Johanna Curry: Army Application Owners Issue RFPs for Commercial Cloud Via ACCENT Contract Vehicle

Johanna Curry, project officer for the U.S. Army’s data center consolidation plan, has said application owners at the service branch have released requests for proposals for cloud platforms and related technical support under the Army Cloud Computing Enterprise Transformation contract vehicle, Federal News Radio reported Tuesday.

ACCENT seeks to help Army mission and application owners procure commercial software-as-a-service, infrastructure-as-a-service and platform-as-a-service cloud offerings and transition support services to facilitate migration of enterprise apps to the cloud.

Jared Serbu writes Curry told the station in an interview that RFPs were issued after application owners consulted an independent analysis team – Army Application Migration Business Office – about the security controls and other technical requirements they need in order to host apps in an impact-level four or five cloud platform.

“Rather than targeting specific ACCENT vendors, they would get proposals back that are appropriate for that application,” she added.

AAMBO operates under the Army’s program executive office for enterprise information systems and works to conduct technical reviews of apps and provide recommendations prior to cloud migration.

Curry said the military branch decided to use basic ordering agreements under the ACCENT contract in an effort provide commands leeway to purchase cloud services.

BOAs “allowed us to balance known baseline security requirements and service levels with enough flexibility for a mission owner to fit the needs of their organizations,” she added.

You may also be interested in...

David McKeown

David McKeown: DOD Eyes Creation of Zero-Trust-Focused Portfolio Office

David McKeown, the Department of Defense's (DOD) equivalent of a chief information security officer, said DOD is looking to establish a portfolio management office that specializes in zero-trust cybersecurity. The office's creation would help DOD centralize and manage efforts to implement a zero-trust architecture, which strictly imposes requirements before one is able to access the defense network.

Leave a Reply

Your email address will not be published. Required fields are marked *