Back to Top

Defense Acquisitions Made Easy

Proposal Development / Requirements / Earned Value Management

Task Index
Proposal Development  Requirements Development Earned Value Management (EVM)
Overview: Proposal Development Overview: Requirements Overview: EVM
Contract Data Requirements List (CDRL) Capability Development Document (CDD) Actual Cost of Work Performed (ACWP)
Contract Funds Status Report (CFSR) Capability Development Tracking and Management Tool (CDTM) ANSI EIA 748 Earned Value Management
DD Form 254 Capability Production Document (CPD) Budget at Completion (BAC)
DoD Source Selection Procedures Cost Capability Analysis (CCA) Budgeted Cost of Work Performed (BCWP)
Evaluation Criteria Derived Requirements Budgeted Cost of Work Scheduled (BCWS)
EVM Solicitation Requirements Design Synthesis Contractor EVMS Validation Plan
Forward Pricing Rate Proposal (FPRP) Feasibility Assessment Contractor Performance Report (CPR)
Industry Day Functional Analysis and Allocation Control Account
Information Assurance Content in an Request for Proposal Functional Area Analysis (FAA) Cost and Software Data Reporting
Lowest Price Technically Acceptable (LPTA) Functional Needs Analysis (FNA) Cost Variances
Model Contract Functional Solutions Analysis (FSA) DCMA EVMS Compliance Reviews
Performance Work Statement (PWS) Good Requirement Practices Deficiencies in Validated EVMS
Pre-Award Survey Initial Capabilities Document (ICD) DoD Earned Value Management Guide
Proposal Adequacy Checklist (PAC) Joint Capability Area Attributes DoD EVMS Roles and Responsibility
Proposal Compliance Matrix Joint Service Specification Guides (JSSG) Earn Value Management in Software
Proposal Content Key Performance Parameter (KPP) Earn Value Management Surveillance
Proposal Development Process Key System Attributes (KSA) Earned Value Management Central Repository (EVM-CR)
Prospective Contractor Responsibility M&S Requirements Development Estimate at Completion (EAC)
Request for Information (RFI) Measures of Effectiveness (MOE) EVMS Advance Agreement Letter of Acceptance
Request for Proposal (RFP) Mission Requirements Board (MRB) EVMS Business Case Analysis Elements
Request for Quotation (RFQ) Requirement Types EVMS Compliance and Validation
Request for Technical Proposal (RTP) Requirements Allocation EVMS Documentation
Section A – Contract Form Requirements Checklist EVMS Equations
Section B – Supplies and Services and Prices Costs Requirements Development Steps EVMS Implementation Options
Section C – Description Specification SOW Requirements Document Sequence EVMS Integration
Section D – Packaging and Marking Requirements Evaluation EVMS Requirements
Section E – Inspection and Acceptance Requirements Management Government EVMS Validation Review
Section F – Deliveries of Performance Requirements Tracing Integrated Baseline Review (IBR)
Section G – Contract Administration Data Standardization Integrated Program Management Report (IPMR)
Section H – Contract Requirements Step 1: Gather & Develop Requirements Performance Measurement Baseline
Section I – Contract Clauses Step 2: Write & Document Requirements Schedule Variances
Section J – List of Attachments Step 3: Check Completeness Summary Level Planning Package (SLPP)
Section K – Representations & Certifications Step 4: Analyze, Refine & Decompose Requirements To Complete Performance Index (TCPI)
Section L – Instructions Step 5: Verify & Validate Requirements Total Allocated Budget (TAB)
Section M – Evaluation Factors for Award Step 6: Manage Requirements Work Packages
Software Proposal Evaluation System Requirements Document (SRD) 5 Steps in the Research Process
Software RFP Content Technical Requirements Document (TRD)
Software Source Selection Considerations Weapon System Specifications (WSS)
Sole Soure – Justification and Approval
Source Selection Plan (SSP)
Sources Sought
Statement of Objectives (SOO)
Statement of Work (SOW)
Statement of Work Checklist
Technical Data Package
Unsolicited Proposal

 

