Federal Mandate

Zero Trust Architecture Government Contracts

OMB Memorandum M-22-09 mandates that all federal agencies achieve specific zero trust security goals by the end of FY2024, creating billions in contract opportunities across identity management, network segmentation, endpoint security, and data protection.

100M+ government records · 300+ gov/news sources · Updated hourly

$6B+
Estimated ZTA Spending
100+
Agencies Under Mandate
5
CISA Maturity Pillars

OMB M-22-09: The Federal Zero Trust Mandate

Released in January 2022, OMB Memorandum M-22-09 ("Moving the U.S. Government Toward Zero Trust Cybersecurity Principles") requires all federal agencies to meet specific zero trust security goals. This mandate followed Executive Order 14028 on Improving the Nation's Cybersecurity and was shaped by the SolarWinds and Colonial Pipeline incidents.

The memorandum sets concrete requirements across five pillars: agencies must employ centralized identity management using phishing-resistant MFA, maintain a complete inventory of authorized devices, encrypt all DNS and HTTP traffic, treat all applications as internet-connected, and leverage automated security analytics to detect and respond to threats.

For contractors, M-22-09 creates demand across every cybersecurity discipline. Agencies that have not yet achieved their zero trust goals continue to invest heavily in solutions and services that help them close gaps identified in their zero trust implementation plans.

CISA Zero Trust Maturity Model: 5 Pillars

CISA's Zero Trust Maturity Model provides a roadmap for agencies to transition from traditional perimeter-based security to zero trust. Each pillar represents a distinct area of contracting opportunity.

1

Identity

Agency staff use enterprise-managed identities with phishing-resistant MFA to access applications. Contract opportunities include identity governance and administration (IGA), privileged access management (PAM), FIDO2/WebAuthn deployment, and identity threat detection and response (ITDR). This is often the highest-priority pillar for agencies beginning their zero trust journey.

2

Devices

Agencies maintain a complete inventory of every device authorized and operated for official use and can detect and respond to incidents on those devices. Opportunities span endpoint detection and response (EDR), mobile device management (MDM), asset discovery, and device health attestation solutions that feed into continuous authorization decisions.

3

Networks

Agencies encrypt all DNS and HTTP traffic and begin segmenting networks around applications. Contract areas include microsegmentation, software-defined networking, encrypted DNS (DoH/DoT), SASE/SSE architectures, and network traffic analysis. TIC 3.0 modernization overlaps heavily with zero trust network requirements.

4

Applications & Workloads

Agencies treat all applications as internet-connected, conduct rigorous testing, and welcome external vulnerability reports. Opportunities include application security testing (SAST/DAST/IAST), API security, zero trust network access (ZTNA) for application delivery, secure access service edge (SASE), and vulnerability disclosure platform management.

5

Data

Agencies use thorough data categorization to deploy protections and leverage cloud security services to monitor access to sensitive data. Contracts cover data classification, data loss prevention (DLP), cloud access security brokers (CASB), encryption key management, and data access governance. The emphasis on data-centric security reflects the shift from protecting perimeters to protecting data itself.

DoD Zero Trust Reference Architecture

The Department of Defense published its Zero Trust Reference Architecture and Strategy in 2022, setting a goal to implement zero trust across the DoD enterprise by FY2027. The DoD approach identifies 45 capabilities across 7 pillars (the 5 CISA pillars plus Visibility/Analytics and Automation/Orchestration) with "target" and "advanced" maturity levels.

DISA leads the Thunderdome project, a zero trust prototype for DISA's own enterprise that is being used as a model for broader DoD adoption. Thunderdome implements SASE, microsegmentation, and software-defined perimeters to replace the traditional DISA network perimeter.

Key contracting opportunities under the DoD Zero Trust Strategy include identity, credential, and access management (ICAM) modernization, network microsegmentation at scale, endpoint security with compliance-based access controls, and the integration of security orchestration, automation, and response (SOAR) platforms to enable automated zero trust policy enforcement.

Market Intelligence — Zero Trust

Active Records
2,736
Total Award Value
$7,522,539,172
Average Value
$2,885,516
Record Types
4

Records by Type

Job Listings2,583Regulations77Contracts73Grants3

Top Contractors in Zero Trust

1.CRAIG ALLEN MCCOOL FAMILY TRUST
Not specified

Set-Aside Distribution

Full and Open Competition52.2%NONE34.3%Small Business Set-Aside10.4%Indian Economic Enterprise1.5%Service-Disabled Veteran-Owned Small Business1.5%

Monthly Activity (Last 12 Months)

2025-05
0
2025-06
0
2025-07
0
2025-08
0
2025-09
0
2025-10
0
2025-11
0
2025-12
35
2026-01
69
2026-02
147
2026-03
1,169
2026-04
1,306

Recent Zero Trust Opportunities

ContractActivesocrata_local

Inspection, Repair, Maintenance, and Installation of Electronic Security System

Montgomery County, MD - Police
Posted May 5, 2021NAICS 541512 Computer Systems Design ServicesNONE
View intelligence →
ContractActivestate_ky

EAI Security Systems, Inc.

