cybersecurity operations and decreases overall risk."

(Image via Maksim Kabakou/Shutterstock.com)

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.