Skip to content Skip to footer

The Government Procurement Guide for Cross-Network Zero Trust Platforms

The Government Procurement Guide for Cross-Network Zero Trust Platforms

Why Government CISOs Need a Procurement-Specific Guide for Zero Trust

Government procurement of cybersecurity platforms is fundamentally different from commercial purchasing. A government CISO cannot simply evaluate a product, select a vendor, and issue a purchase order. The acquisition must navigate contract vehicles (GSA MAS, EIS, OASIS+, Polaris GWAC), comply with FAR and DFARS requirements, satisfy the Authorizing Official through the RMF process, demonstrate alignment with Executive Order 14028 and OMB M-22-09, and produce documentation that survives audit – all before a single component is deployed.

The challenge intensifies when the platform crosses network boundaries. A government procurement cross network zero trust platform must secure connectivity between classification levels, between IT and OT zones, between agency infrastructure and external partners, and between on-premises systems and cloud services. Each boundary introduces additional compliance requirements, authorization considerations, and architectural constraints that standard ZTNA procurement guides do not address.

As of early 2025, only 14% of DoD target-level Zero Trust activities had been completed. The FY 2026 NDAA allocated $15 billion for cyber modernization. Agencies are under simultaneous pressure to move faster and procure smarter. This guide provides the procurement framework that government CISOs need to acquire cross-network Zero Trust connectivity platforms through existing acquisition vehicles, with defensible requirements, structured evaluation criteria, and compliance documentation from day one.

What Procurement Vehicles Support Cross-Network Zero Trust Acquisition?

Government CISOs do not need new contracting authority to procure Zero Trust platforms. Existing vehicles already support this acquisition category – the challenge is selecting the right vehicle for the scope and timeline.

Mapping Acquisition Vehicles to Zero Trust Platform Procurement

Vehicle

Best For

Timeline

Key Considerations

GSA MAS (Multiple Award Schedule)

Single-agency procurement; defined scope; commercial products

2–6 months from requirement to award

SIN 54151S (IT Professional Services) and 518210C (Cloud and Cloud-Related IT Services); streamlined ordering procedures; best value determination required

GSA EIS (Enterprise Infrastructure Solutions)

Network infrastructure and telecommunications; multi-site deployments

6–12 months

BIC-designated; includes ZTA use cases; Task Order Unique CLINs (TUCs) for customized solutions; EIS sunsets 2032

OASIS+ / Polaris GWAC

Complex IT services; multi-domain requirements; integration-heavy deployments

4–8 months per task order

OASIS+ Phase II opened January 2026; Polaris first awards issued late 2025; suitable for deployments requiring significant integration services

Agency-specific IDIQ

Agency with existing IDIQ covering cybersecurity/network services

2–4 months per task order

Fastest path if an existing vehicle covers the scope; may limit competition

OneGov Agreement

Standardized enterprise-wide pricing; commercial software

Weeks to months

GSA negotiates pre-set terms; primarily for widely-used commercial products; expanding into cybersecurity in 2026

Direct contract (FAR Part 15)

Unique requirement; no existing vehicle covers scope

12–18 months

Full and open competition; longest timeline; most procurement overhead; use only when no existing vehicle fits

The Vehicle Selection Decision

For most government procurement cross network zero trust platform acquisitions, GSA MAS provides the fastest path for initial deployment, while EIS supports the network infrastructure components for larger multi-site rollouts. The GSA Zero Trust Architecture Technology Book explicitly maps EIS services to each pillar of the CISA Zero Trust Maturity Model, providing direct procurement-to-compliance traceability.

For defense agencies, DFARS-specific requirements (including CMMC alignment and ITAR considerations) may require agency-specific vehicles or OASIS+ task orders that incorporate cleared personnel and classified facility requirements.

What Should the Requirements Document Include?

The requirements document is where most government Zero Trust procurements succeed or fail. Requirements that are too generic attract solutions that check boxes but do not address cross-network connectivity. Requirements that are too vendor-specific risk protest. The following framework balances technical precision with competitive fairness.

