Attachment 1 - SOW - 832469265.1731524331424
Attachment 1 - SOW - 832469265.1731524331424
3. Background.
The Hybrid Cloud Infrastructure supports Department of Defense Systems, Applications, Users, Mission Partners,
and Customers on many types of hardware (physical & virtual) in addition to the operating environments such as
x86, zOS IBM Mainframes, Unisys, SPARC-based Unix, Linux, and Windows Operating systems.
The mission of the Infrastructure Line of Business (IFLOB) is to deploy and sustain the hybrid cloud infrastructure
hardware for over 1100 deployed solutions and 3,500 devices at multiple classifications across the globe.
IFLOB provides network and client solution engineering, workload integration, operations, and sustainment for on-
premises data centers, private cloud, commercial cloud, and government cloud, which can be categorized as Hybrid
Cloud Infrastructures. Our services are provided globally to multiple locations both Contiguous United States
(CONUS) and Outside Contiguous United States (OCONUS). This includes infrastructures both inside DISA data
centers as well as remote non-DISA locations.
To fulfill the IFLOB mission, J-933 requires the contractor to accomplish the tasks and responsibilities outlined in
this document.
4. Objectives.
The objective of this requirement is to procure highly skilled technical services to provide strategic engineering and
operational sustainment of the Hybrid Cloud Infrastructure and it’s hosted client solutions. This includes evaluating,
designing, integrating, implementing, automating, and sustaining a highly redundant and scalable infrastructure to
support the diverse Information Technology (IT) requirements of Department of Defense (DOD) Mission Partners.
All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA guidelines
as defined by the Government.
5. Scope.
The contractor shall support the mission of Infrastructure Line of Business (IFLOB) assisting to provide a reliable,
secured, and consumable Hybrid Cloud Infrastructure that is maintained and operated on 24x7x365. Work
performed by the contractor under this Task Order is intended to be a broad range of technical services to include
evaluating, designing, integrating, implementing, automating, and sustaining a highly redundant and scalable
infrastructure that supports hosted environments of the DOD and our Partners.
The contractor shall be required to access both classified and unclassified systems.
The Government may require surge support during the base or any option period, and surge modifications will be
within the scope of the contract and provide increased support for the defined task areas of this SOW. Surge support
over the life of the contract will not exceed 10% of the contractor’s total proposed cost/price for the base and all
option periods, excluding any six-month extension of services pursuant to FAR 52.217-8.
6. Specific Tasks.
a) Designing client hosted solutions and upgrades to existing network infrastructure (physical and
virtual) as it relates to storage, infrastructure tools, and automation.
b) Supporting network services and products, such as routers, switches, firewalls, web application
firewalls, DNS, email gateways, proxy services, VPN, cryptographic devices, associated device
software and firmware, diagnostic tools, and automation systems.
c) Will provide training and knowledge transfer to the client's IT staff to ensure that they
are able to manage and maintain the network infrastructure. This may include providing
documentation, conducting training sessions, and answering questions.
Performance Standards:
a) STD: 8 Enterprise Network Architect (FTEs)
b) STD: All actions must be done in accordance with official Government guidelines to maintain compliance with
all official TTPs
c) STD: All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA
guidelines as defined by the Government
d) STD: On duty 8x5, Monday - Friday
e) STD: Secret Security Clearance
f) STD: Information Assurance Technical (IAT) Level II
g) STD: DoD Cyber Workforce (DCWF) 8140 compliance
Deliverables:
A001 Task Order Management Plan
A002 Monthly Status Report
A003 Weekly Status Report
A004 Report
a) Have knowledge of computer networking concepts and protocols, and network security
methodologies.
b) Have knowledge of risk management processes (e.g., methods for assessing and
mitigating risk).
c) Have knowledge of national and international laws, regulations, policies, and ethics as
they relate to cybersecurity.
i) The contractor shall attend all stakeholder meetings in support of the workload, or effort,
they are supporting.
a) Provide network design and planning: This involves creating a network design that meets the IFLOB’s
requirements for functionality, performance, and security. The network engineer will need to consider
the current network infrastructure, as well as any future growth or expansion plans.
b) Provide network optimization support which involves reviewing network performance and
capacity to ensure that it can handle the demands placed on it by users and applications.
c) Provide network infrastructure documentation: Will create and maintain documentation for
the network infrastructure. This will involve creating network diagrams, policies, and
procedures, and updating documentation as changes are made to the network infrastructure.
All documents and policies will be submitted to the government for approval.
d) Ensure that all engineering efforts adhere to DISA and DoD policies, and directives from
United States Cyber Command (USCC) and Joint Force Headquarters DODIN (JFHQ-
DODIN).
e) Provide technology evaluation: Will evaluate emerging technologies such as, but are not
limited to, SD-WAN, 5G, and IoT to determine their suitability for the organization's
network infrastructure. This task will involve researching and testing these technologies and
providing a detailed analysis of their potential benefits and drawbacks.
f) Ensure that emerging technologies are implemented in a secure manner. This task will
involve implementing security protocols, such as encryption and authentication, and
ensuring that the network is protected against emerging threats such as IoT-based attacks.
g) Provide pilot and prototype support: Will work with the project stakeholders to understand
the network requirements for the pilot or prototype project, to include but not limited to the
number of users, the types of devices, the expected bandwidth, and the security
requirements. Based on the network requirements, the network engineer will design a
network solution that meets the needs of the pilot or prototype project.
a) Conduct needs assessments and requirements gathering with clients pertaining to their infrastructure
requirements.
b) Design and develop customized infrastructure solutions for hosted client applications
c) Collaborating with other team members, such as project managers, developers, and
architects, to ensure successful solution delivery.
d) Provide guidance and support for network scaling and expansion as the client's network
requirements change. This may include planning for network capacity, selecting appropriate
network hardware and software components, and designing network upgrades.
e) Ensure high level government briefings are attended to attain situational awareness of
government efforts and mission priorities. The contractor needs to ensure that all projects
they are supporting have the latest updates on and that government leadership is tracking any
priority efforts that are not expected to meet mission timelines. The contract should be
prepared to participate in high level briefings for workload they are supporting.
f) Continuously monitor the government directed project management system for project
support requests, project assignments, project tasks/activities, project timelines and
suspense, and project reporting.
g) Provide pilot and prototype support: Will work with the project stakeholders to understand
the network requirements for the pilot or prototype project, to include but not limited to the
number of users, the types of devices, the expected bandwidth, and the security
requirements. Based on the network requirements, the network engineer will design a
network solution that meets the needs of the pilot or prototype project.
a) Define the requirements and specifications for infrastructure tools based on the organization's needs.
b) Research and evaluate available infrastructure tools and technologies.
e) Monitor infrastructure tools to ensure they are functioning properly and meeting
performance and security requirements.
f) Maintain and update infrastructure tools as needed to ensure they continue to meet the
organization's needs.
Requirements: Initial management plan to be developed and approved by the Government with annual updates,
Develop Integrated Management Schedule (IMS) with biweekly updates, Monthly status updates on performance
regarding quality assurance, progress/status of project regarding cost, schedule, and performance.
Deliverables:
The contractor shall be responsible for implementing and deploying the engineering team provided client solutions
and infrastructure design packages for the Hybrid Cloud Infrastructure. This support will be required 8x5 weekly.
Implementation support includes client hosting integration & deployment in addition to transition the workload to an
operational status per J-9 HaC standards for declaring Full Operational Capability (FOC). Also includes deploying
and integrating all infrastructure hardware and configurations.