Cost Estimating / Risk & Safety Management / Schedule Development

Task Index
 Cost Estimating  Risk & Safety Management Schedule Development
 Overview: Cost Estimating Overview: Risk & Safety Management Overview: Schedule Development
Actual Cost Estimating Contractor Risk Activities ‘What if’ scenario analysis
Affordability Element 1: Document the System Safety Process Activity Definition
Analogy Cost Estimating Element 2: Identify and Document Hazards Activity Duration Estimating
Average Procurement Unit Cost (APUC) Element 3: Assess and Document Risk Activity Sequencing
Component Cost Estimate Element 4: Identify and Document Risk Mitigation Measures Critical Chain Method
Cost Analysis Requirements Description (CARD) Element 5: Reduce Risk Critical Path Critical Path Method
Cost Analysis Reviews Element 6: Verify Validate and Document Risk Reduction Critical Path Length Index (CPLI)
Cost Estimates for Milestone A Reviews Element 7: Accept Risk and Document Gantt Chart
Cost Estimating Methods Element 8: Manage Life Cycle Risk Integrated Master Schedule (IMS)
Data Normalization Enterprise Risk Management Line of Balance (LOB)
DoD Component Cost Estimate Failure Modes & Effects Analysis (FMEA) Milestone Chart
DoD Office Cost Estimate Fault Tree Analysis Network Diagram
Engineering Cost Estimating Hazard Tracking System (HTS) PERT Analysis
GAO Cost Estimating Process ISO 31000: Risk Management Standard Precedence Diagram Method (PDM)
Independent Cost Estimate (ICE) Joint Services Weapon Safety Review Process Resource Leveling
Life-Cycle Cost Estimate (LCCE) Joint Services Weapon Safety Review Process Schedule Compression
Manpower Estimates Programmatic Environmental & Safety and Occupational Health Evaluation Schedule Control
OSD Office of Cost Assessment Risk Analysis Schedule Development
Parametric Cost Estimating Risk Checklists Schedule Network Analysis
Program Office Estimate (POE) Risk Confidence & Probability Schedule Preparation
Step 1: Define Cost Estimates Purpose and Scope Risk Definition Schedule Risk
Step 2: Develop Estimating Plan Risk Handling Scheduling Guide for Program Managers
Step 3: Define Program Characteristics Risk Identification To Complete Performance Index
Risk Identification Procedures
Step 5: Identify Ground Rules and Assumptions Risk Integrated Product Team
Step 6 Obtain Data Risk Management Board (RMB)
Step 7 Develop Point Estimate and Compare it to an Independent Cost Estimate Risk Management Objectives
Step 8 Conduct Sensitivity Analysis Risk Management Plan (RMP)
Step 9 Conduct Risk and Uncertainly Analysis Risk Management Process Model
Step 10 Document the Estimate Risk Mitigation Plan (RMP)
Step 11 Present Estimate to Management for Approval Risk Mitigation Plan Implementation
Step 12 Update the Estimate to Reflect Actual Costs and Changes Risk Mitigation Planning
Risk Prioritization
Risk Register
Risk Reporting Matrix
Risk Tracking
Risk Training
Software Risk Estimation
Standard Software Risks
System Safety Overview
System Safety Precedence
System Safety Process
Typical Risk Sources

Security & Intel / Business & Marketing / Technology Development

Tasks Index
Security & Intel  Business & Marketing Technology Development
Overview: Intelligence & Security Overview: Business & Marketing Overview: Technology Development
Anti-Tamper (AT) 5 Steps in the Marketing Research Process Advanced Technology Demonstration
Communication Security (COMSEC) Better Buying Power Initiative Advanced Technology Development
Counterintelligence Business Process Engineering (BPR) Applied Basic Research
Critical Program Information (CPI) CAGE Codes Cooperative Research and Development Agreement
Cybersecurity Strategy Defense Business Board (DBB) Critical Technology Element
DD Form 254 Defense Finance and Accounting Service (DFAS) Defense Advanced Research Project Agency (DARPA)
Delegation of Disclosure Authority Letter Electronic Document Access (EDA) Defense Science Board (DSB)
DoD Public Key Infrastructure Electronic Subcontracting Reporting Independent Research & Development (IR&D)
Electronic Warfare (EW) FedBizOpps Joint Capability Technology Demonstration (JCTD)
Horizontal Analysis and Protection Federal Procurement Data System (FPDS) Patent
Information Security (InfoSec) Free-rein Leadership Style Research and Development Cost
Initial Threat Environment Assessment General Services Administration (GSA) Small Business Innovation Research Program (SBIR)
Life-Cycle Mission Data Plan (LMDP) Government-Industry Data Exchange Program Small Business Technology Transfer Program
National Industry Security Program Operating Manual (NISPOM) Guide to Marketing to the DoD Technology Assessment & Control Plan
Operations Security Professional Services Council (PSC) Technology Broad Agency Announcement
Program Protection Plan (PPP) Prospective Contractor Responsibility Technology Development Strategy
Program Security Instruction System for Award Management (SAM) Technology Readiness Assessment (TRA)
Security Classification Guide (SCG) Wage Determinations Online Program (WDOL) Technology Readiness Levels (TRL)
Sensitive Compartmented Information (SCI) Wide Area Workflow Technology Release Roadmap (TRR)
Single Scope Background Investigation (SSBI) Worker Adjustment and Retraining Notification Act (WARN) Technology Roadmap
Special Access Program Technology Transition Initiative
System Security Authorization Agreement 5 Steps in the Research Process
System Security Engineering
System Threat Assessment (STA)
System Threat Assessment Report (STAR)
Technology Assessment & Control Plan
Technology Release Roadmap
Threat-Assessment-Center-Report
Types of Security Clearances
Validated Online Lifecycle Threat (VOLT)