Mandatory Technical Requirements

These are pass/fail criteria. A solution that does not meet every mandatory requirement is eliminated from evaluation.

Requirement Category

Specific Requirement

Why It Matters

Verification Method

Architecture

Zero inbound firewall ports on protected networks

Eliminates the primary attack vector for ransomware in government OT environments

Architectural diagram review + external scan during pilot

Architecture

On-premises deployment option with no data routing through vendor cloud infrastructure

Required for classified and sensitive environments where data cannot traverse commercial cloud

Deployment architecture review; data flow diagram verification

Architecture

Support for multiple network boundaries (IT/OT, classified/unclassified, agency/external) from a single platform

Cross-network capability is the core requirement; multiple platforms for different boundaries defeats consolidation

Architecture review + pilot demonstration across two boundary types

Identity

Per-session MFA for every access request (not just initial login)

DoD ZT framework and OMB M-22-09 require continuous authentication; VPN-level MFA is insufficient

Configuration review + pilot testing

Identity

Native PIV/CAC integration through AD/LDAP certificate chain

Federal identity infrastructure requirement; solutions requiring workarounds for PIV/CAC create compliance gaps

PIV/CAC authentication test during pilot

Identity

Named individual accounts for all users including vendors (no shared credentials)

Session attribution requires named identity; shared credentials make incident investigation impossible

Policy configuration review

Access Control

Application-level access to specific resources (not network-level access)

Least privilege principle; network-level VPN access enables lateral movement

Policy demonstration: user accesses one workstation, cannot reach others

Access Control

Per-workstation/per-application access policies with time-window and approval workflow support

Granular policy enforcement required by NIST 800-207 and DoD ZT capability outcomes

Policy configuration + scenario testing

File Sharing

Integrated bidirectional file sharing with CDR (Content Disarm & Reconstruction) scanning

Cross-network file exchange without CDR is a malware delivery vector; separate products fragment the audit trail

File transfer test with known-malicious test files

File Sharing

SMB protocol support with Kerberos/NTLM authentication and SMB Signing

Required for compatibility with existing government file sharing infrastructure

SMB share access test from standard Windows workstation

Audit

Session recording (video + keystroke capture) for all interactive sessions

Required for classified environments; critical for incident investigation and compliance evidence

Session recording playback review

Audit

Unified audit trail across all connectivity types (application access + file sharing + data transfer) with single Syslog feed

Fragmented logs from multiple products increase MTTI and create compliance gaps; consolidated audit reduces investigation time by 95%

SIEM integration test; log completeness review

Compliance

Mappable to CISA ZTMM v2.0 across all five pillars

Required for OMB M-22-09 compliance reporting

Vendor-provided compliance mapping document

Deployment

Deployable on standard VMs (no specialized hardware)

Eliminates hardware procurement cycle; enables phased deployment within existing infrastructure

Deployment architecture specification review

Desirable Technical Requirements

These are scored criteria that differentiate competitive solutions. Higher capability earns more evaluation points.

Requirement

Scoring Criteria

Device posture assessment at every session (OS, EDR, encryption, patch level)

Full posture check = 10 pts; partial = 5 pts; none = 0 pts

Approval workflow integration (ServiceNow, ITSM)

Native API integration = 10 pts; manual workflow = 5 pts; not supported = 0 pts

Support for legacy OT protocols (RDP to SCADA, SSH to engineering workstations)

Full OT support = 10 pts; IT-only = 0 pts

Deployment within 2 weeks for initial pilot (excludes full migration)

≤ 2 weeks = 10 pts; 2–4 weeks = 5 pts; > 4 weeks = 0 pts

Vendor provides phased migration methodology with rollback criteria per phase

Documented methodology = 10 pts; ad hoc approach = 0 pts

How Should the Evaluation Be Structured?