Performance Standards:
a) STD: 10 Enterprise Network Architect (FTEs)
b) STD: 3 IT Technician II (FTEs)
c) STD: All actions must be done in accordance with official Government guidelines to maintain compliance with
all official TTPs
d) STD: All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA
guidelines as defined by the Government
e) STD: On duty 8x5, Monday - Friday
f) STD: Secret Security Clearance
g) STD: Information Assurance Technical (IAT) Level II
h) STD: DoD Cyber Workforce (DCWF) 8140 compliance
Deliverables:
A001 Task Order Management Plan
A002 Monthly Status Report
A003 Weekly Status Report
A004 Capacity and Performance Report
a) Have knowledge of computer networking concepts and protocols, and network security
methodologies.
b) Have knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
c) Have knowledge of national and international laws, regulations, policies, and ethics as they relate
to cybersecurity.
g) Have knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure
as a Service (IaaS), and Platform as a Service (PaaS).
h) Have knowledge of cloud computing deployment models in private, public, and hybrid
environment and the difference between on-premises and off-premises environments.
b) Deploy the engineered solutions to any of the applicable hybrid cloud managed
infrastructure environments to include On-Premises, Private Cloud, Commercial Cloud, and
Government Cloud.
c) Integrate the new application solution with existing systems and applications. This includes
configuration and initial connectivity testing.
d) Collaborate with other team members, such as project managers, developers, and architects,
and engineers to ensure successful solution delivery.
e) Continuously monitor the government directed project management system for project
support requests, project assignments, project tasks/activities, project timelines and
suspense, and project reporting.
f) Provide pilot and prototype integration support: Will work with the project stakeholders to
understand the network requirements for the pilot or prototype project. Based on the network
requirements, the network engineer will deploy the engineered client solution that meets the
needs of the pilot or prototype project.
a) Deploy the network infrastructure: This involves physically installing and configuring all the
infrastructure hardware and software components of the deployment project.
b) Integrate the new infrastructure with existing systems and applications. This might include
tasks like configuring interfaces, setting up data feeds, and testing connectivity
c) Update network infrastructure documentation. This will involve updating network diagrams,
procedures, and updating documentation as changes are made to the network infrastructure.
All documents and policies will be submitted to the government for approval.
d) Provide pilot and prototype integration support: Will work with the project stakeholders to understand
the network requirements for the pilot or prototype project. Based on the network requirements, the
network engineer will deploy the engineered infrastructure solution that meets the needs of the pilot or
prototype project.
a) Provide client solution testing and validation: This involves testing the network engineering
application integration and deployment project to ensure that it is functioning as expected. This might
include tasks like performing load testing, testing failover and recovery procedures, and validating
security settings.
b) Ensure that any failed testing is resolved before transition the project over to the IFLOB Operations
team.
c) Collaborate with other team members, such as the client solutions engineer, operators, and
architects to ensure successful solution delivery and transition.
a) Provide infrastructure solution testing and validation: This involves testing the engineered
infrastructure solution to ensure that it is functioning as expected. This might include tasks like
performing load testing, testing failover and recovery procedures, and validating security settings.
b) Ensure that any failed testing is resolved before transitioning the newly deployed hardware over to the
IFLOB Operations team.
c) Collaborate with other team members, such as the infrastructure engineer, operators, and
architects to ensure successful solution delivery and transition.
Deliverables:
The contractor shall be responsible for the global 365x24x7 Operations, Maintenance and Sustainment support for
the DISA IFLOB Hybrid Cloud Infrastructure managed environments.
Operations, Maintenance, and Sustainment support includes monitoring the production environments, performing
capacity and performance management, vulnerability management, and sustainment actions for hosted mission
partner services and managed service environments.
Performance Standards:
a) STD: 9 Enterprise Network Architect (FTEs)
b) STD: 6 IT Technician II (FTEs)
c) STD: All actions must be done in accordance with official Government guidelines to maintain compliance with
all official TTPs
d) STD: All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA
guidelines as defined by the Government
e) STD: On duty 365x24x7
f) STD: Secret Security Clearance
g) STD: Information Assurance Technical (IAT) Level II
Deliverables:
A001 Task Order Management Plan
A002 Monthly Status Report
A003 Weekly Status Report
A004 Daily Status Report
A005 Shift Turnover Report
a) Have knowledge of computer networking concepts and protocols, and network security
methodologies.
b) Have knowledge of risk management processes (e.g., methods for assessing and
mitigating risk).
c) Have knowledge of national and international laws, regulations, policies, and ethics as
they relate to cybersecurity.
h) Have knowledge of cloud computing deployment models in private, public, and hybrid
environment and the difference between on-premises and off-premises environments.
i) Provide operations, maintenance & sustainment for the continued optimal systems
performance of the system.
k) Store all documentation in accordance with government records management and storage
process.
l) The contractor shall attend all stakeholder meetings in support of the workload, or effort,
they are supporting.
c) Monitor and perform system modifications and upgrades to the production systems
because of preventive or corrective maintenance.
e) Once a network wide outage is determined, notification to the Government within 10 minutes is
required. Any required design modifications shall be requested through the normal change
management process.
f) Participate in shift turnover processes for each of the shift changes occurring daily for which any of
their staff are working.
g) Contractor shall provide information or documentation to the turnover lead concerning the status of
any task completed or still in work, as well as any issues encountered during the shift.
h) Contractor shall escalate any issue occurring during a shift immediately and not wait until shift
turnover.
i) Develop a systematic approach and metrics for tracking defect rates, resolution times and release
cycles, and document and implement fixes.
j) Provide a daily System Status Report of all ASI’s, unscheduled outages, Hazardous Conditions
(HAZCONs), and other data as requested by the Government.
k) Work Return Material Authorization (RMA) of infrastructure equipment that has failed.
l) Maintain a daily Incident report by using DISA approved ticket management system in accordance
with the DISA Incident Management process. All trouble calls shall be logged and tracked through
resolution. Upon notification of incidents the Contractor shall respond within 15 minutes to update
actions and mark the ticket status to “In Progress”. All priority 1 and 2 tickets shall be updated
hourly, unless otherwise marked deferred or referred. All other tickets shall follow DISA Incident
Ticket processes for updates, unless otherwise marked deferred or referred. Once the issue is
resolved, immediate notification and ticket updates shall be made.
m) Conduct trend analysis on the system to aid in the prevention of network degradations and outages as
well as recommend configuration/administration changes to the Government based on the
continuous monitoring of the system. No updates or changes shall be made without CCB approval.
n) Recommend and document corrective actions for system improvements to include security, stability,
capacity, throughput, and performance.
a) Manage and maintain approved patches and updates, as well as remediating infrastructure
vulnerabilities.
f) Ensure application of security patches for commercial products integrated into system
design meet the timelines dictated by management authority for the intended operational
environment.
g) Test, implement, and assess the impact of software/hardware patches, upgrades, fixes, and
enhancements; software and hardware change verification and releases in accordance with
an established Configuration Management (CM) plan.
h) Prepare and manage maintenance releases IAW the DoD/DISA Release Management Plan
(RMP) and process.
i) Perform failover and redundancy testing of Hybrid Cloud Infrastructure environments annually.
j) Provide Life Cycle Support (LCS) for the system and document all security guideline
violations and incidents to the Government Leads via the Security Requirements Report
monthly.
b) Implement new system design procedures, test procedures, and quality standards.
d) Configure and optimize infrastructure equipment, both hardware based and virtualized, to
include routers, switches, firewalls, load balancers, application layer gateways, email
security appliances, and DNS appliances.
e) Work change request and maintain accurate configuration and documentation for all
changes, services, and applications.
f) Submit a Change Request (CR) prior to modification showing the purpose, background, detailed
scope, and recommended change. Change Requests require approval from peers and leads before
proceeding shall comply with the Configuration Control Board (CCB) processes.
k) Ensure changes follow government change management processes are properly categorized and
documented from start to completion.
l) Use government owned data to perform and provide change request audits, develop metrics, and
trend analysis to understand change implementation management workload, effectiveness,
efficiency, and service target performance.
Deliverables:
The contractor shall provide Subject Matter Expert (SME) support for specific workloads as required by mission
needs. To meet the needs of our Mission Partners, DISA offers a dedicated labor service. This service focuses
engineer’s actions on only specific mission partners’ requirements.
The current dedicated labor supported Mission Partners are listed in subtasks below and may increase or decrease in-
scope based on Mission Partner services being procured or decommissioned.
a) Have knowledge of computer networking concepts and protocols, and network security
methodologies.
b) Have knowledge of risk management processes (e.g., methods for assessing and
mitigating risk).
c) Have knowledge of national and international laws, regulations, policies, and ethics as
they relate to cybersecurity.
d) Have knowledge of cybersecurity principles.
e) Have knowledge of cyber threats and vulnerabilities.
f) Have knowledge of specific operational impacts of cybersecurity lapses.
g) Have knowledge of cloud computing service models Software as a Service (SaaS),
Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).
h) Have knowledge of cloud computing deployment models in private, public, and hybrid
environment and the difference between on-premises and off-premises environments.
Performance Standards:
a) STD: 6 IT Technician II FTEs
b) STD: All actions must be done in accordance with official Government guidelines to maintain compliance with
all official TTPs
c) STD: All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA
guidelines as defined by the Government.
