Article | May 26, 2021
Another round of funding from by the Federal Aviation Administration (FAA) will guarantee the launch of numerous projects at airports throughout the U.S. This particular grant program provides smaller funding amounts, but the funding can augment projects that are part of larger initiatives.
U.S. Secretary of Transportation Elaine Chao announced in July that more than $273 million in airport safety and infrastructure funding has been approved for 184 airports in 41 states and six territories. Program details can be found here for airport safety and infrastructure grants. The bulk of the funding, just over $242 million, is provided through the FAA’s Airport Improvement Program, while $31 million is a result of the recent Coronavirus Aid, Relief, and Economic Security (CARES) Act.
This funding provides a 100 percent federal cost share for airport projects that fall into the category of infrastructure and/or safety. Projects of numerous types are eligible, but recently approved ones range from runway and taxiway construction to lighting improvements and master plan studies. And, most of the projects are slated to launch within the next year.
Projections for increased airline travel in 2021 are strong, and pent-up demand will result in even more upcoming airport projects of all types.
Florida
Plans for a major renovation at Punta Gorda Airport are underway and will be enhanced by a grant allocation of $471,305. The FAA funding will cover the design phase for renovating the airport’s 7,193-foot-long runway. Construction is slated to begin in 2021. Punta Gorda Airport is off the Gulf Coast north of Fort Myers.
Boca Raton Airport received a $694,444 federal grant to update its master plan. This upfront work will outline and prioritize airport improvement projects and expansion plans for the next two decades. Recent conversations have focused on new additions related to lighting, signage, taxiway and runway drainage, and other improvements. The 243-acre airport is in southern Palm Beach County.
While Tampa International Airport didn’t receive funding in the most recent round of FAA grants, numerous upcoming projects have been announced. The projects are listed in the airport’s 2021 Proposed Budget. Among those is an elevator modernization project projected to cost approximately $7.4 million. It is slated for the airport’s main terminal. Another technology project covered by a fiscal year 2021 capital commodity plan has a cost allocation of $1.5 million, and an airside A&C shuttle car and control system replacement project totaling $13.2 million is anticipated in the near future.
Miami International Airport is working on the solicitation for a new hotel with a 30- to 50-year lease agreement. As the nation’s second-busiest airport, officials hope to partner with a group to construct a “world-class” 350-room hotel. The plans call for the new hotel to be connected by a pedestrian bridge to Concourse D. Amenities will include a restaurant, business center, 20,000-square-foot meeting space for events, and a fitness center.
California
A small airport off Interstate 5 in northern California has been notified that it will receive funding for renovations. The Dunsmuir Municipal-Mott Airport was awarded $3.2 million to perform critical renovations to the runway and reconstructing the taxiway. City officials were pleased to announce that the airport runway, which has been in disrepair for some time, will now be completely refurbished and made safer.
Arkansas
Engineering and design work is nearing completion for a new $13 million terminal for Texarkana Regional Airport. The facility, which is located along U.S. 67 east of downtown Texarkana, received $3.6 million in FAA grant funding. Construction of the new terminal is just one part of a larger $34 million project for the airport.
Missouri
Columbia Regional Airport will extend one of its runways with the help of a $9.9 million federal grant. The Columbia City Council in March approved extending Runway 2-20 from 6,500 feet to 7,400 feet in order to be able to accept larger aircraft and also increase takeoff and stopping distances. City officials estimated the total cost of construction at $11 million, and the city has budgeted an additional $1.1 million for the runway extension project. This project will be launched in 2021.
Louisiana
Although airports in the state of Louisiana did not receive grant funding from the FAA, the Louis Armstrong New Orleans International Airport is working to finalize its master plan and has numerous projects already slated for the near future. Once the plan is completed, interested contractors will be able to find numerous and diverse improvement and expansion projects outlined. The airport is just south of Interstate 10 and Lake Pontchartrain.
