Procurement Summary
Country : Germany
Summary : GT1Y-612GD Zero Trust Architecture for Mission Ground Segments
Deadline : 01 Jul 2024
Other Information
Notice Type : Tender
TOT Ref.No.: 101498560
Document Ref. No. : 1-12326
Competition : ICB
Financier : Agency for the Cooperation of Energy Regulators (ACER)
Purchaser Ownership : Public
Tender Value : Refer Document
Purchaser's Detail
Name :Login to see tender_details
Address : Login to see tender_details
Email : Login to see tender_details
Login to see detailsTender Details
Tenders are invited for GT1Y-612GD Zero Trust Architecture for Mission Ground Segments
The traditional network perimeter defence model has been obsolete for some time and a modern defence-in-depth architecture is a must for credible protection. Zero trust architecture (ZTA) has been recently consolidated and places emphasis on strong authentication and authorisation within a perimeter. This is considered a significantly higher level of security posture versus a more traditional perimeter defence model which typically relies on ring-fenced networks and is no longer considered adequate in the modern cyber threat environment. Software architecture trends are leading towards an envisaged migration of mission data systems to cloud-native, micro-services-based architectures. Such architectures are leveraged to enforce highly automated, granular access control and security policy orchestration and enforcement, for example across a service mesh'. Implementing security (both policy enforcement and encryption and authentication) at the (micro) service level implements ZTA whereby there is no inherent trust in the systemand security defences may remain robust even with the assumption that a network has been compromised. This activity shall build on a predecessor study on micro-services-based mission data systems (T709-709GD), specifically by analysing, developing and demonstrating a ZTA model, enforced at the (micro) service level. A strategy shall be defined for roll out of the architectural approach, accounting for potential system level impact - for example a stepwise approach utilising sidecar proxies' to facilitate the ZTA migration for legacy systems and workloads. Other modern security patterns such as secure API gateways shall also be assessed. Theresulting adapted mission data system applications, architecture and testbed shall be developed and deployed and the main functions of the ZTA and security orchestration capability demonstrated. The result is expected to demonstrate a step-change in security posture for ground segment software systems and vastly increased efficiency in terms of security configuration and automated policyenforcement.Read more
Documents
Tender Notice