17, February 2015

ESA Open Invitation To Tender AO8167
Open Date: 09/02/2015
Closing Date: 24/03/2015

Status: ISSUED
Reference Nr.: 14.112.12
Prog. Ref.: GSTP Period 6 E1 PRJ
Budget Ref.: E/0904-611 – GSTP Period 6 E1 PRJ
Special Prov.: A+D
Tender Type: C
Price Range: 200-500 KEURO
Establishment: ESOC
Directorate: Directorate Human Spaceflight & Operatio
Department: Ground Systems Engineering Department
Division: Mission Data Systems Division
Contract Officer: Frigot, Emma
Last Update Date: 09/02/2015
Update Reason: Tender issue

Security and Data Policy are two important architectural concerns for all ground data systems. Awareness of these concerns is increasing within the Agency as programmes such as SSA, Galileo, and GMES evolve and security requirements are more often put forward by the Agency’s international partners. It has become evident in the recent past that security controls are becoming more and more necessary in the context of mission data systems in particular when these systems are part of the central processing chain that supportsthe business processes of a mission or programme. The Security Directives Implementation Project (SDIP) has identified the need foranumber of mandatory and standard security controls that require implementation in numerous mission data systems such as authentication, access control, identity management, and encryption. While the awareness and the need for security controls in mission data systems is growing, at the same time the necessary security expertise is not present at all engineering levels when it comes to implement mission data systems. Moreover, in order to address the security aspects adequately, the security concerns must be incorporatedappropriately in all steps of software development lifecycle. In general security is often perceived as a cumbersome, complicated,andresource intensive subject. Any reduction of the complexity of the subject and simplification of the security aspects, while not compromising on the security objectives, is therefore much welcomed by all stakeholders. A promising approach towards simplified embracement of security concerns in software solutions is provision of Security as a Service. To give a simple and understandable analogy, one can compare this concept to the services of a firewall, which provides certain network security controls as a Service in a quite transparent manner to the software developers. Similarly other security and data policy concerns at application level such as Confidentiality, Integrity and Authenticity can also be provided as a Service in an easy-to-use and more transparent way to all software projects. The concept of Security as a Service is gaining more importance in the IT community and is becoming more feasible as Service Oriented Architectures (SOA) and Cloud Computing paradigm take a prominent role in the IT landscapes. Repeated and redundant implementation of the same security controls in different projects increase the amount of resources, maintenance and risk of erroneous implementation. The consolidation of security capabilities, like authentication, authorization, encryption and digital signatures, in form of re-usable and self-contained services, increase the interoperability and maintainability of the software solutions. The most important objective here is however simplification of the security subject. If this objective is achieved, security stops to be a complicated topic and turns to be a common, central and standardized piece of the solution. Procurement Policy: C(2) = A relevant participation (in terms of quality and quantity) of non-primes (incl. SMEs) is required. For dditional information please go toEMITS news “Industrial Policy measures for non-primes, SMEs and R&D entities in ESA programmes”.

If you wish to access the documents related to the Invitation to Tender, you have to log in to the ESA portal.