Hours for live chat and calls:
Sun 8 p.m. - Fri 8:30 p.m. CST
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
With Highly Adaptive Cybersecurity Services, or HACS, your agency can:
HACS vendors are categorized under five subgroups for market research purposes:
Always check a contractor's GSA price list to verify and confirm availability of awarded products and services.
Combine SINs to meet your requirements or try a blanket purchase agreement to easily fill recurring needs. You can also set aside the requirement for one or more socio-economic categories including but not limited to small businesses, veteran-owned businesses, and women-owned businesses.
Need support or subject matter expertise? Reach our team at ITSecurityCM@gsa.gov.
HACS templates provide typical language for a cybersecurity solicitation, and material from these examples can be copied and pasted directly into sections 3.0 and 4.0 of the RFQ template.
Submit a modification to add a SIN in the eOffer/eMod portal.
Follow the MAS Roadmap to prepare and send an offer.
Some vendors may require a HACS self-attestation [PDF - 103 KB] to apply for the HACS High Value Assessments subcategory.
All vendors must pass an oral technical evaluation before they can be awarded the HACS SIN:
You may not be subject to HACS oral technical evaluation if:
Join our IT security Interact community for news and updates for agencies and industry.