Deliverables:
A001 Task Order Management Plan
A002 Monthly Status Report
A003 Weekly Status Report
A004 Daily Status Report
A005 Shift Turnover Report
a) Provide dedicated network engineering support to the DHA Mission Partner relating to the
architecture, infrastructure, design, configuration, implementation, sustainment,
performance, and operations of the DHA network infrastructure solutions.
b) Provide network infrastructure support for all DHA environments (Production, Continuity
of Operations (COOP), Development, and Test).
c) Configure and optimize infrastructure equipment, both hardware based and virtualized, to
include routers, switches, firewalls, load balancers, application layer gateways, email
security appliances, and DNS appliances.
g) Provide Load Balancer Operations and Maintenance to include Virtual Services, STIG,
Patching, Upgrades, DTOs, Certificate Lifecycle Support (DOD and Commercial SSL
Certs), and WAF
k) Manage, maintain, and publish approved patches, updates, changes, and new
capabilities/baselines to production.
l) Patch infrastructure vulnerabilities in accordance with DISA STIG, Scan Reports of Cyber
Vulnerabilities, Directives and Orders, IAVMs, and vendor recommendations based on
known bug findings.
m) Ensure application of security patches for commercial products integrated into system
design meet the timelines dictated by management authority for the intended operational
environment.
n) Test, implement, and assess the impact of software/hardware patches, upgrades, fixes, and
enhancements; software and hardware change verification and releases in accordance with
an established Configuration Management (CM) plan.
6.4.2 Subtask 2. United States Army (USA) Integrated Personnel and Pay Systems (IPPS-A)
Performance Standards:
a) STD: 2 IT Technician II FTEs
b) STD: All actions must be done in accordance with official Government guidelines to maintain compliance with
all official TTPs
c) STD: All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA
guidelines as defined by the Government
Deliverables:
A001 Task Order Management Plan
A002 Monthly Status Report
A003 Weekly Status Report
A004 Daily Status Report
a) Provide dedicated network engineering support to the IPPS-A System Implementer and Program
Management Office relating to the architecture, infrastructure, design, configuration,
implementation, sustainment, performance, and operations of the IPPS-A network infrastructure
solutions.
b) Provide network infrastructure support for all IPPS-A environments (Production, Continuity of
Operations (COOP), Development, and Test).
c) Configure and optimize infrastructure equipment, both hardware based and virtualized, to
include routers, switches, firewalls, load balancers, application layer gateways, email security
appliances, and DNS appliances.
f) Provide Oracle Super Cluster (OSC) design, configuration, implementation, and sustainment
support.
h) Provide Load Balancer Operations and Maintenance to include Virtual Services, STIG, Patching,
Upgrades, DTOs, Certificate Lifecycle Support (DOD and Commercial SSL Certs), and WAF
l) Manage, maintain, and publish approved patches, updates, changes, and new
capabilities/baselines to production.
m) Patch infrastructure vulnerabilities in accordance with DISA STIG, Scan Reports of Cyber
Vulnerabilities, Directives and Orders, IAVMs, and vendor recommendations based on known
bug findings.
n) Ensure application of security patches for commercial products integrated into system design
meet the timelines dictated by management authority for the intended operational environment.
o) Test, implement, and assess the impact of software/hardware patches, upgrades, fixes and
enhancements; software and hardware change verification and releases in accordance with an
established Configuration Management (CM) plan.
6.4.3 Subtask 3. United States Air Force (USAF) Defense Enterprise Accounting and Management System
(DEAMS)
Performance Standards:
a) STD: 1 Enterprise Network Architect FTEs
b) STD: All actions must be done in accordance with official Government guidelines to maintain compliance with
all official TTPs
c) STD: All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA
guidelines as defined by the Government.
d) STD: On duty 8x5 (2-hour callback)
e) STD: Secret Security Clearance
f) STD: Dedicated Labor
g) STD: Information Assurance Technical (IAT) Level II
Deliverables:
A001 Task Order Management Plan
A002 Monthly Status Report
A003 Weekly Status Report
A004 Daily Status Report
a) Provide dedicated network engineering support to the DEAMS System Implementer and
Program Management Office relating to the architecture, infrastructure, design, configuration,
implementation, sustainment, performance, and operations of the DEAMS network infrastructure
solutions.
b) Provide network infrastructure support for all DEAMS environments (Production, Continuity of
Operations (COOP), Development, and Test).
c) Configure and optimize infrastructure equipment, both hardware based and virtualized, to
include routers, switches, firewalls, load balancers, application layer gateways, email security
appliances, and DNS appliances.
f) Provide Oracle Super Cluster (OSC) design, configuration, implementation, and sustainment
support.
h) Provide Load Balancer Operations and Maintenance to include Virtual Services, STIG, Patching,
Upgrades, DTOs, Certificate Lifecycle Support (DOD and Commercial SSL Certs), and WAF.
m) Patch infrastructure vulnerabilities in accordance with DISA STIG, Scan Reports of Cyber
Vulnerabilities, Directives and Orders, IAVMs, and vendor recommendations based on known
bug findings.
n) Ensure application of security patches for commercial products integrated into system design
meet the timelines dictated by management authority for the intended operational environment.
o) Test, implement, and assess the impact of software/hardware patches, upgrades, fixes and
enhancements; software and hardware change verification and releases in accordance with an
established Configuration Management (CM) plan.
6.4.4 Subtask 4. United States Space Force (USSF) Global Broadcast Service (GBS)
Performance Standards:
a) STD: 2 IT Technician II FTEs
b) STD: All actions must be done in accordance with official Government guidelines to maintain compliance with
all official TTPs
c) STD: All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA
guidelines as defined by the Government.
d) STD: On duty 8x5 (2-hour callback)
e) STD: Secret Security Clearance
f) STD: Dedicated Labor
g) STD: Information Assurance Technical (IAT) Level II
Deliverables:
A001 Task Order Management Plan
A002 Monthly Status Report
A003 Weekly Status Report
A004 Daily Status Report
a) Provide dedicated network engineering support to the GBS Mission Partner relating to
the architecture, infrastructure, design, configuration, implementation, sustainment, performance, and
operations of the GBS network infrastructure solutions.
c) Configure and optimize infrastructure equipment, both hardware based and virtualized,
to include routers, switches, firewalls, load balancers, application layer gateways, email security
appliances, and DNS appliances.
h) Provide support for GBS Route Reflection Routers, Collocated Routers, and switches.
o) Manage, maintain, and publish approved patches, updates, changes, and new
capabilities/baselines to production.
q) Ensure application of security patches for commercial products integrated into system
design meet the timelines dictated by management authority for the intended operational environment.
r) Test, implement, and assess the impact of software/hardware patches, upgrades, fixes,
and enhancements; software and hardware change verification and releases in accordance with an
established Configuration Management (CM) plan.
Performance Standards:
a) STD: 1 Enterprise Network Architect FTE
b) STD: 2 IT Technician II FTEs
c) STD: All actions must be done in accordance with official Government guidelines to maintain compliance with
all official TTPs
d) STD: All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA
guidelines as defined by the Government.
e) STD: On duty 8x5 (2-hour callback)
f) STD: Secret Security Clearance
g) STD: Dedicated Labor
h) STD: Information Assurance Technical (IAT) Level II
Deliverables:
A001 Task Order Management Plan
A002 Monthly Status Report
A003 Weekly Status Report
A004 Daily Status Report
c) Configure and optimize infrastructure equipment, both hardware based and virtualized,
to include routers, switches, firewalls, load balancers, application layer gateways, email security
appliances, and DNS appliances.
g) Provide Load Balancer Operations and Maintenance to include Virtual Services, STIG,
Patching, Upgrades, DTOs, Certificate Lifecycle Support (DOD and Commercial SSL Certs), and WAF
h) Provide support for STRATUS Firewalls, Forward Proxies, and Load Balancers.
n) Manage, maintain, and publish approved patches, updates, changes, and new
capabilities/baselines to production.
p) Ensure application of security patches for commercial products integrated into system
design meet the timelines dictated by management authority for the intended operational environment.
q) Test, implement, and assess the impact of software/hardware patches, upgrades, fixes,
and enhancements; software and hardware change verification and releases in accordance with an
established Configuration Management (CM) plan.
