Updated: Aug 16
Submit NLT 02/26/2023 at 11:59 AM EST
The Army requires the ability to rapidly provision formally verified, provably secure computer systems that provide services or enable secure data exchange between a perpetually growing number of regional partners in a contested environment.
Provably secure systems provide a root of trust to build Zero Trust (ZT) architectures upon and would accelerate the Army’s ability to exchange sensitive data with regional and theater partners in competition and during combat. The existence of software defects in many client and server applications results in the application of highly complex, costly, security controls including logical or physical separation of systems to gain a measure of confidentiality, integrity, and availability. To address the needs for a root of trust for ZT implementations and for provably secure computing and data exchange, the Army needs rapidly deployable, provably secure systems that enable key services such as routing, firewall, authentication, web and messaging functions.
These systems also need to operate in contested networks that are proven to be unsusceptible to remote network exploitation using zero day or N-day exploitation methods that are often used to compromise systems and gain unauthorized access. Formally verified software is a potential solution to this problem and recent advances in provably secure computing technologies make this concept testable by building, testing and auditing prototypes that could be used during exercises and experimentation events to facilitate low-cost, secure communications with partners throughout the operational region.
Interested in finding your next DoD innovation opportunity?
Head over to Cyber Fusion Innovation Center (CFIC), engage the ecosystem and find new opportunities to grow your business today.