WEBMAIL    |    Intranet    |    Site Map




on 11 August 2017

ESA Open Invitation to Tender AO9016
Open Date: 25/07/2017
Closing Date: 03/10/2017 13:00:00


Status: ISSUED
Reference Nr.: 17.197.06
Prog. Ref.: General Studies;Cyber Def for Space
Budget Ref.: E/0600-00 - General Studies;E/0800-13 - Cyber Def for Space
Tender Type: C
Price Range: 100-200 KEURO
Techology Domains: Others
Establishment: ESAHQ
Directorate: Directorate of Tech, Eng. & Quality
Department: System, Software & Technology Department
Division: Future Prep. & Strategic Studies Off.
Contract Officer: O'Sullivan, Margaret
Industrial Policy Measure: N/A - Not apply
Last Update Date: 31/07/2017
Update Reason: Loaded a new Clarification (English version)

This study is intended to address the spectrum of security space missions namely associated with : Earth Observation, Launchers, Navigation Guidance, Human Space Flight, Science, Exploration, Telecommunication, Space Situational Awareness, ISR, with potential applications on military air, land and maritime domains (e.g. navigation guidance of missiles and unmanned vehicles, ELINT COMINT, military earth observation). The study analysis shall be focused on classes of security space missions and their relevant missionsub-classification (e.g. by orbit type, by payload type, etc.), resulting at end of this phase 1 in specific recommendations targeting each specific class of missions. Phase 1 of the study shall aim at identifying the specific developments and tailored security-,industrial/procurement policy measures which are needed to address the new family of cyber-threats currently materializing and to which security and defense space missions are exposed. The objectives of phase 1 are to establish a matrix of vulnerabilities of inherent electronic components, signal and data processing, software and hardware elements along with communication links and protocols. This will be based on a risks assessment applied to these representative security space missions allowing the identification ofpotential capability gaps and recommending technological-, policy- or regulatory ways to mitigate such vulnerabilities for implementation in the second phase. In particular, the contractor shall as a minimum: · Provide an inventory of vulnerabilities regarding cyber-threats associated with the set of defined class of missions; · Compile a list of cyber-security technical recommendationsforthe mission planning, design and procurement authorities for the categories associated with the defined security space missions; ·Provide recommendations for the establishment of cyber-security policies applicable to security and defense space missions. The study results will cover the whole life-cycle of security space systems including RD, operations and decommissioning phases. Suchinputs concerning technical and non-technical security measures aiming at mitigating the cyber-security risks shall be organized asmultiple layers of proportionate defense (defense in depth) and shall include: · deterrence: security measures aimed at dissuadingany adversary planning to attack the System; · prevention: security measures aimed at impeding or blocking an attack on the System; · detection: security measures aimed at discovering the occurrence of an attack on the System; · resilience: security measures aimed atlimiting impact of an attack to a minimum set of information or assets and preventing further damage, and · recovery: security measures aimed at regaining a secure situation for the System if it is compromised.

If you wish to access the documents related to the Invitation to Tender, you have to log in to the ESA Portal.