Evaluation Factors and Weighting

Government CISOs should weight evaluation factors to reflect the operational reality that cross-network connectivity platforms are security infrastructure, not commodity IT products. The recommended weighting:

Factor

Weight

Rationale

Technical Capability

40%

Does the solution meet all mandatory requirements? How does it score on desirable requirements?

Security Architecture

25%

Zero inbound ports, on-premises data path, application-level isolation, session recording – the architectural properties that determine actual security posture

Past Performance

15%

Demonstrated deployments in government and defense environments; references from agencies with similar classification and OT requirements

Management Approach

10%

Migration methodology, phased deployment plan, rollback procedures, training and knowledge transfer

Price

10%

Total cost of ownership including licensing, deployment, integration, and ongoing support – not just unit price

Why Security Architecture Warrants Separate Weighting

Most government IT procurements weight Technical Capability and Price as the primary factors. For cross-network Zero Trust platforms, this is insufficient. Two solutions may both claim “zero trust” capability, but one routes all traffic through a vendor cloud while the other keeps all traffic on-premises. One opens inbound firewall ports while the other eliminates them. One requires separate products for file sharing and session recording while the other integrates them.

These architectural differences are not feature comparisons – they are fundamental security posture decisions that determine whether classified data stays within agency-controlled infrastructure and whether the agency’s attack surface increases or decreases. Weighting architecture separately ensures these decisions are evaluated on their security merit, not buried in a feature checklist.

The Pilot Demonstration

Every government procurement cross network zero trust platform should include a pilot demonstration as part of the evaluation. The pilot validates that the solution actually delivers what the vendor claims – in the agency’s environment, with the agency’s identity infrastructure, across the agency’s network boundaries.

Pilot scope (minimum 2 weeks):

  • Deploy platform infrastructure (Access Controller + Gateway) in agency test environment
  • Integrate with agency Active Directory / PIV infrastructure
  • Configure 5 test sessions across at least 2 network boundaries (e.g., IT-to-OT and classified-to-unclassified)
  • Demonstrate per-session MFA, device posture check, and session recording
  • Execute bidirectional file transfer with CDR scanning
  • Run external scan to verify zero discoverable services
  • Export audit trail to agency SIEM; verify log completeness
  • Demonstrate rollback: remove platform, verify legacy connectivity is unaffected

Evaluation during pilot:

Pilot Criterion

Pass/Fail

Notes

Platform deploys with zero inbound firewall rules

Pass/Fail

Any inbound rule = automatic fail

PIV/CAC authentication works natively

Pass/Fail

Workarounds or third-party bridges = fail

Session recording captures complete session (video + keystroke)

Pass/Fail

Partial capture = fail

CDR scanning blocks test malware in file transfer

Pass/Fail

Any unscanned file crossing boundary = fail

External scan returns zero results

Pass/Fail

Any discoverable service = fail

Unified audit trail in SIEM contains complete session records

Pass/Fail

Missing fields or fragmented records = fail

What Compliance Documentation Should the Vendor Provide?

Government procurement requires compliance documentation at acquisition time, not after deployment. The vendor should provide the following as part of their proposal response:

Pre-Award Documentation

Document

Purpose

What to Look For

CISA ZTMM Pillar Mapping

Demonstrates how the solution addresses each of the five ZTMM pillars and cross-cutting capabilities

Coverage across all five pillars; specific capability outcomes cited; maturity stage supported for each pillar

NIST SP 800-207 Alignment

Maps solution architecture to Zero Trust Architecture tenets

Per-request access decisions; continuous verification; least privilege enforcement; data-plane/control-plane separation

IEC 62443 FR Mapping (if OT applicable)

Maps solution to Foundational Requirements for OT security

FR1-FR7 coverage; specification of which security levels (SL1-SL4) the solution supports

Data Flow Diagram

Shows exactly where data travels during all session types

Verification that no data routes through vendor-controlled infrastructure for classified use cases