Performance Standards:
a) STD: 2 IT Technician II FTEs
b) STD: All actions must be done in accordance with official Government guidelines to maintain compliance with
all official TTPs
c) STD: All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA
guidelines as defined by the Government.
d) STD: On duty 8x5 (2-hour callback)
e) STD: Secret Security Clearance
f) STD: Dedicated Labor
g) STD: Information Assurance Technical (IAT) Level II
Deliverables:
A001 Task Order Management Plan
A002 Monthly Status Report
A003 Weekly Status Report
A004 Daily Status Report
c) Configure and optimize infrastructure equipment, both hardware based and virtualized,
to include routers, switches, firewalls, load balancers, application layer gateways, email security
appliances, and DNS appliances.
g) Provide Load Balancers Operations and Maintenance to include Virtual Services, STIG,
Patching, Upgrades, DTOs, Certificate Lifecycle Support (DOD and Commercial SSL Certs), and WAF
h) Provide support for ZND Firewalls, Load Balancers, switches, and email security
appliance.
l) Manage, maintain, and publish approved patches, updates, changes, and new
capabilities/baselines to production.
o) Test, implement, and assess the impact of software/hardware patches, upgrades, fixes,
and enhancements; software and hardware change verification and releases in accordance with an
established Configuration Management (CM) plan.
6.4.7 Subtask 7. DISA Secure Cloud Computing (SCCA) Architecture Boundary Cloud Access Point (BCAP)
Performance Standards:
a) STD: 1 Enterprise Network Architect FTE
b) STD: 3 IT Technician II FTEs
c) STD: All actions must be done in accordance with official Government guidelines to maintain compliance with
all official TTPs
d) STD: All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA
guidelines as defined by the Government.
e) STD: On duty 8x5 (2-hour callback)
f) STD: Secret Security Clearance
g) STD: Dedicated Labor
h) STD: Information Assurance Technical (IAT) Level II
Deliverables:
A001 Task Order Management Plan
A002 Monthly Status Report
A003 Weekly Status Report
A004 Daily Status Report
c) Configure and optimize infrastructure equipment, both hardware based and virtualized,
to include routers, switches, firewalls, load balancers, application layer gateways, email security
appliances, and DNS appliances.
g) Provide Load Balancer Operations and Maintenance to include Virtual Services, STIG,
Patching, Upgrades, DTOs, Certificate Lifecycle Support (DOD and Commercial SSL Certs), and WAF
h) Provide support for SCCA BCAP Routers, Firewalls, and Load Balancers
j) Provide support for Mission Partner’s Sustainment Requirement through the DISA
SCCA BCAPs.
n) Manage, maintain, and publish approved patches, updates, changes, and new
capabilities/baselines to production.
p) Ensure application of security patches for commercial products integrated into system
design meet the timelines dictated by management authority for the intended operational environment.
q) Test, implement, and assess the impact of software/hardware patches, upgrades, fixes,
and enhancements; software and hardware change verification and releases in accordance with an
established Configuration Management (CM) plan.
Performance Standards:
a) STD: 7 Enterprise Network Architect FTEs
b) STD: All actions must be done in accordance with official Government guidelines to maintain compliance with
all official TTPs
c) STD: All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA
guidelines as defined by the Government.
d) STD: On duty 8x5 (2-hour callback)
e) STD: Secret Security Clearance
f) STD: Dedicated Labor
g) STD: Information Assurance Technical (IAT) Level II
Deliverables:
A001 Task Order Management Plan
A002 Monthly Status Report
A003 Weekly Status Report
A004 Daily Status Report
A006 WAF Migration Checklist
c) Execute the WAF Design Solution and deployment per the WAF Design Guide.
d) Shall execute WAF program tasks in accordance with the most recent
OPORD/FRAGORD/TASKORD/STIG and other relevant issued DISA policy guidance, to include the
WAF Break and Inspect Framework.
e) Provide support to the DISA engineering peers and other DISA counterparts on policies,
procedures, and operational concerns regarding WAF configurations and supported applications as well as
future migrations for new and existing Business.
g) Provide implementation solution documents and WAF subject matter expertise for the
configuration and maintenance of DISA hosted Application Delivery Controllers to include software
modules such as load Balancer BIG-IP Local Traffic Manager (LTM), Global Traffic Manager (GTM),
Access Policy Manager (APM), and Application Security Manager (ASM) modules.
i) Provide guidance regarding administration, optimization, and failover for the production
configurations. The contractor shall provide WAF subject matter expertise that will test and optimize the
Governments effort.
k) Maintain and update application and network discovery to include a WAF Migration
Checklist.
l) Update Technology Security Groups and Security Policies as new application categories
are discovered.
n) Follow current Government processes and assist in the development of new processes
for building WAF policies and detailed troubleshooting steps after implementation. The contractor shall
provide sustainment and engineering support during migration ASIs.
p) Work with DISA engineers to provide engineering support for WAF standardization
settings, global settings, associating technology groups to applications, analyzing learning suggestions,
and aligning security policy.
q) Provide project direction, general guidance, and customer engagement for security
policy modifications.
r) Provide change ownership for security policy modifications, Attack Signature analysis
and recommendations, and policy exception processing.
s) Perform inventory control for applications, security policies, and policy groupings.
w) Provide engineering support for WAF readiness and security policy readiness.
y) Provide engineering support for WAF security policy readiness activities including
creating and applying WAF security policy to the Virtual Server, reviewing learning suggestions,
producing, and reviewing Exception Readiness Report (ERR) with mission partner(s), and notifying for
blocking readiness.
aa) Provide engineering support to sustain WAF blocking security policy including
completion of all steps involved in the security policy implementation process, monitoring exception
policy reports, maintaining Application Security Modules (ASMs), and configuring ASMs.
bb) Provide analysis, implementation, and monitoring for vendor released security updates.
cc) Submit a Change Request (CR) prior to modification showing the purpose, background,
detailed scope, and recommended change. Change Requests require approval from peers and leads before
proceeding shall comply with the Configuration Control Board (CCB) processes.
dd) Maintain a daily Incident report by using DISA approved ticket management system in
accordance with the DISA WAF ticketing process. All trouble calls shall be logged and tracked through
resolution. Upon notification of incidents the Contractor shall respond within 15 minutes to update actions
and mark the ticket status to “In Progress”. Once the issue is resolved, immediate notification and ticket
updates shall be made.
Deliverables:
SOW Task# Deliverable Format Due Date Distribution/ Copies Frequency and
Title Remarks
6.4 Task Order A001 Draft – 15 days Standard Distribution* Draft - 15
6.4.1 Management after Award Final – 30
through6.4.8 Plan Final – 30 days
after Award
6.4 Monthly A002/Govt on 5th workday COR, KO, Standard Monthly
6.4.1 Status Report distribution to
through6.4.8 Government Leads
6.4 Weekly Status A003/Govt By 1600 E Government Leads Weekly
6.4.1 Report Friday
through6.4.8
6.4 Daily Status A004/Govt By 1600 E Government Leads Daily
6.4.1 Report
through6.4.8
6.4.1 Shift A005/Govt Close of Government Leads 3x Daily
Turnover Business each and Operations,
Report Shift - Day Shift Maintenance and
(1600 E), Swing Sustainment
Shift (Midnight Distribution List
E), Mid Shift
(0800 E)
6.4.8 WAF A006/Govt 5 Business days Government Leads As requested
Migration prior to
Checklist implementation
*Standard Distribution: 1 copy of the transmittal letter with the deliverable to the Primary COR.
The contractor shall be responsible for developing and implementing automated solutions, monitoring, and
optimizing network performance, ensuring security and compliance, and collaborating with cross-functional teams
to streamline network operations, enhance efficiency and reliability, and ensure compliance with DoD standards and
policies using automation.
Performance Standards:
a) STD: 4 Automation Engineer FTEs
b) STD: All actions must be done in accordance with official Government guidelines to maintain compliance with
all official TTPs
c) STD: All engineering tasks must comply with the following guidelines: FISMA, NIST, RMF, and other DISA
guidelines as defined by the Government
d) STD: On duty 8x5 (2-hour callback)
e) STD: Secret Security Clearance
f) STD: Information Assurance Technical (IAT) Level II
Deliverables:
A001 Task Order Management Plan
A002 Monthly Status Report
A003 Weekly Status Report
A004 Daily Status Report
a) Have knowledge of computer networking concepts and protocols, and network security
methodologies.
Deliverables:
a) Hold qualifications for any applicable/selected GSA MAS Labor Category listed below
to meet all tasks in the contract. Personnel assigned to or utilized by the contractor in the performance of
this order shall, as a minimum, meet the experience, educational, or other background requirements
associated with the applicable/selected GSA MAS Labor Categories set forth below, and will be fully
capable of performing in an efficient, reliable, and professional manner.
