Skip Navigation

RFP: Cyber Risk Posture

Lone Star Legal Aid (LSLA) seeks proposals from qualified vendors to conduct a Cyber Risk Posture
Assessment, including penetration testing, preparation of a roadmap to address vulnerabilities, and help
with any policy enhancements to meet industry standards. The objective is to ensure that our
organization’s infrastructure is secure from cyber threats. For more information on Lone Star Legal Aid,
you can visit us at https://www.lonestarlegal.org.

 

All responses to this RFP must be received no later than 5:00 p.m. (US/Central) on April 30, 2025.

Respondents must be prepared to start as soon as possible upon selection due to the time constraints of
the project.
Project completion, including issue management, evaluation, final adjustments, and final reporting must
occur no later than April 30, 2026.

2025-CRPA-RFP v.2

Frequently Asked Questions

How many users and endpoints are in scope for the assessment?

 

Approximately 300 users, with several hundred devices across the organization.

How many servers are in the environment?

 

There are approximately 50 servers, a mix of physical and virtual, supporting internal operations.

Can you describe your network architecture?

 

We operate a multi-site network connected to a centralized datacenter, with redundant internet connections and VLAN segmentation.

What security tools are currently in use?

 

We have deployed solutions for endpoint detection, network access control, and client protection.

What cloud services are in use, and what sensitive data resides there?

 

We utilize a hybrid cloud environment that includes SaaS, CRM, and infrastructure services. Sensitive data may include client personally identifiable information (PII) and limited financial information.

How is user identity managed?

 

User management is handled through a combination of on-premises and cloud identity platforms.

Has LSLA conducted any prior cybersecurity assessments?

 

No formal cybersecurity posture assessments have been completed to date; only basic IT control reviews during annual financial audits.

Will the penetration testing include internal assessments?

 

Only external penetration testing is currently required. However, proposers may submit optional pricing for internal testing.

Are phishing simulations or other social engineering tests part of the engagement?

 

No. LSLA conducts phishing training and testing separately and does not require it for this engagement.

How many public-facing IP addresses and applications are in scope?

 

Several public-facing IP addresses and a limited number of externally accessible applications are included.

Is physical security assessment included in the project?

 

No, physical security is not in scope.

How many cybersecurity policies currently exist?

 

A small number of basic cybersecurity-related policies exist; these require updates and expansion.

Can the assessment be performed remotely?

 

Yes, remote execution is allowed. Site visits are optional but not required.

Are there any requirements regarding the citizenship or location of assessors?

 

U.S.-based personnel are preferred, but offshore resources are acceptable if aligned with LSLA’s business hours (8:00 AM – 5:00 PM CST).

Is active remediation expected as part of the project?

 

No. The focus should be on providing findings, recommendations, and a strategic remediation roadmap. Remediation work will be handled internally.

What level of training is expected?

 

Executive-level awareness training where we go over the new policy changes with examples for our end users is expected, including one live session and a recorded version for onboarding future staff.

Will policy enhancement require developing new policies or updating existing ones?

 

Both. Some policies exist but additional development is needed to align with cybersecurity best practices.

What expectations are there regarding AI governance?

 

LSLA seeks to develop a risk management approach for AI tools, supporting both current initiatives and future projects.

Are there specific cybersecurity metrics or KPIs LSLA expects to track?

 

LSLA is seeking assistance to establish a cybersecurity baseline and recommendations for meaningful KPIs moving forward.

What is the size of the organization?

 

LSLA is a medium-sized nonprofit organization.

How many physical locations does LSLA operate?

 

LSLA operates more than a dozen physical office locations plus remote users.

How is the IT environment structured across departments?

 

All technology is centrally managed by LSLA’s IT team; departments are not siloed.

Are the website and CMS included in the scope of assessment?

 

Yes, both are included in the external assessment scope.

Is there a defined budget range for this engagement?

 

No budget ceiling is disclosed. Proposers are encouraged to submit competitive pricing appropriate to the scope outlined in the RFP.