Architecture Security Assessment

Independent or vendor-provided assessment of the platform’s security architecture

Focus on attack surface analysis: inbound ports, internet-facing components, authentication chain, encryption standards

Supply Chain Risk Management (SCRM) documentation

Addresses EO 14028 requirements for software supply chain security

SBOM availability; secure development practices; vulnerability disclosure process; origin of components

Post-Award / Pre-Deployment Documentation

Document

Purpose

Deployment architecture for agency environment

Site-specific architecture showing component placement, network boundaries, and data flows

Security assessment report (SAR) for RMF

Supports the AO’s authorization decision; maps platform to applicable NIST 800-53 controls

Ongoing assessment plan

Defines how the platform will be continuously monitored and assessed per FISMA requirements

What Are the Common Procurement Mistakes – and How to Avoid Them?

Mistake 1: Procuring ZTNA as a Point Solution

What goes wrong: The agency procures a ZTNA solution for application access, then discovers it does not handle file sharing across classification boundaries. A separate procurement for an SMB proxy follows. Then another for session recording. The result is the same multi-vendor patchwork the agency was trying to escape – just with newer products.

How to avoid it: The requirements document must specify cross-network connectivity as the scope – application access AND file sharing AND session recording AND unified audit – in a single platform. The evaluation criteria must penalize solutions that require supplementary products to achieve full coverage. Solutions like truePass Gravity that integrate all three layers (reverse-access infrastructure, SMB Proxy with CDR, and Zero Trust application access) in a single platform should score higher than architectures requiring 2–3 separate procurements.

Mistake 2: Specifying Cloud-Delivered ZTNA Without Data Path Analysis

What goes wrong: The agency selects a cloud-delivered ZTNA solution based on FedRAMP authorization and feature comparison, without analyzing where data actually travels. After deployment, the compliance team discovers that classified or CUI data is routing through the vendor’s commercial cloud infrastructure – violating data sovereignty requirements.

How to avoid it: The requirements document must include a mandatory data flow analysis. For any environment handling classified, CUI, ITAR-controlled, or law enforcement sensitive data, the requirements should specify on-premises deployment with no vendor cloud data path. The truePass platform operates entirely within agency-controlled infrastructure – all traffic stays on-premises with zero dependency on external cloud services.

Mistake 3: Accepting Network-Level Access as “Zero Trust”

What goes wrong: The vendor claims “Zero Trust” but the solution provides VPN-like network-level access after authentication. Users can reach any device on the network segment – not just their authorized resource. The agency has a “Zero Trust” product in the ATO package but network-level lateral movement is still possible.

How to avoid it: The pilot demonstration must include a lateral movement test: after authenticating to one resource, the evaluator attempts to reach an adjacent resource on the same network. If the attempt succeeds, the solution does not provide application-level isolation and does not meet Zero Trust least-privilege requirements.

Mistake 4: Not Including Legacy Gateway Decommission in the SOW

What goes wrong: The agency deploys the new platform but the legacy VPN, jump server, and SMB proxy remain operational because the SOW did not include decommission planning. The attack surface increases – the agency now has the legacy stack plus the new platform.

How to avoid it: The SOW must include phased legacy gateway replacement with explicit decommission milestones, external scan validation at each milestone, and success criteria that include the removal of legacy inbound firewall rules.

Mistake 5: Evaluating on Price Per User Without Total Cost of Ownership

What goes wrong: The agency selects the lowest per-user license cost, then discovers that the solution requires separate products for file sharing ($X), session recording ($Y), CDR scanning ($Z), and integration services to connect them all. The total cost exceeds the higher-priced consolidated platform.

