IT security | GSA
Source: https://www.gsa.gov/technology/it-contract-vehicles-and-purchasing-programs/it-security
Archived: 2026-04-23 17:14
IT security | GSA
Skip to main content
Countdown to America's 250th Anniversary:
close
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock
(
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
IT security
Does your agency have
unique or recurring IT security needs
? Our contract vehicles offer products and services that you can customize to help your agency enhance security, improve resilience, protect important information, and bring systems up to date.
How do I buy IT Security?
Federal, state, local, and tribal governments
may be eligible to buy IT security products and services through GSA’s contract vehicles and purchasing programs:
Continuous Diagnostics and Mitigation Tools
— high-quality hardware, software, and services.
HACS SIN
— quality cybersecurity support services to test systems, address issues that make your agency vulnerable, and stop attacks.
SCRIPTS BPAs
— secure supply chain risk illumination tools and services to identify and mitigate risks.
Internet Protocol Version 6
— expanded IP address space with better mobility and security; can reduce network administration and security support costs.
Trusted Internet Connections
— provides TICs-compliant managed security services.
Follow the
National Institute of Standards and Technology Cybersecurity Framework
, which organizes basic cybersecurity activities into high-level functions —
Identify, Protect, Detect, Respond, Recover
— that support cybersecurity risk management.
Guides
Application Security Testing buyer’s guide
CDM Tools ordering guide
Zero Trust Architecture buyer’s guide
Cybersecurity Supply Chain Risk Management guide
Highly Adaptive Cybersecurity Services ordering guide
Department of Defense ZTA buyer’s guide
SCRIPTS BPAs ordering guide
How do I sell IT Security?
Industry partners can offer cost-effective, innovative solutions for IT requirements through Governmentwide Acquisition Contracts and MAS Information Technology. We understand that getting a GSA contract is a large investment and we are committed to help you succeed.
CDM tools vendor guide [PDF - 163 KB]
— a must-read for vendors interested in selling products under the CDM program.
MAS Roadmap
— MAS IT is one of the largest contracts agencies use to purchase commercial IT products, services, and solutions.
Resources
Cybersecurity Terms and Definitions for Acquisition [PDF - 862 KB]
Federal Public Key Infrastructure Management Authority
Federal Risk and Authorization Management Program
NIST Security Content Automation Protocol Validation Program
Common Criteria Certified Products
National Information Assurance Partnership
Contact us
Contact us
Chat or call
We are available Sunday 9 p.m.-Friday 9:30 p.m. Eastern time. Average wait times are under a minute.
Live chat currently closed: Normal hours are Sunday 9 p.m.-Friday 9:30 p.m. Eastern time.
855-482-4348
ITCSC@gsa.gov
Hours for live chat and calls:
Sun 8 p.m. to Fri 8:30 p.m. Central time
Follow us
ITC on LinkedIn
ITC Blog
Tell us what you think
Print Page
Email Page
Last updated: Nov 17, 2025
Top
1
Choose a location
Error, The Per Diem API is not responding. Please try again later.
No results could be found for the location you've entered.
Get my location
OR
State
City (optional)
OR
ZIP
Rates for Alaska, Hawaii, and U.S. territories and possessions are set by the
Department of Defense.
Rates for foreign countries are set by the
Department of State.
2
Choose a date
Select fiscal year
OR
Travel start date (mm/dd/yyyy)
Travel end date (mm/dd/yyyy)
Rates are available between 10/1/2023 and 09/30/2026.
The End Date of your trip can not occur before the Start Date.
Additional terms and conditions
Traveler reimbursement is based on the location of the work activities and not the accommodations,
unless lodging is not available at the work activity, then the agency may authorize the rate where
lodging is obtained.
Unless otherwise specified, the per diem locality is defined as
"all locations within, or entirely
surrounded by, the corporate limits of the key city, including independent entities located within
those boundaries."
Per diem localities with county definitions shall include
"all locations within, or entirely
surrounded by, the corporate limits of the key city as well as the boundaries of the listed counties,
including independent entities located within the boundaries of the key city and the listed counties
(unless otherwise listed separately)."
When a military installation or Government - related facility(whether or not specifically named) is
located partially within more than one city or county boundary, the applicable per diem rate for the
entire installation or facility is the higher of the rates which apply to the cities and / or counties,
even though part(s) of such activities may be located outside the defined per diem locality.
