You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Aug 27, 2019. It is now read-only.
Name and affiliation
Nalini Martinez
Director, Sales
Kratos SecureInfo
Voice: 703.668.1012 [email protected]
I am a director of sales working for Kratos and will be acting as the interface for communication between Kratos and GSA.
Section of RFQ documents
RFQ #1322561: Section 3.0 (Requirements)
Questions
How many controls require testing for the systems annual assessment?
Please explain what the anticipated significant changes to the system are in order to determine level of effort for significant change assessment activities.
How many overall vulnerabilities have been remediated since the last annual assessment that will require validation by the 3PAO and what type of vulnerabilities are they?
3.1. Penetration testing vulnerabilities?
3.2. Vulnerability scanning vulnerabilities?
3.3. Control vulnerabilities?
3.4. Manual Testing vulnerabilities?
How many devices (if applicable) cannot be scanned using vulnerability scanners and require manual testing?
Which penetration testing attack vectors are in scope for the assessment?
Does the system include any mobile applications? If yes, how many?
Approximately how many dynamic web application pages are in scope for this system?
Approximately how many hosts makeup the inventory of this system?
The text was updated successfully, but these errors were encountered:
This will have to be determined in collaboration with the JAB. It should be the standard 1/3 controls plus the default set. There are no agency-specific controls.
We estimate no more than 10 SCRs, with variable level of effort. We don’t have the exact changes planned this far in advance - the idea would be to scope out each change as needed.
Vulnerabilities identified in our last annual assessment in our SAR, which have been remediated and will likely need 3PAO validation as part of the next annual assessment:
3.1. Penetration testing vulnerabilities: 2
3.2. Vulnerability scanning vulnerabilities: 7
3.3. Control vulnerabilities: We don’t have this as a separate category - each vulnerability has an
associated control.
3.4. Manual Testing vulnerabilities: 17
We scan all VMs in the system using automated scanners (Nessus and OWASP ZAP).
This will have to be determined in collaboration with the JAB.
No
We have 13 dynamic web applications. Most of these are internal deployments of open source web applications, such as Kibana, Concourse, Prometheus, and Grafana.
Question
Name and affiliation
Nalini Martinez
Director, Sales
Kratos SecureInfo
Voice: 703.668.1012
[email protected]
I am a director of sales working for Kratos and will be acting as the interface for communication between Kratos and GSA.
Section of RFQ documents
RFQ #1322561: Section 3.0 (Requirements)
Questions
3.1. Penetration testing vulnerabilities?
3.2. Vulnerability scanning vulnerabilities?
3.3. Control vulnerabilities?
3.4. Manual Testing vulnerabilities?
The text was updated successfully, but these errors were encountered: