Welcome to FloridaProcurements.com (FlaProc), your authoritative resource for navigating Florida’s government contracting landscape, with particular focus on transportation and technology opportunities. FlaProc provides free, expert guidance to help companies identify and secure state contracting opportunities throughout Florida. 

This resource is maintained by Attorney Sean Gellis of Gellis Law, PLLC, one of less than 75 attorneys Board Certified in State and Federal Government and Administrative Practice by The Florida Bar. Mr. Gellis brings unique insight to government contracting, having served as the Chief of Staff of the Florida Department of Management Services (DMS), General Counsel of the Florida Department of Transportation (FDOT), and Deputy General Counsel of the Florida Office of Insurance Regulation – positions that provided direct oversight of technology initiatives and issues of statewide importance. His record in bid protest litigation reflects the sophisticated advocacy and strategic thinking he brings to government contracting matters, particularly in complex transportation and technology procurements. Sean also leads Procurement Insider, a confidential subscription service that provides technology vendors with strategic intelligence and insider analysis of Florida government opportunities. Learn more about transforming your approach to government contracting at www.gellislaw.com/procurement-insider

Florida Commerce’s $525K Identity Crisis: Why This Six-Month Security Sprint Matters More Than You Think

Florida Department of Commerce seeks vendor to overhaul identity management—and the clock is already ticking.

During my tenure as Chief of Staff at the Department of Management Services—Florida’s central technology agency—I witnessed a consistent pattern: agencies struggling with outdated, manual identity management processes that created security gaps you could drive a truck through. Access requests languished in email chains. Former employees retained system access for weeks after departure. Nobody could definitively answer who had access to what, or why.

The Florida Department of Commerce just released RFP No. 26-RFP-003-LJ, and it’s a textbook example of an agency finally saying “enough is enough” to manual identity chaos. With proposals due November 17, 2025, this $525,000 procurement represents a six-month sprint to completely transform how Commerce manages identity governance and privileged access management—the unglamorous but absolutely critical plumbing that keeps government systems secure.

What’s Actually Being Procured (In English)

Before diving into strategy, let’s demystify what Commerce is actually buying here.

Identity Governance and Administration (IGA) is the system that answers three fundamental questions: Who has access? To what? And why? It’s the difference between manually tracking employee permissions in spreadsheets versus having automated, policy-driven controls that provision access when someone’s hired, adjust it when they change roles, and immediately revoke everything when they leave.

Privileged Access Management (PAM) focuses on the accounts that really matter—the ones with administrative access, the keys to the kingdom. Think database administrators, system admins, and service accounts that can touch sensitive data. PAM solutions ensure these powerful accounts are monitored, controlled, and auditable.

The critical insight here: Commerce isn’t just buying software. They’re buying consulting services to select the right IGA/PAM tools (up to $380,000 for the actual software), then implement and integrate those tools across their enterprise. The $525,000 covers the entire journey—discovery, architecture, procurement support, implementation, training, and handoff.

The Six-Month Problem Nobody’s Talking About

Here’s what jumped out at me immediately: this is a six-month contract (January 5 to June 30, 2026) to accomplish what typically takes 12-18 months.

Let me break down what Commerce expects the winning vendor to deliver in just six months:

  • Conduct comprehensive analysis of current identity management environment
  • Research and recommend specific IGA/PAM solutions
  • Support a separate procurement process for the actual tools (Chapter 287 compliant)
  • Implement and integrate the selected solution across on-premises and cloud systems
  • Update policies and procedures
  • Develop training materials and train staff
  • Establish integration playbooks and roadmaps
  • Hand off a fully operational system

During my time overseeing technology procurements, I saw these projects drag on for years when agencies tried to do too much, too fast. Commerce is betting they can accelerate by bringing in experienced consulting firepower upfront.

This compressed timeline tells me three things:

First, Commerce likely has preliminary vendor preferences already identified. The RFP mentions “the Department has already initiated this effort but seeks updated information/validation.” Translation: they’ve done homework but need expertise to confirm direction.

Second, someone at Commerce understands the risk of protracted technology implementations. Six months with clear deliverables beats two years of scope creep and vendor lock-in discussions.

Third, vendors need to demonstrate proven methodologies for rapid IGA/PAM deployments. This isn’t a learning opportunity—Commerce needs firms that have done this dance before and can compress timelines without cutting corners.

The Technical Complexity Behind the Buzzwords

Commerce’s current environment is a identity management nightmare that every state agency shares—I’ve seen it from the inside at five different agencies:

The Legacy Problem: Commerce manages “thousands” of user accounts through a “legacy, internally developed manual workflow system.” In government-speak, this means someone built an Access database or SharePoint workflow years ago that nobody fully understands anymore, and now it’s mission-critical infrastructure held together with prayers and institutional knowledge.

The Fragmentation Problem: Different systems use different access controls—Active Directory here, Azure Entra ID there, SQL database permissions over here, Oracle Database access over there. Add in Salesforce, Microsoft 365, and various cloud services, and you’ve got a identity sprawl that’s impossible to audit comprehensively.

The Manual Intervention Problem: Every access change requires direct staff intervention. New hire? Somebody manually provisions accounts across multiple systems. Role change? Somebody manually updates permissions. Termination? Somebody manually revokes access… eventually… hopefully… if they remember all the systems.

The security implications are profound. During incident response planning at DMS, we discovered that the average time to revoke all access for a terminated employee across all state systems was measured in weeks, not hours. That’s weeks where a disgruntled former employee potentially retains system access.

What Commerce Really Needs (And What Vendors Should Propose)

Commerce’s technical requirements reveal sophisticated thinking about modern identity management. They’re not looking for basic password management—they’re demanding enterprise-grade capabilities:

Full Lifecycle Automation: The solution must handle “joiner, mover, leaver” scenarios automatically. Integration with People First (Florida’s HR system) should trigger access provisioning when someone’s hired, adjust permissions based on role changes, and immediately revoke all access upon separation.

Non-Human Identity Management: This is where most IGA projects stumble. Commerce explicitly requires support for “contractors, APIs, service accounts, and devices.” Those API keys and service accounts? They’re often the biggest security holes because nobody systematically tracks or rotates them.

Account Reconciliation: The solution must identify “orphaned, expired, unassociated, duplicative, or dormant identities.” Having managed similar projects, I can tell you that first reconciliation sweep typically finds 20-30% of active accounts shouldn’t exist anymore.

Zero Trust Architecture Alignment: Commerce specifically requires ZTA principles—continuous authentication, context-aware access, least privilege by default. This isn’t security theater; it’s recognition that perimeter security is dead and identity is the new security boundary.

Compliance Readiness: Commerce explicitly lists FBI CJIS, IRS FTI, PCI DSS, and SSA data sharing requirements. The winning vendor must understand how IGA/PAM solutions support compliance frameworks, not just technical implementation.

The $380,000 Tool Budget: Strategic Implications

Buried in the scope of work is a critical constraint: the IGA/PAM tools themselves cannot exceed $380,000. This is likely a multi-year licensing cost, but the exact term isn’t specified—a detail vendors should clarify during Q&A.

This budget constraint immediately narrows the field of potential solutions. Enterprise IAM platforms from major vendors can easily exceed this for initial licensing, especially for an organization managing “thousands” of accounts.

Smart vendors will:

Propose scalable architectures: Start with core capabilities for critical systems, with clear roadmap for expanding to additional integrations within existing budget.

Demonstrate TCO transparency: The $380,000 is just licensing. What about professional services for future integrations? Vendor lock-in costs? Annual maintenance increases?

Highlight cloud-native options: Cloud-delivered IAM solutions often provide better economics than on-premises deployments, especially for agencies still building cloud competency.

Consider hybrid approaches: Perhaps a best-in-class IGA solution paired with a complementary PAM tool provides better value than an all-in-one platform that’s mediocre at both.

The Compliance Minefield

Commerce’s compliance requirements aren’t checkbox items—they’re mission-critical constraints that will determine technical architecture:

FBI CJIS Security Policy: Any solution touching criminal justice data must meet stringent physical, technical, and administrative security controls. This eliminates many pure cloud solutions and requires specific vendor certifications.

FedRAMP Moderate ATO: For cloud services, FedRAMP authorization is non-negotiable. The number of IGA/PAM vendors with current FedRAMP authorization is limited—instant competitive differentiator for those who have it.

Data Residency Requirements: “All State data associated with the IGA and PAM solutions must be stored, processed, and accessed exclusively within the continental United States.” This eliminates vendors using international data centers or offshore support teams.

Rule 60GG-2 and 60GG-4 FAC: Florida’s cloud security requirements add another layer of vendor scrutiny. During my DMS tenure, we disqualified numerous vendors who couldn’t demonstrate compliance with these state-specific requirements.

Vendors who try to paper over compliance gaps with vague assurances about “working toward certification” will lose this competition. Commerce needs current, documented compliance—not promises.

The AI Wild Card

Here’s where Commerce gets interesting: they explicitly recognize AI-driven capabilities as value-add differentiators, not requirements.

Smart vendors will include AI/ML features like:

Behavioral Analytics: Machine learning that identifies anomalous access patterns—like a database administrator suddenly accessing HR records at 2 AM.

Automated Role Mining: AI that analyzes actual access usage to recommend role-based access control structures, rather than relying on theoretical org charts.

Predictive Access Recommendations: “People in similar roles typically need these eight systems”—reducing manual access request overhead.

Risk Scoring: Dynamic risk assessment based on user behavior, access patterns, and contextual factors.

But here’s the strategic insight from my bid evaluation experience: Commerce explicitly wants “explainability and auditability of AI decisions.” Black-box AI that can’t explain why it flagged an access request or recommended a role structure won’t score well.

This is sophisticated procurement thinking. Commerce recognizes AI’s potential value but understands the governance challenges. Vendors should demonstrate how their AI features support—rather than replace—human oversight and policy enforcement.

Who Should (and Shouldn’t) Compete

Having evaluated hundreds of technology proposals, I can spot the vendors likely to succeed here:

Strong Candidates:

  • Systems integrators with proven state government IGA/PAM implementations
  • Identity management specialists with FedRAMP-authorized partnerships
  • Firms demonstrating successful 6-12 month rapid deployments
  • Vendors with existing Florida government relationships and agency access

Weak Candidates:

  • Pure software vendors without implementation services capability
  • Consultants without specific IGA/PAM expertise
  • Firms without documented compliance experience
  • International vendors without U.S.-based delivery teams

Dark Horse Candidates:

  • Mid-tier consulting firms partnering with established IAM platforms
  • Regional integrators with deep Florida agency knowledge
  • Specialized identity management boutiques partnering with national firms

The evaluation criteria weights technical capability heavily (60% technical vs. 40% cost). This explicitly favors proven expertise over low-ball pricing.

The Evaluation Reality Check

Commerce will evaluate proposals using a committee of at least three evaluators, with total possible points of 375. They reserve the right to shortlist the top three vendors for further discussion—a process I’ve overseen from the agency side dozens of times.

Here’s what evaluators actually look for, beyond the official criteria:

Specificity Over Generic Claims: “We have experience with IGA implementations” scores poorly. “We implemented SailPoint IdentityIQ at State Agency X, reducing account provisioning time from 5 days to 4 hours while ensuring CJIS compliance” scores well.

Risk Mitigation Understanding: Evaluators are scared of project failures more than excited by promises. Proposals that acknowledge risks (compressed timeline, complex integrations, compliance requirements) and articulate specific mitigation strategies demonstrate maturity.

Realistic Resource Commitments: Proposals claiming 3 junior consultants can deliver this scope in six months raise immediate red flags. Experienced project managers and senior identity architects drive scoring—show the A-team.

Florida-Specific Knowledge: Generic federal government experience doesn’t directly translate to Florida state government. References from other Florida agencies, understanding of People First integration, familiarity with 60GG requirements—these details matter.

The Strategic Questions Vendors Must Answer

Before investing significant proposal resources, smart vendors should use the Q&A period (deadline should be published in addendum) to clarify critical unknowns:

  1. Tool Selection Authority: Does Commerce expect vendors to present multiple tool options for Commerce selection, or does Commerce expect vendors to make the tool recommendation?
  2. Existing Vendor Relationships: Has Commerce engaged any IGA/PAM vendors for pilots, proofs of concept, or preliminary assessments? If so, are those vendors eligible to compete?
  3. Budget Flexibility: The $380,000 tool budget—does this cover just Year 1 licensing, or the full contract term? What about professional services from the tool vendor?
  4. Integration Priorities: Commerce mentions “critical systems” for initial integration. Which specific systems must be integrated during the six-month period versus future phases?
  5. Decision Authority: Who makes the final tool selection decision—Commerce technical staff, Commerce executive leadership, or joint decision with the consulting vendor?
  6. Incumbent Advantage: Does Commerce have existing contracts with identity management vendors that could be expanded rather than procuring new solutions?

These aren’t gotcha questions—they’re legitimate strategic clarifications that affect proposal approach, pricing, and risk assessment.

The Broader Implications for Florida IT Procurement

This RFP represents a microcosm of Florida’s evolving approach to technology procurement—and it’s worth noting what Commerce got right here:

Separating Consulting from Tools: Rather than bundling implementation services with software licensing (which creates vendor lock-in), Commerce split them. The consulting vendor helps select tools, then implements them. This creates flexibility and prevents “we recommend our own product” conflicts of interest.

Realistic Timeline with Clear Deliverables: Six months is aggressive but achievable with proper scoping. Commerce defined specific deliverables (project plan, OCM plan, training materials, integration playbook) rather than vague “implement solution” language.

Compliance Upfront: Rather than treating security and compliance as afterthoughts, Commerce embedded requirements throughout the RFP. This prevents the classic “we didn’t know you needed CJIS compliance” change order scenario.

AI as Value-Add, Not Requirement: Commerce recognized emerging technology value without mandating bleeding-edge features that might not be mature enough for government deployment.

These procurement practices reflect lessons learned from Florida’s technology project failures. Commerce is trying to avoid the CONNECT-style disasters by being prescriptive about requirements, realistic about timelines, and clear about compliance obligations.

What This Means for Florida’s Digital Security

Step back from procurement mechanics and consider what Commerce is really trying to accomplish: transforming identity management from a manual, error-prone process into an automated, policy-driven security control.

When implemented successfully, this solution will:

Reduce Security Risk: Automated deprovisioning means former employees lose access immediately, not eventually. Privileged access monitoring means administrative account abuse gets detected in real-time.

Improve Compliance Posture: Automated access reviews, comprehensive audit trails, and policy-driven provisioning demonstrate due diligence to auditors and oversight bodies.

Enable Business Agility: New employees become productive faster when access provisioning takes hours instead of days. Cloud service adoption accelerates when identity management keeps pace.

Support Remote Work: Context-aware access controls and secure privileged access enable productive remote work without sacrificing security.

But here’s the reality check from someone who’s managed these implementations: technology is only 30% of the solution. The other 70% is policy, process, and organizational change management. Commerce explicitly requires OCM planning—they understand that the best IGA/PAM tools fail without user adoption and process redesign.

The November 17 Deadline: What Vendors Should Do Now

With proposals due November 17, 2025 at 3:00 PM EST, interested vendors have approximately one month from release (October 17) to develop comprehensive responses. Based on the submission requirements, vendors need:

  • One original plus five copies of technical proposal
  • One original plus two copies of cost proposal
  • Electronic copies on USB drives
  • Redacted versions if claiming confidential information
  • Nine required attachments including references, certifications, and attestations

This isn’t a proposal you dash off over a long weekend. The 100-page limit (excluding attachments) forces disciplined writing—every page must demonstrate value and capability.

Immediate Actions for Serious Competitors:

Week 1 (Now): Assemble proposal team. Review full RFP (66 pages) in detail. Identify questions for Q&A submittal. Begin reference outreach to confirm availability.

Week 2: Submit technical questions to procurement officer ([email protected]). Begin drafting executive summary and technical approach sections. Identify subcontractor partnerships if needed.

Week 3: Refine technical approach based on Q&A responses (published as addendum). Complete past performance narratives. Develop detailed project schedule and resource plan.

Week 4: Final proposal review, compliance check against mandatory requirements, executive review, pricing development. Multiple internal reviews to ensure responsiveness.

Final Days: Professional production (binding, sealing, labeling), delivery planning (Caldwell Building requires visitor badge—allow extra time), final quality control.

The Bottom Line

Florida Commerce’s IGA/PAM procurement isn’t just another technology RFP—it’s a masterclass in how to structure identity management projects for success. The agency learned from past failures, separated consulting from product selection, embedded compliance throughout, and set realistic but aggressive timelines.

For vendors, this represents a high-value opportunity with a clear path to additional work. The six-month contract covers initial implementation, but the long-term system integration roadmap and future system connections represent ongoing professional services opportunities.

For Commerce, this procurement will determine whether they enter 2027 with modern, automated identity governance or continue struggling with manual processes that create security gaps and compliance headaches.

For Florida taxpayers, it’s about whether their government can secure sensitive data and operate efficiently in an increasingly digital world.

The clock is ticking. Proposals are due in less than a month. And somebody’s about to win the contract to transform how Florida Commerce manages identity and access for years to come.


Need strategic guidance on this RFP or other Florida technology procurements? Sean Gellis maintains FloridaProcurements.com and leads Gellis Law, PLLC, providing expert insight into Florida government contracting with particular focus on transportation and technology opportunities. As former Chief of Staff of the Florida Department of Management Services (DMS), General Counsel of the Florida Department of Transportation (FDOT), and Deputy General Counsel of the Florida Office of Insurance Regulation (OIR), he brings unparalleled insider perspective to government procurement matters. Board Certified in State and Federal Government and Administrative Practice by The Florida Bar—a distinction held by fewer than 75 Florida attorneys—he combines sophisticated legal experience with practical agency knowledge.

Contact Gellis Law, PLLC at www.gellislaw.com or learn more about our Procurement Insider subscription service for confidential strategic intelligence on Florida technology procurements.

Sean Gellis

Sean Gellis maintains FloridaProcurements.com and leads Gellis Law, PLLC, providing expert insight into Florida government contracting with particular focus on transportation and technology opportunities. As former Chief of Staff of the Department of Management Services (DMS), General Counsel of the Florida Department of Transportation (FDOT), and Deputy General Counsel of the Florida Office of Insurance Regulation (OIR), he brings unparalleled insider perspective to government procurement matters.

Board Certified in State and Federal Government and Administrative Practice by The Florida Bar—a distinction held by fewer than 75 Florida attorneys—he combines sophisticated legal experience with practical agency knowledge. Through FloridaProcurements.com, he regularly analyzes procurement trends and strategic opportunities in Florida's government marketplace. His Procurement Insider subscription service offers companies confidential intelligence and strategic guidance on Florida technology procurements, transforming how innovative providers compete for government business. Sean's unique background enables him to bridge the gap between government processes and private sector innovation, helping clients navigate procurement challenges and capitalize on opportunities that others miss.

http://www.gellislaw.com

Leave a Reply

Your email address will not be published. Required fields are marked *