SOW Task# FTEs Applicable GSA MAS Labor Categories DISA Locations
6.1, 6.2, 6.3, 6.4 37 Enterprise Network Architect Gunter AFB, Alabama
Fort Meade, Maryland
Technical Architect Columbus, Ohio
Tinker AFB, Oklahoma
Senior Network Engineer Mechanicsburg, Pennsylvania
San Antonio, Texas
Systems Security Engineer and Network Hill AFB, Utah
Engineer
System Engineer II
System Engineer IV
System Engineer 5
6.1, 6.2, 6.3, 6.4 26 IT Technician II Gunter AFB, Alabama
Fort Meade, Maryland
Network Engineer Columbus, Ohio
Tinker AFB, Oklahoma
Network Engineer II Mechanicsburg, Pennsylvania
San Antonio, Texas
Network Engineer – Intermediate Hill AFB, Utah
Security Engineer
Cloud Network Engineer
System Administrator 1
System Administrator II
System Administrator IV
System Administrator 5
Deliverables:
A002 Monthly Status Report
A007 Hybrid Cloud Network Infrastructure Familiarization and Technology Training Certification
A008 Hardware/Software Specific Competency Certification
Monthly NDA Status Report
VAR
TAR Travel Expense Report
A009 Staff Report
6.71–For all tasks assignments and performance within scope of Tasks 6.1, 6.2, 6.3, 6.4 and 6.5Contractor
shall be responsible for start to finish management of their staff's task performance to ensure DISA or
Mission Partner requirements are fulfilled. Contractor shall plan for all tasks in order to prepare their staff
to execute tasks to DISA or Mission Partner requirements and milestones. Contractor shall continuously
monitor and control their work in progress to identify in advance variances or potential risks to schedule,
quality or other results that may require corrective actions and/or notification or escalation to DISA or
Mission Partner stakeholders. Contractor shall provide task status or progress updates as requested by DISA
or Mission Partner stakeholders.
- Monthly Status Report (MSRs). The contractor shall provide a MSR that will capture
accomplishments over the past month and planned objectives for the next month, issues or
risks, deliverable updates, mandatory training updates, faces and spaces updates, vacancy
reporting and updates to Government Furnished Equipment for personnel. The contractor
shall submit the MSR to the Contracting Office Representative (COR) within 5 calendar
days of the end of the reporting period. The report will be provided in a Government
generated template.
6.1.3.3 DOD 8140/8570 Certifications, CE/NE Compliance. Contractor shall on an ongoing basis manage and
monitor compliance of all their staff in obtaining and maintaining any DISA mandated certifications or training
in accordance with DOD 8140 and 8570 directives.
6.1.3.4 – DOD ID Card. Contractor shall on an ongoing basis manage and monitor the expiration dates of all
of their staff's DOD identification cards. Contractor shall identify expiring identification cards in advance
and retain oversight of all staff to ensure renewal activities are being scheduled and completed before
expiration.
6.1.3.5 – DISA Network Tokens. Contractor shall on an ongoing basis manage and monitor all their
staff in obtaining and maintaining network tokens per DISA processes for access to all networks
required for duty performance.
6.1.3.6 – DISA Non-Disclosure Agreements (NDA). During performance of duties, Contractor may
encounter information that cannot be disclosed outside of authorized channels per DISA instructions or per
Government policy. All Contractor staff are required to sign a DISA NDA, which is a pre-requisite for the
network access to perform Tasks 6.1, 6.2 and 6.3. Contractor shall initiate signed NDA by all employees, to
include uploading per DISA instructions to the system of record. Contractor shall perform ongoing monitoring
of NDA status of all staff to ensure 100% compliance.
6.1.3.7 – Security Clearances. Contractor shall on an ongoing basis manage and monitor the security clearance
status for all employees. Contractor shall identify clearance reviews coming due in advance and retain oversight
of staff to ensure renewal activities are being scheduled and completed.
6.1.3.8 – Visitor Access Requests (VAR). Contractor shall provide a VAR to the COR as described in the
Security
Section of this SOW prior to award or option year renewal or at least 10 working days before inclusion or
transfer of Contractor employee and 48 hours after employee departure from the contract . Contractor
shall on an ongoing basis manage and monitor the status of all staff's visit access requests (VAR), and take
actions to ensure they are continuously up to date in advance of expiration.
Deliverable: VAR
6.1.3.9 – Travel Access Requests (TAR). Travel to perform duties at temporary work locations is non-
routine, but possible for Contractor personnel to support Mission Partner or DISA requirements. Contractor
shall request travel authorization from the Government in advance of any travel by submittal of Travel Access
Request to the COR. Upon completion of travel, Contractor shall submit Travel Expense Report to the
Government to initiate reimbursement for travel expenses incurred.
6.1.3.10 – Contractor Staff Online Status Monitoring. DISA utilizes various collaboration and
other tools capable of DISA management monitoring the online presence, availability to work, and
status of all staff.
Contractor shall, as instructed by DISA, enable and utilize such tools to allow DISA to monitor the online
status of Contractor personnel.
Deliverables: Staff Report
6.1.3.11 – Government Furnished Equipment. Contractor shall manage all government furnished equipment
(GFE) for all staff per contract provisions and DISA mandated processes and procedures.
6.1.3.12 – Government Notification of Expiration or Lapse. For any access credential or job prerequisite for
any staff that the contractor identifies shall likely expire or lapse, the contractor shall within one business day
of identification notify the government of pending expiration or lapse and the plan and anticipated schedule for
credential renewal. As long as any Contractor staff's credentials are in a lapsed or expired state, Contractor shall
provide ongoing status updates to Government until renewal is fully accomplished.
6.1.3.13 – Government System Usage. Contractor shall gain access and utilize all DISA mandated systems in-
volved in the approval, acquisition, and maintenance of all access credentials and other job prerequisites, to
include uploading evidence of completion as mandated by DISA.
6.1.4 – Transitioning
The contractor shall create a detailed phase in transition strategy plan for assuming responsibility of
the contract upon award. The Phase In Transition Plan (Plan) shall be provided with the proposal
and shall be incorporated into the contract either as an attachment or full text. The plan must
identify and encompass all tasks to be performed by the awardee. The Plan should include a list of
any questions posed to or information required from the Government. The Plan should also clearly
identify the timelines when the VARs for the contractor’s staff will be submitted and when the
contractor’s staff are estimated to be actively conducting performance, hereafter referred to as “in
seat”. The Plan shall include dates for staffing achievements and the corresponding number of
employees in seat. The Plan will be used to assess compliance with the contract and the application
of incentives/disincentives during contract performance. The Plan will lay out dates for future status
meetings and program reviews, etc. It will include, but is not limited to, details about the timely
transition of responsibility such as requirements, deliverables, staffing positions with qualified
people, and a schedule that meets the requirements of the SOW.
The contractor shall be responsible for all performance and staff in seat 30 calendar days after award,
i.e. after the 30 calendar day phase in transition period. The awardee shall use the 30 calendar day
phase in transition period to hire and clear contractor personnel to work on the contract. Fifty percent
(50%) of total staffing must be cleared through the VAR process and “in seat” on the first day of
contract performance. 100 percent (100%) of total staffing must be “in seat” no later than 30
calendar days after the base period of performance’s start date.
The Government acknowledges that the VAR process is dependent on the Government’s timely
processing of VAR requests. The Government’s goal is to process a VAR request no later than 7
calendar days after a VAR’s submittal. If the VAR request takes longer than 7 calendar days, the
respective employee will be temporarily considered towards meeting the staffing goals until the
VAR is either approved or rejected by the Government. Please note, internal moving of employees
to other, possibly senior positions, does not restart the VAR process for the purposes of assessing
disincentives and monitoring staffing requirements. To illustrate this point, if a contractor
employee, e.g. Amy, is promoted on 1/1/2023 to take the place of a position vacated by another
employee, e.g. Matt, on 12/15/2022, the staffing timeline is established by Matt’s departure date
(12/15/2022) and is not “restarted” on 1/1/2023, i.e. Amy’s promotion date.
6.1.4.2 Phase-Out Transition Plan. The contractor shall create a detailed phase-out plan describing the
method of transferring responsibility for tasks described in the Statement of Work (SOW). The
phase-out plan will assist the Government in the transition of services from this contract to any
CUI
follow-on contractor or government team. The transition strategy must provide for
completing the transition of all data by, or before, the end of the existing con- tract's
period of performance. The contractor shall coordinate service transition with any
follow-on contractor or government team to prevent service disruption during the
transition. The contractor shall provide a phase-out plan based on these criteria.
