{
    "version" : "https://jsonfeed.org/version/1",
    "content" : "news",
    "type" : "single",
    "title" : "GSA Shared Service Provider Program Guide |Digital.gov",
    "description": "GSA Shared Service Provider Program Guide",
    "home_page_url" : "/preview/gsa/digitalgov.gov/cm-topics-button-component/","feed_url" : "/preview/gsa/digitalgov.gov/cm-topics-button-component/2023/07/19/gsa-shared-service-provider-program-guide/index.json","item" : [
    {"kicker" : "<no value>","title" :"GSA Shared Service Provider Program Guide","deck" : "Interested in becoming a Shared Service Provider?","summary" : "The newly-released SSP Program Guide was created for commercial vendors interested in becoming a Shared Service Provider.","date" : "2023-07-19T15:15:00-05:00","date_modified" : "2024-04-02T09:45:13-04:00","authors" : {"cheryl-jenkins" : "Cheryl Jenkins","tyler-jones" : "Tyler Jones"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "security" : "Security"
            },"primary_image" : { "uid" : "data-security-concept-comp", "alt" :
  "Dark blue data security concepts graphic.", "width" :
  "1200", "height" :
  "630", "credit" :
  "", "caption" :
  "PlargueDoctor, iStock, Getty Images Plus", "format" :
  "png" },"branch" : "cm-topics-button-component",
      "filename" :"2023-07-19-gsa-shared-service-provider-program-guide.md",
      
      "filepath" :"news/2023/07/2023-07-19-gsa-shared-service-provider-program-guide.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/cm-topics-button-component/content/news/2023/07/2023-07-19-gsa-shared-service-provider-program-guide.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/cm-topics-button-component/content/news/2023/07/2023-07-19-gsa-shared-service-provider-program-guide.md","slug" : "gsa-shared-service-provider-program-guide","url" : "/preview/gsa/digitalgov.gov/cm-topics-button-component/2023/07/19/gsa-shared-service-provider-program-guide/","weight" : "1","content" :"\u003cp\u003eFor contractors who provide digital services to the federal government, a public key infrastructure (PKI) is critical to protecting confidential and sensitive information. \u003c/p\u003e\n\u003cp\u003eMany agencies offer PKI services, but the General Services Administration’s PKI Shared Services Program gives federal contractors an advantage in competing for contracts as they are compliant with federal government digital exchange requirements and are listed on the GSA Multiple Award Schedule. \u003c/p\u003e\n\u003cp\u003eTo help commercial vendors take advantage of the GSA PKI Shared Services Program, the Identity Assurance and Trusted Access Division, within GSA’s Office of Government-wide Policy (OGP), recently created the \u003ca href=\"https://www.idmanagement.gov/gsapkissp/\"\u003eGSA PKI Shared Services Program (SSP) Guide\u003c/a\u003e. \u003c/p\u003e\n\u003cp\u003eThe guide provides information on who should apply, the benefits of the program, and a step-by-step guide to apply. Commercial vendors can also find details on how to maintain the certificates once they join the program, as well as contact information if there are any questions. Federal employees that work with contractors in the digital space can also recommend that vendors explore GSA’s PKI Shared Services Program as a trusted option to acquire and maintain federal-compliant PKIs. \u003c/p\u003e\n\u003cp\u003eThe Shared Services Program offers several different certificates to fulfill your agency needs including:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003ePersonal Identity Verification (PIV) card\u003c/strong\u003e - Used for authenticating to websites, authenticating in government buildings, and signing and encrypting emails and documents.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eDerived PIV\u003c/strong\u003e - Used for authenticating to websites and signing and encrypting emails and documents.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003ePIV Interoperable (PIV-I)\u003c/strong\u003e - A PIV-I is technically comparable to a PIV card, but designed for agency staff who do not qualify for a PIV card.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eDevice certificates\u003c/strong\u003e - Used for secure HTTP connections on internal agency websites for end users and servers providing interagency trust.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eDigital signature\u003c/strong\u003e - Used to digitally sign emails and documents, including role-based signature certificates and Office of the Federal Register \u003ca href=\"https://digital.gov/2023/05/23/digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures/\"\u003eDigital Autopen\u003c/a\u003e signature certificates.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eKey management service\u003c/strong\u003e - Store and manage private keys associated with encryption certificates.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThe \u003ca href=\"https://www.idmanagement.gov/gsapkissp/\"\u003eSSP Program Guide\u003c/a\u003e is reviewed annually and has three major sections:\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003ca href=\"https://www.idmanagement.gov/gsapkissp#section-i-gsa-pki-ssp-program\"\u003eSection 1\u003c/a\u003e\u003c/strong\u003e - Outlines GSA management and acquisition controls of the GSA SSP Program according to \u003ca href=\"https://www.cio.gov/policies-and-priorities/ICAM/\"\u003eOMB Memo 19-17\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003ca href=\"https://www.idmanagement.gov/gsapkissp#section-ii-application-and-maintenance-activities\"\u003eSection 2\u003c/a\u003e\u003c/strong\u003e - Defines the application and ongoing maintenance process to apply and stay in the GSA SSP Program.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003e\u003ca href=\"https://www.idmanagement.gov/gsapkissp#section-iii-digital-certificate-services\"\u003eSection 3\u003c/a\u003e\u003c/strong\u003e - Lists available services a SSP should offer.\u003c/p\u003e\n\u003cp\u003eThe GSA SSP Program has a long history of successfully providing digital certificate services for employees, contractors, and affiliates. If you are interested in being part of that success, learn more about the \u003ca href=\"https://www.idmanagement.gov/gsapkissp/#application-process\"\u003eapplication process\u003c/a\u003e and the benefits of joining the program. If you have any questions, email the GSA PKI SSP Program at \u003ca href=\"mailto:GSAPKISSP@gsa.gov\"\u003eGSAPKISSP@gsa.gov\u003c/a\u003e.\u003c/p\u003e\n\n\n\n\u003carticle\n  class=\"dg-note \"\n\u003e\n  \u003ch4 class=\"dg-note__heading\"\u003e\n    \u003csvg\n      class=\"dg-note__icon usa-icon dg-icon dg-icon--large\"\n      aria-hidden=\"true\"\n      focusable=\"false\"\n    \u003e\n      \u003cuse xlink:href=\"/preview/gsa/digitalgov.gov/cm-topics-button-component/uswds/img/sprite.svg#notifications\"\u003e\u003c/use\u003e\n    \u003c/svg\u003e\n    \n      Note\n    \n  \u003c/h4\u003e\n  Register now to join the GSA PKI Shared Services Program. Email \u003ca href=\"mailto:GSAPKISSP@gsa.gov\"\u003eGSAPKISSP@gsa.gov\u003c/a\u003e with any questions or feedback on the GSA PKI Shared Service Program Guide. Include “Register now for GSA’s PKI Shared Services Program” in the subject line.\n\u003c/article\u003e\n\n"}
  ]
}
