150 likes | 271 Views
Laptop Disk Encryption Colorado’s Approach. Presented to: Ohio Digital Government Summit October 16, 2007. Overview. Colorado’s Data Security Environment Acquisition Strategy The State’s Acquisition Process Trade-Offs Results Current Status What We’ve Learned.
E N D
Laptop Disk EncryptionColorado’s Approach Presented to: Ohio Digital Government Summit October 16, 2007 Ohio Digital Government Summit 2007
Overview • Colorado’s Data Security Environment • Acquisition Strategy • The State’s Acquisition Process Trade-Offs • Results • Current Status • What We’ve Learned Ohio Digital Government Summit 2007
Colorado’s Data Security Environment • Background • Appointment of CISO • House Bill 1157 • Laptop Related Incidents • Goals • Pre-empt the Problem with a Solution • Get It Done Fast • Solve it for the Enterprise • Make It Comprehensive • Provide a Solution With Staying Power Ohio Digital Government Summit 2007
Acquisition Strategy • What’s Available • What Does Gartner Think • What’s the Scope? • RFP? • Agency Collaboration/Communications • State Employee Teams Ohio Digital Government Summit 2007
Requirements TradeoffsCapability vs Price Walking the tight rope Technical Requirements Cost and Pricing Considerations Ohio Digital Government Summit 2007
IDENTITY MANAGEMENT SYSTEM MGT. CAPI COMPATIBLE LINUX MAC W95 W98 WNT WME WXP VM REMOTE USER MGT. W2K FILE ENCRYPTION LOG MGT. DIGITAL SIGNATURE PKI INTEGRATION SSO S/MIME ENCRYPTION PHONE / PDA USB / CD / DVD FOLDER ENCRYPTION TOKEN SUPPORT TRAINING SUPPORT PROF. SERVICES PRICE CENTRAL PRODUCT MANAGEMENT CENTRAL KEY MANAGEMENT PRE-BOOT AUTHENTICATION FULL DISK ENCRYPTION Capabilities Desired
IDENTITY MANAGEMENT SYSTEM MGT. WME LINUX MAC W95 W98 WNT CAPI COMPATIBLE WXP VM REMOTE USER MGT. W2K FILE ENCRYPTION LOG MGT. DIGITAL SIGNATURE PKI INTEGRATION SSO S/MIME ENCRYPTION PHONE / PDA USB / CD / DVD FOLDER ENCRYPTION TOKEN SUPPORT TRAINING SUPPORT PROF. SERVICES PRICE CENTRAL PRODUCT MANAGEMENT CENTRAL KEY MANAGEMENT PRE-BOOT AUTHENTICATION FULL DISK ENCRYPTION Capabilities “Proposed” Ohio Digital Government Summit 2007
Technical Requirements Full disk encryption Password at boot Secure storage of keys Removable devices User transparency Multiple operating systems Network based solution Key backup/recovery Remote installation Central pass-phrase management Training Cost and Pricing Considerations Firm-fixed-price initial buy Enterprise price agreement Mandatory price agreement Specified size of initial buy License mobility 4-year product support term Optional feature considerations Total bid price The Tight Rope Ohio Digital Government Summit 2007
The State’s Acquisition Process Trade-Offs • The Tradeoffs were made: • IFB – 3 Months, Significant Risks • RFP – 8 Months, Less Risk, Too Long • RFP Selected - We Had 5 Months • Adopted Accelerated Project Management Approach Ohio Digital Government Summit 2007
LTE Project’sApproach - Acquisition • Write and Issue RFP • Respond to Bidder Questions • Evaluate Bidder Responses • Step One – Technical Evaluation/Demo • Step Two – Price Evaluation/Selection • Step Three – Acceptance Testing • Negotiate Mandatory Price Agreement Ohio Digital Government Summit 2007
LTE Project’s Approach – Leveraging A Solution • All Departments Funded by CISO ($450K) • 6,700 Laptops in the Baseline • Executive Departments Must use the Mandatory Price Agreement for Future Product Purchases • Secretary of State, Attorney General, Higher Education, and Local Governments May Use Price Agreement • Coordination/Communications with Departmental CIO’s • Technical Evaluators from Executive Branch Departments • Acceptance Testing Involved Same Departments • Centralized Training Provided to All Agency Technical Personnel Ohio Digital Government Summit 2007
Results • Pre-emptive Solution Accepted • Near On-Schedule Completion of Acquisition Component of the Project • Coordination/Communication with Departments – Beneficial • Technical Training of Agency IT Personnel Completed On-Schedule • Enterprise Solution Accepted • Implementation Rate - Acceptable Ohio Digital Government Summit 2007
Current Status Estimated Completion: Feb 2008 2007 2008 Ohio Digital Government Summit 2007
What We Learned • Project Management Fundamentals Pay Off • Planning Project/Schedule Essential • Leveraging the State’s Buying Power Works! • Procurement Methods Vary in Terms of Time, Risk, and Effectiveness • Communications/Coordination with Agencies Vital • Funding Should Not an Issue • Making Trade-offs Up-Front Necessary • Acceptance Testing Involving Agency Technical Experts Leads to Buy-In • Training Up-Front Essential to Buy-In as Well • Following-Ups On Agency Implementation Necessary Ohio Digital Government Summit 2007
Contact Information Bob Feingold bfeingold@centerdigitalgov.com 303-810-3215 Ohio Digital Government Summit 2007