You are here

OS Containerization Architecture for Reuse (OSCAR)

Award Information
Agency: Department of Defense
Branch: Navy
Contract: N68335-22-C-0850
Agency Tracking Number: N202-106-0053
Amount: $799,863.00
Phase: Phase II
Program: SBIR
Solicitation Topic Code: N202-106
Solicitation Number: 20.2
Timeline
Solicitation Year: 2020
Award Year: 2022
Award Start Date (Proposal Award Date): 2021-12-13
Award End Date (Contract End Date): 2023-12-22
Small Business Information
3626 Quadrangle Boulevard, Suite 100
Orlando, FL 32817-1111
United States
DUNS: 175966675
HUBZone Owned: No
Woman Owned: Yes
Socially and Economically Disadvantaged: No
Principal Investigator
 Omar Hasan
 (407) 601-7847
 ohasan@dignitastechnologies.com
Business Contact
 Elizabeth Burch
Phone: (407) 601-7847
Email: bd@dignitastechnologies.com
Research Institution
N/A
Abstract

The Navy’s Personal Electronic Maintenance Aid (PEMA) devices are subject to Department of Defense (DoD) security regulations that impose strict guidance on the security maintenance of DoD systems. DoD security guidance is issued using a number of mechanisms, including Security Technical Implementation Guides (STIGs), Information Assurance Vulnerability Management (IAVM) messages, and DoD memorandum.  Failure to comply with these DoD guidelines endangers the program’s ability to retain its authorization to operate, risking failure of mission for the warfighter. The PEMA Windows 10-based software architecture and the variation across PEMA due to differences in installed Types/Model/Series (T/M/S) specific applications impart significant cost and effort to meet the DoD security requirements.  Our approach to investigate alternative operating systems (OS) and software architectures for PEMA aims to reduce the time and effort required to meet DoD security guidelines while ensuring that PEMA systems remain compliant with overarching DoD guidance. Our approach is designing and prototyping an architecture leveraging alternative open source software (OSS) for the PEMA operating systems and exploring the use of software containerization of PEMA applications. By combining each of these approaches into an overarching solution, we can reduce the time and effort required to meet DoD security guidelines and streamline the deployment of patches and configuration changes across PEMA systems.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government