The contractor shall meet with the Government within 120 days of the end of the last
option period of performance to plan the transition strategy. The contractor shall provide
a written transition plan within 90 days prior to the end of last option period of
performance.
The contractor shall conduct a joint inventory with government personnel of all
government- furnished property. The contractor shall deliver to the government COR a final
inventory of all government furnished property No Later Than (NLT) 90 business days
before the end of contract performance. The contractor shall permit current employees to be
interviewed for possible employment by a successor contractor.
Deliverables:
6.7 Visit Access Attached Format Pre-start of One Copy to COR As needed per
Request performance or employee
(VAR) option execution.
10 days in
advance of any
new employee start
6.7 Travel Attached format At least 10 days One Copy to COR Per Trip
Authori prior to any travel
zation
Request
(TAR)
6.7 Staff Report A009 on 5th workday COR, KO, Standard Monthly
distribution to
Government Leads
*Standard Distribution: 1 copy of the transmittal letter with the deliverable to the Primary COR.
7. Performance Standards.
Accepted by COR
Page 32 of 48 Pages
CUI
CUI
week.
Accepted by COR
Page 35 of 48 Pages
CUI
CUI
Accepted by COR
Accepted by COR
6.4.8 (WAF)
Page 36 of 48 Pages
CUI
CUI
Accepted by COR
Accepted by COR
8. Place of Performance.
Primary Place of Performance. Work shall be performed on-site within the following facilities:
Mission Location:
DISA Gunter-Maxwell AFB, 01 East Moore Drive Bldg 857, Maxwell AFB Gunter Annex Montgomery, AL 36114
DISA Fort Meade, 6910 Cooper Ave, Fort Meade, MD 20755
DISA Columbus, Defense Supply Center, 3990 E Broad Street, Columbus, OH 43218
DISA at Tinker AFB, 8705 Industrial Blvd, BLDG 3900 Oklahoma City, OK
DISA at Naval Support Activity, 5450 Carlise Pike, Mechanicsburg, PA 17050
DISA at Joint Base San Antonio, 3326 General Hudnell Dr, San Antonio, TX 78226
DISA at Hill AFB, 7981 Georgia St, Hill AFB, UT 84056
All Contractor work related to this SOW shall be completed at Government-provided facilities as listed in the
Section 8 (Place of Performance) in the SOW, unless a Remote Work Waiver is granted IAW the below:
Alternative work sites allow for regular telework or remote work flexibilities. Regardless of where work is
performed, the Contractor shall ensure that work is completed effectively and that mission needs and requirements
are met, without degradation of services. Also, the contractor may be required to account for the physical location of
their personnel should this information be requested by the COR. The Contractor shall propose on-site rates for all
work performed at an alternative work site. Incidental charges incurred while working at an alternative work site
(e.g., electricity, internet) are not allocable to the contract and shall not be billed to the government.
Remote Work – Contractor shall attempt to fill all positions at the locations specified in the Place of Performance
within this SOW. The deviation to allow for remote work is limited and shall only be approved on a case-by-case
basis—there is no authorization for blanket remote work waiver approval. Therefore, the Contractor shall submit the
completed Remote Waiver form that details the following information: the Contract/Task Order, Contractor Name,
Position, Primary Place of Performance, SOW Section supported, requested remote work location (Residence,
Contractor Facility, Other (please specify)), Reason for Remote Waiver request. This form shall be submitted via
email to the COR.
The COR/ACOR shall coordinate with both the LOB Chief and respond back in writing before remote work is
authorized. No remote work may begin until the COR provides written authorization. In some cases, remote work
may be limited to specific SOW sections. In the event tasks require access to classified networks, remote work
positions shall only be approved for locations within 120 minutes from an approved DISA site.
On this task order, employees who support SOW Task 6.1, 6.2, 6.3, 6.4, 6.5, and 6.6 may request a Remote Work
Waiver; however, all other SOW Tasks shall be performed at the specified location in the SOW.
Alternate Place of Performance - Contingency Only. As determined by the COR, contractor employees may be
required to work at an alternate place of performance (e.g., home, the contractor's facility, or another approved
activity within the local travel area) in cases of unforeseen conditions or contingencies (e.g., pandemic conditions,
exercises, government closure due to inclement weather, etc.). Non-emergency/non-essential contractors should not
report to a closed government facility. Contractor shall prepare all deliverables and other contract documentation
utilizing contractor resources. To the extent possible, the contractor shall use best efforts to provide the same level
of support as stated in the SOW. In the event the services are impacted, reduced, compromised, etc., the Contracting
Officer or the contractor may request an equitable adjustment pursuant to the Changes clause of the contract.
Travel in and around the primary place of performance may be required throughout the period of performance. TDY
costs shall not be reimbursed for travel less than 150 miles within the primary place of performance. Moreover,
Page 38 of 48 Pages
CUI
CUI
TDY costs shall not be reimbursed for any personnel with a remote work waiver. Additional travel within CONUS
may be required to support the requirements of this SOW.
In the Monthly Status Report, report the status of personnel who work on this contract under an approved remote
work waiver. This information should include Contractor Employee Name, SOW Support Task(s), Remote Work
Location, and Primary Place of Performance.
Secondary Place of Performance – Contingency Only. As determined by the Contracting Officer’s Representative
(COR), contractor employees may be required to work at a secondary place of performance (e.g., home, the
contractor's facility, or another approved activity within the local travel area) in cases of unforeseen conditions or
contingencies (e.g., pandemic conditions, exercises, government closure due to inclement weather). Additionally,
the contractor may be required to account for the physical location of their personnel should this information be
requested by the COR. Non-emergency/non-essential contractors should not report to a closed government facility.
Contractor shall prepare all deliverables and other contract documentation utilizing contractor resources. To the
extent possible, the contractor shall use best efforts to provide the same level of support as stated in the SOW. In the
event the services are impacted, reduced, compromised, etc., the Contracting Officer or the contractor may request
an equitable adjustment pursuant to the Changes clause of the contract.
9. Period of Performance (PoP). The PoP shall be a one 12-month base period followed by three 12- month option
periods.and one optional six-month extension, if exercised per FAR 52.217-8.
Unless otherwise addressed in the SOW, the contractor shall perform Monday through Friday excluding all Federal
holidays, with core hours of 8:00AM Central Time to 3:00PM Central Time. Normal duty hours are 8 hours per day
and do not include vacation, sick, holiday and TDY time. When the Government installation grants administrative
leave to its employees (e.g. as a result of inclement weather, potentially hazardous condition, or other special
circumstances), contractor personnel working on-site shall also be authorized to telework.
As directed by the Contracting Officer (KO), the contractor shall continue performance in emergency or mission
essential conditions. Additionally, the contractor may be required to account for the whereabouts of their personnel,
should this information be requested by the COR.
Page 39 of 48 Pages
CUI
CUI
6.1- Visit Access Attached Format Pre-start of One Copy to COR As needed
6.5, Request (VAR) performance or per employee
6.7 option execution.
10 days in
advance of any
new employee start
6.1- Travel Attached format At least 10 days One Copy to COR Per Trip
6.5, Authorizat prior to any travel
6.7 ion
Request
(TAR)
11. Security Requirements. This section supplements Block 13 of the Government provided DD Form 254,
Contract Security Classification Specification. The following security requirements shall apply to this effort.
The contractor shall coordinate visits with site Point Of Contract (POC)s providing at least a 72-hour notice (or
according to each site security requirements) prior to any site access. Contractor personnel without security
clearances performing any task under this SOW must be escorted by cleared DISA personnel (civilian, military, or
contractor).
References:
11.1 Facility Security Clearance. Work performed under this contract/order is up to the Secret level and will
require Sensitive Compartmented Information (SCI) access eligibility for some personnel. Therefore, the company
must have an interim or final Secret Facility Clearance from the Defense Counterintelligence and Security Agency
Facility Clearance Branch.
11.2 Security Clearance. All personnel performing on or supporting a DISA contract/order in any way shall be
U.S. citizens. The personnel security requirements for this contract/order cover the individuals supporting the Task
Areas delineated in the table below. Contractor personnel must possess the interim or final security clearance
eligibility delineated in the table below when performance starts.