Unknown Agency
Posted Dec 21, 2025NAICS 541512 Computer Systems Design ServicesNONE
View intelligence →
ContractActivestate_ny

Service on Airport Security Systems

Ogdensburg Bridge and Port Authority
Posted Dec 17, 2025NAICS 541512 Computer Systems Design ServicesNONE
View intelligence →
ContractActivestate_ny

Fye16 Security System Maintenance

Niagara Frontier Transportation Authority
Posted Dec 17, 2025NAICS 541512 Computer Systems Design ServicesNONE
View intelligence →
ContractActivestate_ny

Fy17 Security System Maintenance-state

Niagara Frontier Transportation Authority
Posted Dec 17, 2025NAICS 541512 Computer Systems Design ServicesNONE
View intelligence →
ContractActivestate_ny

Cyber Security

Onondaga County Water Authority
Posted Dec 17, 2025NAICS 541512 Computer Systems Design ServicesNONE
View intelligence →
ContractActiveFPDS.gov

PURCHASE ORDER 140D0418P0119 (P00002) awarded to IDEMIA IDENTITY & SECURITY USA LLC, was modified for the amount of $249,000

DEPARTMENTAL OFFICES
NAICS 541512 COMPUTER SYSTEMS DESIGN SERVICESUNKNOWN
View intelligence →
ContractActiveFPDS.gov

New PURCHASE ORDER 140D0418P0119 awarded to IDEMIA IDENTITY & SECURITY USA LLC for the amount of $502,200

DEPARTMENTAL OFFICES
NAICS 541512 COMPUTER SYSTEMS DESIGN SERVICESUNKNOWN
View intelligence →
ContractActiveFPDS.gov

New DEFINITIVE CONTRACT DEIN0000094 awarded to INTELLIGENT NETWORK SECURITY LLC for the amount of $511,625

ENERGY, DEPARTMENT OF
NAICS 541512 COMPUTER SYSTEMS DESIGN SERVICESService-Disabled Veteran-Owned Small Business
View intelligence →
ContractActiveFPDS.gov

New PURCHASE ORDER DOCDG133504SE0076 awarded to PROTECTIVE SECURITY INCORPORATED for the amount of $2,660.04

NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION
NAICS 541512 COMPUTER SYSTEMS DESIGN SERVICESNONE
View intelligence →

All Records

ContractActive

Inspection, Repair, Maintenance, and Installation of Electronic Security System

Montgomery County, MD - Police
Posted May 5, 2021
NAICS 541512 Computer Systems Design Services
ContractActive

EAI Security Systems, Inc.

Unknown Agency
Posted Dec 21, 2025
NAICS 541512 Computer Systems Design Services
ContractActive

Service on Airport Security Systems

Ogdensburg Bridge and Port Authority
Posted Dec 17, 2025
NAICS 541512 Computer Systems Design Services
ContractActive

Fye16 Security System Maintenance

Niagara Frontier Transportation Authority
Posted Dec 17, 2025
NAICS 541512 Computer Systems Design Services
ContractActive

Fy17 Security System Maintenance-state

Niagara Frontier Transportation Authority
Posted Dec 17, 2025
NAICS 541512 Computer Systems Design Services
ContractActive

Cyber Security

Onondaga County Water Authority
Posted Dec 17, 2025
NAICS 541512 Computer Systems Design Services
ContractActive

PURCHASE ORDER 140D0418P0119 (P00002) awarded to IDEMIA IDENTITY & SECURITY USA LLC, was modified for the amount of $249,000

DEPARTMENTAL OFFICES
NAICS 541512 COMPUTER SYSTEMS DESIGN SERVICES
ContractActive

New PURCHASE ORDER 140D0418P0119 awarded to IDEMIA IDENTITY & SECURITY USA LLC for the amount of $502,200

DEPARTMENTAL OFFICES
NAICS 541512 COMPUTER SYSTEMS DESIGN SERVICES
ContractActive

New DEFINITIVE CONTRACT DEIN0000094 awarded to INTELLIGENT NETWORK SECURITY LLC for the amount of $511,625

ENERGY, DEPARTMENT OF
NAICS 541512 COMPUTER SYSTEMS DESIGN SERVICES
ContractActive

New PURCHASE ORDER DOCDG133504SE0076 awarded to PROTECTIVE SECURITY INCORPORATED for the amount of $2,660.04

NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION
NAICS 541512 COMPUTER SYSTEMS DESIGN SERVICES

Win Zero Trust Contracts Faster

Get alerts for new zero trust architecture opportunities matched to your capabilities. Track OMB M-22-09 compliance procurements and DoD Thunderdome task orders in one place.

Sign Up Free