{"id":3678,"date":"2024-08-10T19:03:30","date_gmt":"2024-08-10T17:03:30","guid":{"rendered":"https:\/\/www.cyberagentur.de\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/"},"modified":"2026-04-28T11:08:09","modified_gmt":"2026-04-28T09:08:09","slug":"ecosystem-trustworthy-it-proven-cybersecurity-oevit","status":"publish","type":"tender","link":"https:\/\/www.cyberagentur.de\/en\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/","title":{"rendered":"Trusted IT ecosystem &#8211; Proven cyber security (\u00d6vIT)"},"content":{"rendered":"  <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n<h3 class=\"wp-block-heading has-text-align-left\">Description<\/h3>\n\n<p>The purpose of this tender is to have an IT stack researched for which security properties can be formally specified and verified from hardware to software. To this end, the security properties must be taken into account at the design stage of IT systems and hardware and software must be developed in a coordinated manner &#8211; &#8220;security by design&#8221; paired with &#8220;hardware and software co-design&#8221;. Research services and works (&#8220;project&#8221;) are financed via this call for proposals, the results of which are made available to the public administration of the Federal Republic of Germany via the client.    <\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Deadline for the submission of requests to participate<\/h3>\n\n<p><strong>30.11.2023, 11:00 a.m., <\/strong>via <a href=\"https:\/\/deu01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.evergabe-online.de%2F&amp;data=05%7C01%7Clindner%40cyberagentur.de%7C9c8b280f15aa4eb45dcb08dbb0366ddf%7C5af5addd67a84166a44ea46bb97cdde2%7C0%7C0%7C638297520036363996%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=PNWbatFWbKbwFmpv8sEs5IZm3JUVoopr7IhKPrOmOgo%3D&amp;reserved=0\">www.evergabe-online.de <\/a>or directly <a href=\"https:\/\/www.evergabe-online.de\/tenderdocuments.html?0&amp;id=536095\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.evergabe-online.de\/tenderdocuments.html?0&amp;id=536095<\/a><\/p>\n\n<p><strong>Awarding body: <\/strong>Agentur f\u00fcr Innovation in der Cybersicherheit GmbH<br\/><strong>Services and products:<\/strong> Research and development services and related consulting<br\/><strong>Tender scope:<\/strong> Europe-wide + + NATO, Australia, New Zealand<br\/><strong>Procurement procedure:<\/strong> Pre-commercial procurement<br\/><strong>Type of award:<\/strong> Based on a competitive dialog<br\/><strong>Place of fulfillment:<\/strong> Halle (Saale), district-free city<br\/><strong>Contact:<\/strong> only via <a href=\"http:\/\/www.evergabe-online.de\/\" target=\"_blank\" rel=\"noreferrer noopener\">www.evergabe-online.de<\/a><br\/><strong>Contract notice number: <a href=\"https:\/\/www.evergabe-online.de\/tenderdocuments.html?0&amp;id=536095\" target=\"_blank\" rel=\"noreferrer noopener\">2023\/S 173-542341<\/a><\/strong><br\/><strong>CPV code:<\/strong> 73000000<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description The purpose of this tender is to have an IT stack researched for which security properties can be formally specified and verified from hardware to software. To this end, the security properties must be taken into account at the design stage of IT systems and hardware and software must be developed in a coordinated [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","class_list":["post-3678","tender","type-tender","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trusted IT ecosystem - Proven cyber security (\u00d6vIT) - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trusted IT ecosystem - Proven cyber security (\u00d6vIT) - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Description The purpose of this tender is to have an IT stack researched for which security properties can be formally specified and verified from hardware to software. To this end, the security properties must be taken into account at the design stage of IT systems and hardware and software must be developed in a coordinated [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T09:08:09+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/tenders\\\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/tenders\\\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\\\/\",\"name\":\"Trusted IT ecosystem - Proven cyber security (\u00d6vIT) - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"datePublished\":\"2024-08-10T17:03:30+00:00\",\"dateModified\":\"2026-04-28T09:08:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/tenders\\\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/tenders\\\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/tenders\\\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trusted IT ecosystem &#8211; Proven cyber security (\u00d6vIT)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trusted IT ecosystem - Proven cyber security (\u00d6vIT) - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/","og_locale":"en_GB","og_type":"article","og_title":"Trusted IT ecosystem - Proven cyber security (\u00d6vIT) - Cyberagentur","og_description":"Description The purpose of this tender is to have an IT stack researched for which security properties can be formally specified and verified from hardware to software. To this end, the security properties must be taken into account at the design stage of IT systems and hardware and software must be developed in a coordinated [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/","og_site_name":"Cyberagentur","article_modified_time":"2026-04-28T09:08:09+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/","url":"https:\/\/www.cyberagentur.de\/en\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/","name":"Trusted IT ecosystem - Proven cyber security (\u00d6vIT) - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"datePublished":"2024-08-10T17:03:30+00:00","dateModified":"2026-04-28T09:08:09+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/tenders\/ecosystem-trustworthy-it-proven-cybersecurity-oevit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Trusted IT ecosystem &#8211; Proven cyber security (\u00d6vIT)"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tenders\/3678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tenders"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/tender"}],"version-history":[{"count":3,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tenders\/3678\/revisions"}],"predecessor-version":[{"id":6165,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tenders\/3678\/revisions\/6165"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=3678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}