Tactical Defensive Cyber Operations Infrastructure (TDI)

Due Date: 2022-10-13 23:59:59 EST Government Organization: Defense Innovation Unit (DIU) Description: Area of Interest (AoI) Statement: Tactical Defensive Cyber Operations Infrastructure (TDI) Problem Statement: Cybersecurity is a vital part of military operations as digital technology has proliferated throughout the Department of Defense (DoD). As technology has advanced so has the threat. Traditional network security has been focused on implementing security measures to prevent breaches but fails to detect cyber attacks. DoD’s mission-critical systems need to be monitored using advanced capabilities that can detect threats, mitigate vulnerabilities, and allow for appropriate counteraction.

Category: Opportunity

DoD Communities Of Interest: Cyber

Subject: Tactical Defensive Cyber Operations Infrastructure (TDI)

Due Date: 2022-10-13 23:59:59 EST

Government Organization: Defense Innovation Unit (DIU)

Description:

Area of Interest (AoI) Statement: Tactical Defensive Cyber Operations Infrastructure (TDI)

Problem Statement

Cybersecurity is a vital part of military operations as digital technology has proliferated throughout the Department of Defense (DoD). As technology has advanced so has the threat. Traditional network security has been focused on implementing security measures to prevent breaches but fails to detect cyber attacks. DoD’s mission critical systems need to be monitored using advanced capabilities that can detect threats, mitigate vulnerabilities, and allow for appropriate counter action.

Desired Solution Attributes

The DoD seeks a defensive cyber operations (DCO) platform that can be installed on existing hardware and can incorporate existing or future capabilities. The platform should provide service members the capability to scan for cyber threats, log management and monitoring, and conduct network security monitoring. The solution should deploy automatically to relevant hardware, detect multiple cyber threats, facilitate mitigation or denial of adversarial actions, and allow global or regional cyberspace defenders to remotely assist with countering advanced threats. 

The proposed solution should also meet the following criteria:

  • Ability to perform all of the following types of analysis: host indicator analysis, network indicator analysis, forensic analysis, and data aggregation, storing, and tagging for future analysis;
  • Ability to work with other cybersecurity tools to include Endpoint Detection and Response products;
  • Ability to display dashboards with analytical reports;
  • Ability to pivot to in-depth data analysis;
  • Interoperability with sensors or log forwarders on various host platforms throughout a given network;
  • Ability for remote operators to have access to same platform as local operators;
  • Ability to deploy without the need of a deployed Field Service Representative (FSR);
  • Ability to be deployed/updated via automated means (i.e., artificial intelligence or machine learning);
  • Ability to be updated on a periodic basis;
  • Must be self-contained and not dependent on cloud access;
  • Company must be able to provide support in classified environments;
  • Preferred open architecture to allow for integration of other capabilities;
  • Must meet requirements for certification on unclassified and classified networks per Cybersecurity Risk Management Framework (RMF) requirements (DoDI 8510.01); and
  • At a minimum, the solution must be compatible with 3x Dell XR2 - Skylake Gold 6138 w/ 2 sockets (40 Total Physical Cores), 192GB DDR4 RDIMM 2667MT/s, 46 TB total pooled storage

Website: https://www.diu.mil/work-with-us/submit-solution/PROJ00446

Questions or assistance, contact:
North Carolina Defense Technology Transition Office (DEFTECH)

 

Dennis Lewis
lewisd@ncmbc.us
703-217-3127

Bob Burton
burtonr@ncmbc.us
910-824-9609

North Carolina Defense Technology Transition Office | PO Box 1748, Fayetteville, NC 28303