Skip to main content
Countdown to America's 250th Anniversary:
close
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock
(
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
IT security
Does your agency have
unique or recurring IT security needs
? Our contract vehicles offer products and services that you can customize to help your agency enhance security, improve resilience, protect important information, and bring systems up to date.
How do I buy IT Security?
Federal, state, local, and tribal governments
may be eligible to buy IT security products and services through GSA’s contract vehicles and purchasing programs:
Continuous Diagnostics and Mitigation Tools
— high-quality hardware, software, and services.
HACS SIN
— quality cybersecurity support services to test systems, address issues that make your agency vulnerable, and stop attacks.
SCRIPTS BPAs
— secure supply chain risk illumination tools and services to identify and mitigate risks.
Internet Protocol Version 6
— expanded IP address space with better mobility and security; can reduce network administration and security support costs.
Trusted Internet Connections
— provides TICs-compliant managed security services.
Follow the
National Institute of Standards and Technology Cybersecurity Framework
, which organizes basic cybersecurity activities into high-level functions —
Identify, Protect, Detect, Respond, Recover
— that support cybersecurity risk management.
Guides
Application Security Testing buyer’s guide
CDM Tools ordering guide
Zero Trust Architecture buyer’s guide
Cybersecurity Supply Chain Risk Management guide
Highly Adaptive Cybersecurity Services ordering guide
Department of Defense ZTA buyer’s guide
SCRIPTS BPAs ordering guide
How do I sell IT Security?
Industry partners can offer cost-effective, innovative solutions for IT requirements through Governmentwide Acquisition Contracts and MAS Information Technology. We understand that getting a GSA contract is a large investment and we are committed to help you succeed.
CDM tools vendor guide [PDF - 163 KB]
— a must-read for vendors interested in selling products under the CDM program.
MAS Roadmap
— MAS IT is one of the largest contracts agencies use to purchase commercial IT products, services, and solutions.
Resources
Cybersecurity Terms and Definitions for Acquisition [PDF - 862 KB]
Federal Public Key Infrastructure Management Authority
Federal Risk and Authorization Management Program
NIST Security Content Automation Protocol Validation Program
Common Criteria Certified Products
National Information Assurance Partnership
Contact us
Contact us
Chat or call
We are available Sunday 9 p.m.-Friday 9:30 p.m. Eastern time. Average wait times are under a minute.
Live chat currently closed: Normal hours are Sunday 9 p.m.-Friday 9:30 p.m. Eastern time.
855-482-4348
ITCSC@gsa.gov
Hours for live chat and calls:
Sun 8 p.m. to Fri 8:30 p.m. Central time
Follow us
ITC on LinkedIn
ITC Blog
Tell us what you think
Print Page
Email Page
Last updated: Nov 17, 2025
Top
1
Choose a location
Error, The Per Diem API is not responding. Please try again later.
No results could be found for the location you've entered.
Get my location
OR
State
City (optional)
OR
ZIP
Rates for Alaska, Hawaii, and U.S. territories and possessions are set by the
Department of Defense.
Rates for foreign countries are set by the
Department of State.
2
Choose a date
Select fiscal year
OR
Travel start date (mm/dd/yyyy)
Travel end date (mm/dd/yyyy)
Rates are available between 10/1/2023 and 09/30/2026.
The End Date of your trip can not occur before the Start Date.
Additional terms and conditions
Traveler reimbursement is based on the location of the work activities and not the accommodations,
unless lodging is not available at the work activity, then the agency may authorize the rate where
lodging is obtained.
Unless otherwise specified, the per diem locality is defined as
"all locations within, or entirely
surrounded by, the corporate limits of the key city, including independent entities located within
those boundaries."
Per diem localities with county definitions shall include
"all locations within, or entirely
surrounded by, the corporate limits of the key city as well as the boundaries of the listed counties,
including independent entities located within the boundaries of the key city and the listed counties
(unless otherwise listed separately)."
When a military installation or Government - related facility(whether or not specifically named) is
located partially within more than one city or county boundary, the applicable per diem rate for the
entire installation or facility is the higher of the rates which apply to the cities and / or counties,
even though part(s) of such activities may be located outside the defined per diem locality.