Procurement Summary
Country : Ethiopia
Summary : Terms of Reference for 3rd Party Software Readiness Assessment
Deadline : 14 Mar 2024
Other Information
Notice Type : Tender
TOT Ref.No.: 98177884
Document Ref. No. :
Competition : ICB
Financier : Self Financed
Purchaser Ownership : Public
Tender Value : Refer Document
Purchaser's Detail
Name :Login to see tender_details
Address : Login to see tender_details
Email : Login to see tender_details
Login to see detailsTender Details
Tenders are invited for Terms of Reference for 3rd Party Software Readiness Assessment
2. Objectives:
The main objectives of the assessment are to evaluate the market readiness of the software solutions in terms of functionality, non-functional aspects, and security.
The specific goals include:
Identifying and validating the functional features of the software.
Evaluating non-functional aspects such as performance, scalability, and reliability.
Assessing the security measures implemented to safeguard the software and its data.
3. Scope of Work:
The scope of the assessment should cover, but not be limited to, the following areas:
Functional Assessment:
Reviewing and validating the software features and functionalities against the specified requirements and use cases.
Conducting in-depth testing of critical business processes and workflows.
Exploring edge cases to ensure comprehensive coverage of functional scenarios.
Verifying data accuracy, input validation, and error handling mechanisms.
Non-Functional Assessment:
Performance Testing:
Evaluating the software's response time under normal and peak load conditions.
Assessing the impact of concurrent users on system performance.
Scalability and Reliability:
Analyzing the software's ability to scale with the anticipated user growth.
Verifying the reliability of the software through stress testing and fault tolerance assessments.
Compatibility:
Testing the software's compatibility with various operating systems, browsers, and devices.
Security Assessment:
Vulnerability Assessment:
Identifying and analyzing potential vulnerabilities in the software code and configurations.
Conducting penetration testing to simulate real-world security threats.
Authentication and Authorization:
Verifying the effectiveness of user authentication and authorization mechanisms.
Assessing role-based access controls.
Data Security:
Evaluating measures to ensure the confidentiality and integrity of sensitive data.
Reviewing encryption protocols and data storage security.
Bid closing date: Within 10 days after this announcement
Bid opening date: No Specific Opening Date and Time
Region: Addis Ababa
Documents
Tender Notice