SOURCES SOUGHT
99 -- Fortify Alternate Sources
- Notice Date
- 8/19/2024 1:45:22 PM
- Notice Type
- Sources Sought
- NAICS
- 513210
—
- Contracting Office
- FA8307 AFLCMC HNCK C3IN SAN ANTONIO TX 78243-7007 USA
- ZIP Code
- 78243-7007
- Solicitation Number
- RFI_HNC_Fortify
- Response Due
- 8/30/2024 6:00:00 AM
- Archive Date
- 09/14/2024
- Point of Contact
- Cassandra Ayala, Karin Werner
- E-Mail Address
-
cassandra.ayala.1@us.af.mil, karin.werner.1@us.af.mil
(cassandra.ayala.1@us.af.mil, karin.werner.1@us.af.mil)
- Description
- Our organization is presently utilizing Fortify Static Code Analyzer (SAST) and Fortify Dynamic Application Security Testing (DAST) for ongoing cybersecurity and testing operations. In our pursuit of identifying possible alternative solutions, we are conducting market research to assess products and services that can fulfill the specific criteria outlined below. The organizational objectives of this research are as follows: Identify and catalog available products and solutions in the market. Evaluate the features, functionality, and pricing of each alternative to determine its suitability for our needs. Assess the level of integration and compatibility of each alternative with our DevSecOps platform, while ensuring compliance with DoD security requirements. Estimate the level of government resources required to migrate to a new solution, while maintaining our current operational capabilities. The following are several key characteristics that we are employing to align with our organizational objectives, as previously stated above. Please note that this list is not comprehensive, but it does offer an overview of some of the most critical requirements for our specific environment: To meet DoD CIO DevSecOps Reference Design compliance and perform continuous cybersecurity and testing activities, the tool must provide the following features: Software must be containerized and deployable through helm charts. Language: should support a wide range of programming languages, including popular languages like Java, C++, Python, and JavaScript, as well as C#, TypeScript, CSS, HTML, Go, PHP, Helm, Java, JavaScript, Python, XML, Terraform, Ruby, Scala, Swift, Objective-C, C, C++, PL/SQL, T-SQL, and VB.NET. This broad language support ensures that the tool can be used across different development environments and can identify vulnerabilities in a variety of codebases. Integration: should be able to integrate with other development tools, such as IDEs, build systems, and CI/CD pipelines. Customization: should allow for customization of rules and policies to align with the organization's security standards. Reporting: should provide comprehensive and actionable reports, highlighting vulnerabilities and prioritizing remediation efforts, Ex: should be able to make RestFUL API calls and trigger code scans and pull down the scan results. Compliance: should support compliance with industry standards, such as OWASP Top 10, SANS Top 25, and PCI DSS. Training and support: should provide training and support resources to help developers understand and remediate vulnerabilities. Speed and efficiency: should be able to analyze code quickly and efficiently, minimizing the impact on development cycles. Needs to support SAML integration for Single Sign-On (SSO). Licensing based on the number of lines of code scanned and no restrictions on # of users or frequency of scanning. Licensing based on the number of lines of code scanned and no restrictions on # of users or frequency of scanning. Static application security test and scan (SAST) Static code analysis Source code linting Source code test coverage CI/CD integration Customizable security scanning and reporting The tool must integrate with various package managers to provide security testing during the build process and applications, but as a minimum package managers must include the following: Maven, Gradle, NuGet, NPM, and RubyGems. Dynamic Application Security Testing (DAST) Web application scanning: should be able to scan web applications and APIs to identify security vulnerabilities such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF). Comprehensive testing: should be able to test all layers of the application stack, including the network, application, and database layers. Automated testing: should be able to automate the testing process, reducing the manual effort required to identify security vulnerabilities. Integration with development tools: should be able to integrate with development tools such as IDEs, build systems, and CI/CD pipelines to provide a seamless integration of security testing into the development process. Reporting and remediation: should be able to provide detailed reports of security vulnerabilities and recommend remediation steps to address them. Support for a wide range of technologies: should support a wide range of technologies, including web application frameworks, programming languages, and protocols, to ensure comprehensive coverage of the application stack. Scalability: should be able to scale to handle large web applications and APIs, as well as multiple applications and services. � � � � � � � � � Our organization will consider both commercial and open-source solutions.
- Web Link
-
SAM.gov Permalink
(https://sam.gov/opp/594be2491c6b4b73978420aaee039ef5/view)
- Place of Performance
- Address: San Antonio, TX, USA
- Country: USA
- Country: USA
- Record
- SN07176831-F 20240821/240819230124 (samdaily.us)
- Source
-
SAM.gov Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's SAM Daily Index Page |