Skip to main content
U.S. flag

An official website of the United States government

Cybersecurity Procurement Language Clauses for RFPs and EVSP Contracts

The Joint Office of Energy and Transportation (Joint Office) understands that cybersecurity risks must be addressed when building out electric vehicle supply equipment (EVSE).

With help from our laboratory partners, Pacific Northwest National Laboratory and Idaho National Laboratory, the Joint Office developed sample cybersecurity procurement language clausesthat can be modified for use in requests for proposals (RFPs) and electric vehicle service provider (EVSP) contracts.

By using the procurement language below as a guide, states and EVSE purchasers can reinforce cybersecurity as essential to the complete life cycle of the EVSE—from origination to discharge of contract. This sample language is intended to be tailored by the purchaser and incorporated in procurement specifications for EVSE equipment and services. States and EVSE purchasers are encouraged to seek legal advice from their procurement counsel before adopting any clauses included in this information. It is their responsibility to ensure that all procurements follow all applicable legal requirements, federal requirements, and state-specific policies and procedures.

Cybersecurity Procurement Language 101

The National Electric Vehicle Infrastructure Standards and Requirements (23 CFR 680), hereafter, “NEVI Standards and Requirements,” were established under the Infrastructure Investment and Jobs Act, which also established the National Electric Vehicle Infrastructure (NEVI) Formula Program and required the creation of minimum standards for EV charging infrastructure. 23 CFR 680.106(h) requires states or other direct recipients to implement cybersecurity strategies with their state EV infrastructure deployment plans.

The cybersecurity clauses below are a supplemental resource and starting point providing examples of cybersecurity procurement contract language in RFPs and EVSP contracts. Specific potential cybersecurity controls to consider can be found in the resources section at the end of the page.

The new cybersecurity procurement language clauses can be leveraged to:

  • Effectively communicate expectations and requirements for cybersecurity.
  • Incorporate cybersecurity into every stage of the EVSE life cycle.
  • Inform during the RFP process.
  • Serve as a starting point for the acquisition process.
  • Help select clauses that align most with established cybersecurity procurements.

Cybersecurity procurement language clauses are NOT to be used for:

  • Replacing existing and applicable cybersecurity standards.
  • Inserting verbatim into procurement contracts.

Procurement Language Structure – A Cybersecurity Program Supported by Five Technical Pillars

The clauses are organized into six sections, which together form a cybersecurity program (CP) supported by five technical pillars. The pillars demonstrate a hierarchy of concepts, provide clarity around cybersecurity relationships, and connect to high-level cybersecurity components from the National Electric Vehicle Infrastructure Standards and Requirements (23 CFR 680). The pillars leverage additional resources and cybersecurity controls, and each pillar is connotated by a specific cybersecurity ID.

The five foundational pillars that support the cybersecurity program are:

  • Identity, credential, and access management (ICAM)
  • Configuration, vulnerability, and update management (CVUM)
  • Secure payment (SP)
  • Secure communications (SC)
  • Physical security (PS).

Chart

Chart with 5 data points.
Visual representation of the cybersecurity procurement language
End of interactive chart.

Sample Cybersecurity Procurement Clauses

The section below includes specific sample clauses for each cybersecurity pillar. Learn how to read and understand the sample cybersecurity procurement language.


Cybersecurity Contract Language Considerations

The following are several important considerations for your organization as it prepares its EVSE cybersecurity contract language.

Preparing the Contract

  • Bake security in by including cybersecurity experts in designing the language for the request for bids.
  • Establish and adhere to cybersecurity evaluation criteria (rubric) to ensure all vendor bids are assessed equally.
  • Include a cybersecurity expert in the vendor review and selection process. The expert’s role is to ensure that your organization’s interests are protected to the best of the selected vendor’s ability.
  • Include cybersecurity requirements in all contracts and agreements to help protect your organization from cybersecurity risk from third parties of the system installed. This step will protect your organization not only from the main vendor, but also from their partners.
  • Encourage cyber-related reporting to be reviewed by your organization’s cybersecurity staff, not just contracts staff, to maximize value to the organization.

Over the Life of the Contract

  • Include the topic of cybersecurity in conversations with EVSPs and stress its importance.
  • Review and provide feedback on the EVSP cybersecurity program and plan annually.
  • Include cybersecurity experts in the design and installation of the system.

Managing Cyber Risk

  • A 5-year contract requires 5 years of cybersecurity and contract management.
  • Require third-party, annual evaluation of the installed system’s security.
  • Cybersecurity needs may evolve over time. Contracts may need to be updated to address new needs or requirements.
  • Focus on risk to your organization/site rather than compliance throughout the life of the contract.
  • Don’t let your selected EVSP charge you to have them do the right thing. Cybersecurity is not a luxury!

Additional Cybersecurity Resources

To start development of a cybersecurity plan, look to NIST SP 800-18 Guide for Developing Security Plans for Federal Information Systems[NIST 800-18]. Cybersecurity requirements and controls will be continually updated and deployed based on current versions of local, state, and federal guidelines and laws related to cybersecurity or privacy. Cybersecurity strategy and procurement language may evolve over time to meet growing risks and build on success as part of the cybersecurity plan’s annual review and update. To learn more about the cybersecurity clauses read the full paper.

Additional resources include: