City and County of San Francisco (CCSF)
1 South Van Ness Avenue, 2nd Floor
San Francisco, CA 94103-0948
Office: (415) 581-7000
Request for Information (RFI)
Enterprise Patch Management
Published: 23 January 2018
Informational Responses Due:
2 PM PST, 20 February 2018
Purpose
The Department of Technology (DT) and City Cybersecurity Team seek to improve the Citywide Vulnerability Management Program by implementing arobust, comprehensive centralizedEnterprise Patch Management solution that allows separate departments to self-manage their patching securely.DT and theCity Cybersecurity Teamsolicit information from vendors that provide robust comprehensive Enterprise Patch Management solutions, supporting City and County objectives in reducing risks and compromisesthroughout the City’s Information Technology systems.
Introduction
The Department of Technology (DT) and City Cybersecurity Teamare implementing a Citywide Vulnerability and Patch Management Program to identify and reduce vulnerabilities and threats to City systems, networks and data. Remediation will include the assessment and application of critical updates or patches for operating systems, platforms, services, applications and utilitiesin atimely fashion, or as critical updates are published.
DT and the City Cybersecurity Teamisfocusing its phase one efforts on servingdepartments and extended City enterpriseswith an emphasis oncritical City systems, networks, and data currently with nascent or non-active patch management programs.
DT and the City Cybersecurity Team seek a solution that enables departments and Information Technology groups with the transparency and control they need to manage and report risk effectively.
DT and theCity Cybersecurity Team seek information to determine how to formalize cooperative agreement(s) with potential partners. Depending on the approach we decide to pursue, DT and the City Cybersecurity Team may need to engage in a public procurement through a Request for Proposals (RFP). If so, information gathered by this effort may inform an RFP to pursue a particular approach.
RFI Submission Conditions
Inquiry Only – No Contract
This RFI is an inquiry only. No contract or agreement will be pursued as a result of this process. DT and the City Cybersecurity Team will analyze responses and provide recommendations for next steps. Depending on the approach selected, a public procurement through an RFP may follow separately. If so, information gathered by this effort may inform the RFP. The City cannot guarantee that the Project will advance to the public procurement stage or that any subsequent procurement, if there is one, will follow the approach described herein.
Changes to This RFI
The City may at any time, and at its sole discretion modify, amend, cancel and/or reissue this RFI by written addendum.If an addendum is issued prior to the date information is due, it will be published in the same manner, and at the same website location, by which this document is published. Please see
Information Preparation Costs
The City shall not be liable for any costs incurred by the Respondent in the preparation, submission, presentation, or revision of its information, or for any aspect of the Respondent’s pre‐information submission activity. No Respondent shall be compensated for participating in this RFI
Submittal of Confidential Information
Information submitted to the City in response to this RFI is subject to the California Public Records Act (“CRA”) and the City’s Sunshine Ordinance.
Ownership of Submitted Materials
All materials submitted in response to, or in connection with, this RFI shall become the property of the City.
Rights of the City
The City reserves all rights with respect to this RFI including, but not limited to, the unqualified right, at any time and in its sole discretion, to change or modify this RFI, to reject any and all information, to waive defects or irregularities in information received, to seek clarification of information, to request additional information, to request any or all Respondents to make a presentation, to undertake discussions and modifications with one or more Respondents, who, at any time, subsequent to the deadline for submissions to this RFI, may express an interest in the subject matter hereof. No Respondent shall have any rights against the City arising from the contents of this RFI, the receipt of information, or the incorporation in or rejection of information contained in any response or in any other document. The City makes no representations, warranties, or guarantees that the information contained herein, or in any addenda hereto, is accurate, complete, or timely or that such information accurately represents the conditions that would be encountered during the performance of any subsequent contract issued from a separate RFQ or RFP. The furnishing of such information by the City shall not create or be deemed to create any obligation or liability upon it for any reason whatsoever; and each Respondent, by submitting its information, expressly agrees that it has not relied upon the foregoing information, and that it shall not hold the City liable or responsible therefore in any manner whatsoever.
No Personal Liability
No City officer, agent or employee shall be charged personally with any liability by a Respondent or another or held liable to a Respondent or another under any term or provision of this RFI or any statements made herein or because of the submission or attempted submission of information or other response hereto or otherwise.
Information Requested
Respondents are asked toprovide information for a solution that can address the following evaluation criteria:
Scope of Support
Following are DT’s and the City Cybersecurity list of devices and general software included in phase one criteria:
- All common desktop operating systems (Microsoft Windows 7+ [all editions], Apple OS) and adjunct desktop service, application, and utility patching.
- All common network operating system(MS Windows Server 2008+ [all editions], Linux variants[i.e. Oracle, CentOS, Red Hat, Ubuntu]), adjunct service framework (i.e. Apache Tomcat, Microsoft IIS, Microsoft .net), application, and utility patching.
- All commondepartmental database (i.e. Microsoft SQL, PostgreSQL, Oracle), application and utility patching.
Following is a list of devices and software not included in our phase one deployment. Please note if the solution supports, plans on supporting or does not support the following items:
- Complex proprietary application suites requiring extensive patch requirements or custom methods of applying patches not lending itself to package distribution. For example, customized PeopleSoft based applications,Software as a Service (SaaS) applications, application platforms requiringcomplexcustom methodologies forpatching.
- SCADA (Supervisory Control and Data Acquisition) System patching. (Note: SCADA systems are used to monitor and control a plant or equipment in industries such as telecommunications, water and waste control, energy, oil and gas refining and transportation.)
- IBM Mainframe (excluded).
- IBM System I (AS/400) – AIX, GNU/Linux patching.
- Firmware (Desktop, Server, Network infrastructure) updates.
- Storage platform firmware/ operating systemupdates or patching. (SAN/NAS – Pure/ EMC)
- Network Infrastructure device (switch, router, firewall, load balancer, service appliance) patching.
- Google Android device (phones, tablets, Chromebooks) patching.
- Apple IOS device (phone, tablet) patching.
- IoT (Internet of Things) [Smart TVs) updates and or patching.
- ICS (Industrial Control Systems) updates or patching.
- Mobile Device Management (VMware AirWatch) platform updates or patching.
Application Platform Design
- Describe the solution’s platform architectureor design for a single department implementation.
- Describe the solution’s platform architecture or design for enterprise, multi-department implementation/s. Include options and alternative designs.
- If the solution is an “add-in” or enhancement to an existing solution, such as Microsoft SCCM, are there additional hardware, network or system requirements and what are they?
- Is there support to deploy the solution using virtual systems? If so, what are the requirements?
- If the solution requires a back-end database, what databases are supported and or recommended? Include versions and editions, if relevant.
- Does the solution provide an option for “Business Continuity” and or “Disaster Recovery”? If so, what are the designs, options and licensing models that pertain to such a deployment?
- If the solution has a SaaS option or is a SaaS solution, describe the following:
- Connectivity requirements and network security options.
- Solution access security models and requirements. How does access security integrate with existing City access controls or directories?
- If the solution currently does not have a SaaS option, are there plans to have this as an option, and if so, what are the stated advantages and drawbacks to the vendors proposed service?
- How does the solution scale from single department deployment to large scale multi-department enterprise deployments?
Endpoint Deployment
- Describe how the solution is deployed or supports endpoints based on operating system and or device type.
- Describe push/pull options for agent deployments.
- Are agentless deployments supported?
- If so, on what platforms?
- If both agent and agentless deployments are supported, what are the functional advantages or limitations of deploying one over the other?
- What hardware platforms are directly supported for patching, if any? For instance, network infrastructure devices (i.e. Cisco, Palo Alto), storage (i.e. EMC, Pure) or unified hardware platforms (i.e. Oracle EXA, Cisco UCS).
- Describe the types of endpoint access security required for deployment of the solution on supported endpoint operating systems and device types.
- What access rights are required to apply or scan for patches for specific operating systems or device types?
- Describe the solutions endpoint Inventory process.
- What data is collected and how is it utilized?
- What deploymentoptions are available for roaming devices that connect to the enterprise network infrequently, such as personal or business laptops?
- Are the following mixed endpoint deployment scenarios supported?
- Enterprise AD Domain?
- Departmental AD Domain?
- Non-AD Domain?
- Workgroup or non-joined standalone system?
- Is there a method, via the solution, to remove or uninstall its own agent software, if applicable, from an endpoint? If yes, how so?
Patch Support Library
- What desktop operating system endpoints are supported for patching? Please include versions and editions, if applicable.
- What network operating system endpoints are supported for patching? Please include versions and editions, if applicable.
- What database software endpoints are supported for patching? Please include versions and editions, if applicable.
- What application endpoints are supported for patching?
- What application, WEB frameworks and services are supported for patching? (i.e. Apache Tomcat, Microsoft IIS, etc.)
- What utilities are supported for patching?
- Are browser extensions, add-ins or plugins supported for patchingor patch availability? If so, which browsers?
- Are virtualization platforms and associated adjunct applications, appliances or products supported? (platforms may include VMware, Microsoft Hyper-V, Oracle VM)? Which ones and which applications?
- Are Oracle application products supported? Which ones?
- What hardware endpoints are supported? Include device types and vendors where applicable.
- How often is the patch library updated?
- How soon are new updates available for deployment?
- What is the average time to availability for deployment, once a vendor releases a patch?
- How extensive and current is the library?
- How often and what criteria are used to add new applications or devices to the patch library?
Administration Security
- Does the solution support “Role Based Access Controls” (RBAC)?
- If so, what functional aspects of the solution can the RBAC be applied to?
- Can custom roles be created where common functional attributes be shared and assigned?
- Can security groups be created and users assigned based on AD credentials?
- What other directories are supported for authentication to the solution?
- Are IDs and groups native (non-directory) to the solution supported?
- How is a secured multi-tenant design implemented allowing each tenant to view and manage assets limited to their group or tenancy?
- How is the administration or management interface deployed (i.e. WEB or desktop application)? What are the respective software requirements and or dependencies needed for the administration application to run?
- Can management dashboards be customized?
Execution
Please describe if and how the following function is supported:
- Is there “Download and execute” support where one can allow the node to download a patch, but execute it later?
- Is there support to run pre- and post-installation tasks?
- Are there “Store and forward" options(for example, deploy to a depot location and redistribute locally)?
- Are there Reboot controls?
- Does the solution provide network bandwidth mitigationcapabilities? If so, describe.
- Is there support for scripting?
- Is there support for recording/ packaging patches or upgrades to operating systems and or applications?
- Is there support for Microsoft Powershell or other CLI?
- Can the patch or update package deployment be customized via command line switches or other scripting tools?
- What other general functions or capabilities are supported through Microsoft Powershell or the CLI?
- Is there support for automated scheduling?
- Is there specific support for “priority patching”; functionality that addresses 0 day issues, where speed to rollout is a priority?
- Does the solution provide "enterprise-ready" patches? For example:
- Silent installation.
- Auto update turn off.
- Disabled adware.
- Shortcuts removed.
- End-user license agreement removed.
- With regards to endpoint management, how are devices that do not connect to City network regularly, handled (i.e. remote laptops and tablets using VPN)?
- Is there a function to uninstall desktop or server components or applications, if necessary?
- Are there workflow capabilities to address multi-tier application and database servers that have ordered dependencies for patching? For instance, if the database server is successfully patched, proceed to patch application servers. Once application server tier complete, patch“presentation” servers, etc.
- Is there support for patch process lifecycles, where a patch is moved through “evaluate”, “test”, “execute”, and “validate” phases?
- Is there virtualization/ hypervisor support? For example, where a virtual machine can be patched offline using mechanisms native to the virtual platform, or where snapshots can be triggered prior to the patch being executed?
- Are there ways to recover from a failed patch? For instance, remediation support for back out, rollback, and or restoration of the pre-patch environment.
- How are endpoints polled to assess a patch and or vulnerability profile? Can polling occur manually, be scheduled, or use some other automated methodology?
- If applications are added to or removed from an endpoint, is the patch profile and or inventory updated? How so?
- How are Microsoft O365 “click to run” applications supported?
- Does the solution have an ability to create groups of endpoints based on multiple criteria including OS, application, risk or criticality, patch availability, ownership or other meta data based criteria?
- Does the solution support mixed domain authentication scenarios for endpoints including…
- Enterprise AD Domain
- Separate Departmental AD Domain
- Non-AD Domain
- Workgroup or non-joined standalone system.
- What are constraints or issues with regards to mixed domain endpoints in management or execution, if any?
- Describe available alert types or other automated messaging available in the solution.
- Are there compliance policy enforcement capabilities? For instance, network access to the system can be limited or shutdownvia the solution due to the system being out of compliance with a critical patch.
- Does the solution offer alternative external methods for critical remediation of endpoints, such as a WEB site linking to vendor specific remediation sites where vendor patches can be directly downloaded and applied for a specific device, OS, or application? Please provide an example.
Reporting & Auditing
- What reports are supplied “out of the box”?
- Can reports be customized and or created?
- Are there automated report distribution mechanisms?
- Does the solution perform patch compliance analysis where it can be determined that an endpoint is at a designated patch level or determined ifpatch/es have been successfully applied?
- Provide a gap analysis of patches to be applied?
- Provide accurate patch success analysis (%)?
- Determine endpoint compliance with patch prerequisites (patch dependencies met) for patch deployment success?
- Does the solution support reporting that can be used in ascertaining regulatory compliance reporting for an endpoint?
- Can the solution track and audit access and use activity? Can the activity be audited and reported?
- If so, what are the mechanisms to do so?
- Can the solution provide an application audit orinventory to determine what applications, firmware, or other available version informationispresent on an endpoint?
- Are browser add-ins or extensions covered in an endpoint scan or audit?
- Are vulnerability assessments and or profile reporting included in the solution?
- Depth of patch metadata - Does the vendor provide additional information about the patch to assist with discovery, prioritization and reporting? For instance, criticality of a patch.
- License tracking– Can totals be derived for specific applications aggregated by version and endpoint owner/administrator/group/department? Describe.
- Can reporting support filtering on various endpoint criteria:
- Endpoint owner criteria.
- Endpoint asset software criteria.
- Endpoint asset hardware criteria.
- Are there real time or other performance monitoring functions to measure performance issues related to solution components or when resource constraints are being met?
- Describe what metrics the solution can report on.
- Describe business intelligence metrics or types of business intelligence reporting supported.
Integration & Compliance
- What integration is supported “out of the box”?
- In a standard purchasing scenario, are customers normally able to integrate to some of client management or vulnerability assessment tools without professional services?
- What APIs are supported?
Following is a list of applications and service platforms. Please describe how the solution either leverages, integrates with, provides or supports similar functionality.