11.2.1 Individuals supporting SOW Tasks / Subtasks that require(s) an interim or a final Secret security clearance
will, immediately upon hire, require SCI access eligibility adjudicated by the Department of Defense (DoD)
Consolidated Adjudication Facility or other federal adjudications facility to perform their duties. SCI processing for
SCI eligibility will be coordinated with the supporting Government Security Manager and will begin immediately
upon start of duty performance under this contract/order.
11.3 Investigation Requirements. All personnel requiring Secret access under this contract/order shall undergo a
favorably adjudicated Tier 3 investigation formerly known as a National Agency Check, Local Agency Check and
Credit Check or Access National Agency Check and Inquiries as a minimum investigation. Enrollment into
Continuous Evaluation current within 5 years and reflected in The Defense Information System for Security (DISS),
would meet the requirement for the Periodic Reinvestigation (PR).
11.3.1 All personnel requiring Secret access under this contract/order shall undergo a favorably adjudicated Tier 3
(T3) Investigation formerly known as a National Agency Check, Local Agency Check and Credit Check or Access
National Agency Check and Inquiries as a minimum investigation. Enrollment into Continuous Evaluation current
within 5 years and, reflected in DISS, would meet the requirement for a current PR.
Page 41 of 48 Pages
CUI
CUI
11.3.2 The contractor is required to have personnel cleared with an interim or final Secret (as specified in the table
located in section 11.2) at contract start date. If contractor personnel is replaced during performance of the contract,
replacement personnel should also have interim or final clearance Secret (as specified in the table located in section
11.2).
11.4 Visit Authorization Letters (VAL). Visit requests shall be processed and verified through the DISS to
Security Management Office (SMO) Ft Meade-DKABAA10, Montgomery-DKAWKH, Columbus-DKAWCB,
Oklahoma City-DKAWKB, Mechanicsburg-DKAWMB, San Antonio-DKAWKE, and Ogden-DKAWGB. DISS
visits for contracts/orders are identified as “Other” or “TAD/TDY” and will include the Contract/Order Number of
the contract/order in the Additional Information section. Contractors that do not have access to DISS may submit
visit authorizations by e-mail in a password protected .pdf to the COR/ACOR specified in DITCO Additional Text
G1 - Points of Contact.
*Prior coordination with the DISA COR should be made via email to ensure the VAL/ Visit Authorization
Request (VAR)/ Visit Termination Notification (VTN) process is agreed upon and properly secure.
11.4.1 VAR Package. VARs must be received via email and require pre-approval from the assigned DISA COR
five business days in advance of the report date. The VAL/VAR/VTN should be sent via email to the appropriate
COR. The VAL/VAR/VTN should be sent using in a locked “Zip” file in one e-mail and then followed-up by
another e-mail with the password to unlock the Zipped file, because it contains sensitive information covered by the
Privacy Act.
If DISS is not available, the VAL must contain the following information on company letterhead.
11.4.2 VTN Package. The Contractor FSO will forward a VTN letter to the DISA COR identified in the
SOW/TO/Sub for all employees leaving the contract/task order/subcontract.
11.4.2.3 In addition, the DISA CORs and security managers shall inform the DISA Security Office when contractor
personnel are removed for cause from a contract supporting DISA. This step is being added to prevent contractor
personnel removed for security related issues from returning to DISA without appropriate vetting. This step will also
provide security with pertinent information to make an informed decision regarding potential contractor employees’
access to secure facilities and sensitive information. “For Cause” is information regarding an individual that falls
into one or more of the actions or incidents that are within one of the 13 adjudicative guidelines as cited in the
Security Executive Agent Directive (SEAD) 4.
11.5 Security Contacts. DISA Security Personnel can be contacted for Industrial or Personnel Security related
issues at (301) 225-1235 or via mail at:
For Center or Directorate-specific security related matters, contact the Directorate or Center
11.6.1 Contractor personnel shall comply with all local security requirements including entry and exit control for
personnel and property at the Government facility.
11.6.2 Contractor employees shall be required to comply with all Government security regulations and requirements.
Initial and periodic safety and security training and briefings will be provided by Government security personnel.
Failure to comply with Government security regulations and requirements shall require the company to provide the
Government with a written remediation/corrective action plan; furthermore, failure to comply with such
requirements can be cause for removal and the contractor will not be able to provide service on this contract/order.
11.6.3. Contractor employees with an incident report in DISS who have had their access to classified suspended will
not be permitted to fill positions requiring access to classified information on a DISA contract/order.
11.6.4 The Contractor shall not divulge any information, classified or unclassified, about DoD files, data processing
activities or functions, user identifications, passwords, or any other knowledge that may be gained, to anyone who is
not authorized to have access to such information. The Contractor shall observe and comply with the security
provisions in effect at the DoD facility. Identification shall be worn and displayed as required.
11.6.5 The authority for the contractor personnel to regain access must be granted by DISA Chief of Security.
11.6.5.1 DISA retains the right to request removal of contractor personnel regardless of prior clearance or
adjudication status, whose actions, while assigned to this contract, clearly conflict with the interest of the
Government.
11.6.5.2 DISA retains the right to revoke contractor personnel access to DISA facilities and networks, who
violates one or more of Security Personnel Adjudicative guidelines, harassment or violence in the workplace while
assigned to a contract clearly conflict with the interest of the Government.
11.6.5.3 If contractor employee is accused of violating state or federal laws and/or Government
professional conduct policies or regulations, then the Government may require that such contractor employee be
removed from Government premises and/or that such contractor employee be removed from supporting this
contract, pending the duration and outcome of a Government investigation if the Contracting Officer finds that the
Page 43 of 48 Pages
CUI
CUI
conduct or violation alleged has the potential to negatively interfere with contract performance or operations at a
Government facility. Only the Contracting Officer can make such a request on behalf of the Government. Removal
of contractor employee shall not negatively impact contract performance.
11.6.6 Contractor personnel will generate or handle documents that contain Controlled Unclassified Information
(CUI) at the Government facility. Contractor personnel will generate or handle documents that contain Proprietary,
Contract Sensitive, or similarly designated information at the [Government and/or contractor] facility.) Contractor
personnel will have access to, generate, and handle classified material up to CONFIDENTIAL/ SECRET level only
at the Government location(s) (Ref: Block 8 Place of Performance on DD254) and listed in the place of performance
section of this document. All contractor deliverables shall be marked in accordance with DoDM 5200.01, Vol. 3,
DoD Information Security Program: Protection of Classified Information; DoDI 5200.48, Controlled Unclassified
Information (CUI); and DoDM 5400.07, Freedom of Information Act Program, unless otherwise directed by the
Government. The contractor shall comply with the provisions of the DoD Industrial Security Manual for handling
classified material and producing deliverables. The contractor shall comply with DISA Instruction 630-230-19,
Cybersecurity.
11.6.7 The Contractor shall afford the Government access to the contractor’s facilities, installations, operations,
documentation, databases, and personnel used in performance of the contract/order. Access shall be provided to the
extent required to carry out a program of IT inspection (to include vulnerability testing), investigation and audit to
safeguard against threats and hazards to the integrity, availability, and confidentiality of data or to the function of
information technology systems operated on behalf of DISA or DoD, and to preserve evidence of computer crime.
GFP will be provided for this contract as indicated in the GFP attachment included at solicitation, distributed at
award and incorporated via the GFP Module in PIEE. GFP shall be managed IAW the terms of FAR 52.245-1,
corresponding GFP DFARS clauses and additional DITCO Instructions incorporated in award.
Contractors shall accept and/or report provided GFP via the Shipping and Receiving document in the GFP module
upon acceptance and/or IAW Additional DITCO Instruction H9. Serially managed items are provided to the
contractor by DoD and require all events identified in DFARS 252.245-7005 (and/or any subsequent DFARS or
Agency GFP reporting requirements) to be reported by the contractor.
Contractors in possession of GFP shall provide the COR or PA an annual report of all GFP in its possession to
include the item description, make, model, serial number, IUID, and last inventory date; the report should be
minimally provided on an annual basis and 30 days prior to the expiration of any performance period (base and
options) IAW with Additional DITCO Instruction H9.
Deliverable:
13. Incentives/Disincentives:
Page 44 of 48 Pages
CUI
CUI
13.1 The Government shall assess disincentives if the contractor does not maintain FTE staffing levels at 50% or
greater during the first 30 calendar days of contract performance. After the aforementioned 30 calendar day period,
the Government shall assess disincentives if the contractor does not maintain FTE staffing levels at 100%. An FTE
position is considered staffed if the employee’s VAR is approved by the Government, the employee is onboarded by
the contractor, the employee satisfies the minimum qualifications described herein, the employee is actively working
on the contract either onsite or remotely, and the respective employee has not otherwise been absent from the FTE
position for more than 30 calendar days, e.g. being absent for over 30 calendar days due to medical issues or military
deployment would result in the FTE position being deemed vacant/unstaffed.
