The Defense Intelligence Agency (DIA) is seeking a vendor to manage the Common Data Fabric (CDF) Portfolio of Capabilities, which includes data brokering, policy capture, and transformation services. The vendor will ensure operation, maintenance, and improvement of the CDF, which facilitates seamless data sharing across the Defense Intelligence Enterprise. Key tasks include program management, customer service, cybersecurity support, operations and maintenance, and software procurement. Critical objectives focus on integrating new data capabilities, enhancing security measures, and providing exceptional support to various mission partners. The project maintains several security domains, requiring compliance with stringent cybersecurity regulations. The vendor must possess qualified personnel with specific clearances, and work is primarily conducted within accredited Sensitive Compartmented Information Facilities (SCIFs). The vendor is also responsible for acquiring necessary software licenses and ensuring adherence to supply chain risk management practices. Overall, this initiative represents DIA’s commitment to enhancing data intelligence sharing and cybersecurity measures across its frameworks while achieving operational excellence.
The document is a Market Research Form for a Common Data Fabric (CDF) Market Survey, aimed at gathering information from potential contractors regarding their experience and capabilities in providing data management services. It includes sections for company details, including name, address, contact information, and business size, alongside a questionnaire designed to assess the contractor's experience with data sharing agreements, program management, agile delivery, and cyber security services.
Contractors are asked to describe their expertise in implementing data brokering capabilities across enterprise domains, managing cloud and on-premises deployments, and providing information security officer support. They are also required to give examples of previous work and suggest suitable contract types for the services requested. The document's structure is divided into a company information section, a detailed questionnaire, and a recommendations/comments area.
Overall, the purpose is to identify qualified contractors that can fulfill the specific technological and security requirements outlined, which is essential for ensuring efficient data management and protection in governmental operations.