How to avoid it: The price evaluation must require vendors to quote the total cost of ownership for all connectivity types specified in the requirements – not just application access. The cost comparison table should include:

Cost Element

Vendor A (Consolidated)

Vendor B (Point Solution + Supplements)

Platform license

Quoted

Quoted

File sharing / SMB proxy

Included

Separate procurement required: $____

Session recording

Included

Separate procurement required: $____

CDR scanning

Included

Separate procurement required: $____

Integration services (connecting 3+ products)

Not required

Required: $____

SIEM integration (number of log sources)

1 feed

3–4 feeds: integration labor $____

Annual maintenance (all products)

Single contract

Multiple contracts: $____

Estimated vendor count

1

3–4

What KPIs Should the CISO Track After Procurement?

Procurement is not the finish line – it is the starting point. The government CISO must establish measurable KPIs for OT connectivity security from day one to demonstrate that the investment is producing results:

KPI

Baseline (Legacy Stack)

Target (Post-Deployment)

Measurement Frequency

Inbound Port Exposure Index

Document before deployment

0

Monthly (firewall audit + external scan)

Connectivity Consolidation Ratio

Products ÷ connectivity types

≤ 0.4

Quarterly

Session Attribution Coverage

% sessions with full identity + recording

95%+

Monthly

Mean Time to Investigate (MTTI-OT)

Hours per session reconstruction

< 15 minutes

Per incident

Zero Trust Coverage

% sessions meeting all 5 ZT criteria

90%+

Monthly

These KPIs provide the evidence base for the agency’s next budget cycle, ATO renewal, and IG audit response.

What Does the Procurement Timeline Look Like End-to-End?

Phase

Timeline

Key Activities

Deliverables

Requirements Development

Weeks 1–4

Define cross-network scope; map to CISA ZTMM; draft mandatory/desirable requirements; identify acquisition vehicle

Requirements document; acquisition strategy memo

Market Research

Weeks 5–8

Issue RFI; conduct vendor demonstrations; analyze responses against requirements; validate vehicle selection

Market research report; vendor shortlist

Solicitation

Weeks 9–16

Issue RFQ/RFP through selected vehicle; evaluate proposals; conduct pilot demonstrations

Evaluation report; pilot results

Award

Weeks 17–20

Best value determination; award notification; debrief unsuccessful offerors

Contract award; SOW with decommission milestones

Deployment Phase 1

Weeks 21–28

Deploy platform; integrate identity; migrate interactive access; decommission VPN + jump server

Phase 1 completion; external scan verification

Deployment Phase 2

Weeks 29–36

Migrate file sharing; CDR validation; one-way flow evaluation

Phase 2 completion; full audit trail operational

ATO / Compliance

Weeks 37–40

RMF security assessment; ATO documentation; compliance mapping; KPI baseline

ATO decision; KPI dashboard operational

Total timeline from requirements to operational ATO: approximately 10 months. For agencies using existing IDIQ vehicles with pre-competed task orders, the procurement phases (Weeks 1–20) can compress to 8–10 weeks.

Conclusion

Government procurement cross network zero trust platforms is not a standard IT acquisition. It requires procurement-specific planning that addresses classification boundaries, federal identity infrastructure, on-premises data sovereignty, legacy gateway decommission, and compliance documentation that satisfies both the acquisition authority and the Authorizing Official.

The framework in this guide – vehicle selection, requirements template, evaluation criteria with architectural weighting, mandatory pilot demonstration, compliance documentation requirements, TCO-based price evaluation, and post-procurement KPIs – provides the structure that government CISOs need to execute this acquisition defensibly and efficiently.

The mandate is clear: EO 14028, OMB M-22-09, DTM 25-003, and the CISA ZTMM all require Zero Trust implementation. The budget is allocated: $15 billion in the FY 2026 NDAA. The acquisition vehicles exist: GSA MAS, EIS, OASIS+, Polaris. What remains is the procurement execution – and the agency that starts with the right requirements, the right evaluation structure, and the right deployment partner for government and defense environments will reach operational Zero Trust faster than the agency that procures point solutions and discovers the gaps after award.

 

Welcome! Let's start the journey

AI Personal Consultant

Chat: AI Chat is not available - token for access to the API for text generation is not specified