Oregon
Hillsboro Airport has a $2.8 million construction project planned for early 2021. Officials have announced that a contractor will be selected to reconstruct almost the full length of Taxiway A and connect it to several other taxiways. The work will be performed in conjunction with the FAA and Port of Portland Operations.
Georgia
The city of Atlanta is scheduled to release a request for proposals (RFP) for on-call engineering services at Hartsfield-Jackson International Airport. An engineering firm will be selected to provide ground surveys in support of upcoming work that will be handled by the city aviation planning and development department. Atlanta’s airport held the distinction of being busier than any other airport in the U.S. in 2019. More than 110 million passengers passed through the airport either departing on or arriving back from airline flights.
Although these most recent grant awards will not fund huge airport projects, the funding will enable the launch of thousands of smaller contracting opportunities.
Mary Scott Nabers is president and CEO of Strategic Partnerships Inc., a business development company specializing in government contracting and procurement consulting throughout the U.S. Her recently released book, Inside the Infrastructure Revolution: A Roadmap for Building America, is a handbook for contractors, investors and the public at large seeking to explore how public-private partnerships or joint ventures can help finance their infrastructure projects.
Read More
Government Business
Article | July 14, 2022
“Belonging to the essential nature of a thing; originating and included wholly within an organ or part.” That is the definition of “Intrinsic.” When we were developing the “IT Manhattan Project” framework, we were doing so in direct response to some of the most significant hacks in U.S. Federal history, which piled on to the already unprecedented push to expedite the modernizing of federal IT because of the COVID-19 response. The COVID-19 response shifted the way that the U.S. federal government operated, where our workforce worked from, the immediate need for mobile ‘available from anywhere’ workloads, and how to both secure and support that new way of doing federal business. A new, vigorous push towards rapidly modernizing federal IT environments was underway. Ultimately, it laid the groundwork for producing transformational federal memos and oversight by way of some of the following:
Executive Order 14028: “Improving The Nation’s Cybersecurity”
M-22-09: OMB’s Zero Trust Strategy M-22-09
NIST 800-53rev5: Fulfilling an expedited realization of the overall intent of NIST 800-53r5 through the emphasis on things like conditional access, TIC 3.0 frameworks, Secure Orchestration/Automation/Remediation, and modernized, agile approaches to secure micro-segmentation from Hybrid Environments up to Federal Cloud instances
Overall mandates like these carry with them a consistent anthem driving at rapid IT modernization with rigorous proof of performance schedules attached. Piling on top of those Herculean efforts, the urgency was drastically increased by several of the highest profile cyber compromises in U.S. federal history. Rapid modernization had to happen right away. The time for IT transformation was here, backed by promises of significant funding and a high level of political visibility.
The Shift to Zero Trust
At their core intent, Zero Trust architectures are expected to provide a centralized policy structure that dictates how every individual flow in our IT environments are permitted to talk. No user, host, or flow is permitted without being subjected to rigorous authentication and authorization policy. This shifts our previous understanding of North-South, East-West traffic and how we police it. The foundational intent of Zero Trust architectures centers around applying unified policy to every transaction that occurs between enterprise resources, and doing so in ways that are agnostic to the IT Silo that they reside in.
Zero Trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location.”
NIST 800-207 aptly
They go on to explain that the scope of this posture includes all assets, workflows, network accounts, and the like. In summary, police everything, abstract production traffic intent from the underlying infrastructure that supports it, and institute a unified security posture to execute the policing at every network entry point. Regardless of the domain. We all know that this is a tectonic but much-needed shift in our industry. I’d go so far as to say that the successful instantiation of this approach across Federal IT environments is critical to our national security going forward.
Management Complexities
Enterprise IT domains contain varied mixtures of OEM solutions, home-grown tools, and utilize a wide variety of protocols to intercommunicate that aren’t necessarily standardize. Each of these domains is normally managed by separate IT teams who specialize in maintaining those environments. In the federal landscape, each of these domains aren’t just managed by separate enterprise IT teams, but are commonly managed by different contractors. Therefore, IT security organizations have a difficult time achieving and maintaining the necessary operational awareness required to enforce centralized policy. These cultural complexities exacerbated by budgeting concerns have created a fatalistic mentality when it comes to far-reaching mandates. This is where the tectonic shift in architectural and administrative approach is so necessary. This is where multidomain architectures shine.