13.2 When an FTE position becomes vacant, vacancies must be filled with fully functional resources to perform
duties. Except as described in paragraph 13.1, the Government shall assess disincentives after a 21 consecutive
calendar day vacancy if the respective FTE position remains unstaffed even if the FTE position is unstaffed due to
the employee not onboarding or the Government rejecting the VAR.
13.2.1 The Government will strive to process a VAR’s initial submission no later than 7 calendar days after
the Government receives said VAR from the contractor. In the event the Government does take longer than 7
consecutive, calendar days to approve or reject a VAR’s initial submission, the Government will extend the period
that the Government considers the vacancy as temporarily filled until the Government formally approves or rejects
the respective VAR
13.3 To assess a disincentive, the contractor’s invoice shall be decremented. The decrease shall be based on the
number of unstaffed/vacant FTE positions and the number of days the FTE positions were unstaffed/vacant.
Monthly disincentives will match the percentage of unfilled FTE positions. The disincentive will be prorated
according to the number of days in the month that any FTE position is unstaffed beyond the days allowed to staff an
FTE position as described in paragraph 13.1 and
13.4. The calculation of vacant dates will be retroactively calculated and restored to the date an FTE position
originally became unstaffed or vacant if: (1) a VAR is submitted for the FTE position; (2) the Government approves
the VAR; and, (3) the individual who was granted access via the VAR does not onboard. Submitting a VAR for the
Government’s review/approval shall not be considered the same as (1) staffing a vacancy, (2) fulfilling a fully
functional resource, or (3) an FTE position becoming newly vacant. Disincentives, if applicable, will resume with
the calculation of the date the former FTE position with a fully functional resource vacated the position. Despite any
VAR submission or Government access being granted, the position vacancy date will be reset to the date the FTE
position was vacated and held a fully functional resource.
For example, if the monthly invoice is for $90 for a 30-day month, and the contractor does not fill 1 out of 10 labor
categories for 10 days of the 30-day month, then the invoice will be decremented by 10% for those 10 days. Thus,
the invoice for the month will be decremented by: (90/30 = $3 daily charge)*.10*10 = $3.
13.5 As an additional disincentive, there will be a 1% reduction in the monthly invoice amount for each (1) late or
missing deliverable as specified in Section 10 - Delivery Schedule unless the Contracting Officer finds that any such
late deliverable was caused by the Government, (2) deliverable falling below the minimum AQL as specified in
Section 7 - Performance Standards, and (3) deficient deliverable. A deficient deliverable is one that is submitted but
is found to be incomplete, missing key required information, containing erroneous data, or not organized according
to SOW requirements.
13.6 These specific disincentives do not limit the Government’s other remedies, including terminating the contract
for default and reporting negative performance in the Contractor Performance Assessment Rating System.
a. Identification of Possible Follow-on Work. The government may require surge support during the base or
any option period, and surge modifications shall be within the scope of the contract and provide increased support
for the defined task areas of this SOW. Surge sup-port over the life of the contract shall not exceed 25% of the con-
Page 45 of 48 Pages
CUI
CUI
tractor’s total proposed cost/price for the base and all option periods, excluding any six- month extension of services
pursuant to FAR 52.217-8.
b. Identification of Potential Conflicts of Interest (COI). Due to the nature of the DoD IA Program, OCI is-
sues are a significant concern as they hold the potential to disrupt the performance of this contract and other con-
tracts awarded and administered by DISA. The contractor shall identify all potential or actual OCIs and document an
avoidance or mitigation strategy for each in an OCI Mitigation Plan for the Contracting Officer’s approval. The
contractor has a continuing obligation during the performance of the contract to identify any new OCIs and to up-
date its OCI Mitigation Plan as appropriate. Any newly identified OCIs must be brought to the Contracting Officer’s
attention within 24 hours. Additional information regarding OCIs are found in the clauses incorporated in the con-
tract.
c. Identification of Non-Disclosure Requirements. The contractor shall obtain and maintain Non-
Disclosure Agreements (NDA) for each employee assigned to the contract/TO. Initial NDAs shall be signed within
one week of contract/TO award, and NDAs shall be kept current through the entirety of the period of performance as
employee turnover occurs. The contractor shall ensure that all employees assigned to the contract have executed
NDAs on file as of the date of the Monthly NDA Status Report, which shall include names and NDA status of all
current employees assigned to the contract.
Deliverable:
SOW Deliverable Format Due Date Distribution/ Frequency and
Task# Title Copies Remarks
13c. Monthly NDA Contractor No later than end of Standard Monthly (NDA
Status Report determined the 1st week of each Distribution* status as of the
format month end of the
previous month)
*Standard Distribution: 1 copy of the transmittal letter with the deliverable to the Primary COR.
f. Property Accountability. The contractor shall submit the Consolidated Product Listing (linked below) in
addition to complying with all requirements of DFARS 252.211-7003. See DITCO Additional Text H2,
Requirement to Submit an Electronic Product List for additional information.
g. Transitioning.
1. Transition-In (Phase In). 50 percent total staffing must be complete within two weeks of the start
of the PoP and 100 percent within 30 days.
2. Transition-Out (Phase Out). You will need to collaborate with the MP at least 120 days or sooner,
prior to the end of the contract, to develop a transition-out plan IAW FAR 52.237-3.
DELIVERABLES:
Plan
H9 Final GFP Contractor On or prior to the last COR, PA, CS At end of
Disposition provided day of the end of the contract/ order
Notification format POP.
*Standard Distribution: 1 copy of the transmittal letter with the deliverable to the Primary COR.
i. Training. Contractor employees may be required to take periodic mandatory training courses provided
through the agency, such as records management training and other training required by statute, regulation, DoD, or
DISA policy. other training of contractor personnel shall be provided by the Government unless authorized by the
Contracting Officer.
15. Section 508 of the Rehabilitation Act, as amended by the Workforce Investment Act of 1998 (P.L. 105-220)
requires that when Federal agencies develop, procure, maintain, or use information and communication technology
(ICT), it shall be accessible to people with disabilities. Federal employees and members of the public who have
disabilities must have access to, and use of, information and data that is comparable to people without disabilities.
E206 Hardware
E206.1 General. Where components of ICT are hardware and transmit information or have a user interface, such
components shall conform to the requirements in Chapter 4.
E207 Software
E207.1 General Where components of ICT are software and transmit information or have a user interface, such
components shall conform to E207 and the requirements in Chapter 5
Exception from E207.1 General: Software that is assistive technology and that supports the accessibility services of
the platform shall not be required to conform to the requirements in Chapter 5.
302.1 Without Vision. Where a visual mode of operation is provided, ICT shall provide at least one mode of
operation that does not require user vision.
302.2 With Limited Vision. Where a visual mode of operation is provided, ICT shall provide at least one mode of
operation that enables users to make use of limited vision.
302.3 Without Perception of Color. Where a visual mode of operation is provided, ICT shall provide at least one
visual mode of operation that does not require user perception of color.
302.4 Without Hearing. Where an audible mode of operation is provided, ICT shall provide at least one mode of
operation that does not require user hearing.
302.5 With Limited Hearing. Where an audible mode of operation is provided, ICT shall provide at least one mode
of operation that enables users to make use of limited hearing.
302.6 Without Speech. Where speech is used for input, control, or operation, ICT shall provide at least one mode of
operation that does not require user speech.
302.7 With Limited Manipulation. Where a manual mode of operation is provided, ICT shall provide at least one
mode of operation that does not require fine motor control or simultaneous manual operations.
302.8 With Limited Reach and Strength. Where a manual mode of operation is provided, ICT shall provide at least
one mode of operation that is operable with limited reach and limited strength.
Page 47 of 48 Pages
CUI
CUI
302.9 With Limited Language, Cognitive, and Learning Abilities. ICT shall provide features making its use by
individuals with limited cognitive, language, and learning abilities simpler and easier.
The Technical Standards above facilitate the assurance that the maximum technical standards are provided to the
Offerors. Functional Performance Criteria is the minimally acceptable standards to ensure Section 508 compliance.
This block is checked to ensure that the minimally acceptable electronic and information technology (E&IT)
products are proposed.
Page 48 of 48 Pages
CUI