Let’s define a common baseline of enterprise domains seen across traditional IT environments:
Cloud
Data Center
Enterprise Networking
Extended Enterprise (IoT, OT/ICS)
Remote Access
But to deliver a successful Zero Trust across the enterprise, it is first necessary to understand some foundational building blocks on which to construct our architectural approach:
We can’t have MULTIDOMAIN POLICY without first achieving fuller
We can’t deliver macro and micro-segmentation without first having robust MULTIDOMAIN
We can’t have multi-vendor MULTIDOMAIN Zero Trust POLICY without sensical INTEGRATIONS to stitch each enterprise domain together.
Let’s face it, enterprise IT environments don’t simply include infrastructure from a single manufacturer, or even a few key manufacturers. Rather, our Enterprise IT environments are represented by a plethora of IT manufacturers specializing in different niches of IT and the domains they are commonly found in. These environments are managed by different Federal IT organizations, different contractors who support these Federal IT organizations, and many different teams that support each common IT silo. Different teams that support oft-compartmentalized areas like Network Security Operations, Network Operations, Data Center Operations, Institutional Services, Wide Area Networking contracts, Operational Technologies, and dotted lines to different leadership oversight like CIO Programs, CTO Architecture, the Cyber Security Office, and the audit oversight bodies that they are subjected to. Each of these make up a complex support structure that isn’t necessarily streamlined for efficiency.
Summary and Overarching Goals
In articles to follow, you’ll see us referencing the IT Manhattan Project framework several times. Though many details of the framework can’t be discussed due to their sensitivity, the foundational principles are relevant across the board when pursuing intrinsic multidomain Zero Trust.
Establish Visibility (Administration, Telemetry, Assurance)
Define Straightforward Policy Structure and Hierarchy (Auth Chains)
Perform Multidomain Integrations (API Integrations)
Deploy Software-Defined Framework (Day-0, Programmable Fabrics, Multi-OEM Fabric Integrations)
Establish Sensical Automation Runbooks (Day-2 Operations)
We will also explore some areas that deliver unexpected value to the agency business in immediate ways. All of this will help create a cohesive story that helps CIOs, CISOs, and enterprise architects alike communicate the criticality of this multidomain Zero Trust approach to agency leaders across the federal spectrum.
Read More
Government Business
Article | July 11, 2022
The biggest IT challenge local governments faced during the COVID-19 pandemic has been scaling existing infrastructure to accommodate many more workers than they had planned for, IT leaders said during a June 17 panel discussion. “Our remote access solution was originally scaled for a major snow day, not for 3,000 to 4,000 remote users,” Charles Gore, IT security manager for Loudoun County, Va., said during a webinar presented by CompTIA’s Public Technology Institute. “We were looking at 500 users remote. We had to spread the scoping across multiple technologies, which we had, but we needed to very quickly adjust to accommodate the new users.”
Read More
Article | April 15, 2020
We’re starting to get the first independent analysis of the impact of the measures the U.S. Congress has passed to provide relief will have on the U.S. government’s fiscal situation. The Committee for a Responsible Federal Budget is first out of the gate with its preliminary findings, here is their main takeaway: Our latest projections find that under current law, budget deficits will total more than $3.8 trillion (18.7 percent of GDP) this year and $2.1 trillion (9.7 percent of GDP) in 2021. We project debt held by the public will exceed the size of the economy by the end of Fiscal Year 2020 and eclipse the prior record set after World War II by 2023. Keep in mind that prior to the coronavirus pandemic, the U.S. government was planning to spend $4.8 trillion in its 2020 fiscal year, borrowing $1.1 trillion. With the CRFB’s estimate of $3.8 trillion, the U.S. government will be borrowing more than the $3.7 trillion it had hoped to collect in taxes for the year.
Read More