Subscription-only
The core offer is a 36-month SaaS subscription with enterprise support, release notes, and standard documentation.
pw.app.iatrt.com
This site now carries the current primary-fit scope for the Power and Water Corporation cybersecurity risk platform procurement. It frames the opportunity as a fast-provisioned cloud SaaS platform with strong first-party monitoring, third-party risk workflows, governance reporting, and self-service administration.
Procurement Intent
The tender language points to a subscription-first, rapidly provisioned tenant that PWC can operate directly rather than a bespoke build, private deployment, or managed service.
The core offer is a 36-month SaaS subscription with enterprise support, release notes, and standard documentation.
Tenant access and administrator provisioning need to land within five business days of purchase order.
First-party monitoring, TPRM, governance reporting, and admin controls need to work as one platform boundary.
PWC is expected to configure, integrate, operate, and report from the platform with limited supplier dependency.
Mandatory Fit
The requirement set clusters into capability coverage, governance artifacts, identity controls, and non-functional assurances.
Preferred Shape
The strongest fit is a single platform boundary with one tenant, one administrative plane, one reporting model, and one support motion.
First-party external attack surface
Domain and subsidiary onboarding, asset discovery, exposure monitoring, risk scoring, and remediation workflow.
Third-party risk management
Vendor intake, questionnaires, evidence exchange, findings, reassessment, and outside-in supplier monitoring.
Governance and evidence generation
Monthly operational reporting, quarterly executive packs, annual CIRMP-aligned evidence generation, and full audit traceability.
Identity, integration, and administration
SSO, RBAC, admin provisioning, APIs, webhooks, lifecycle automation, branding, notifications, and retention controls.
Reference Architecture
The architecture needs to be Australian-hosted by default, auditable, exportable, and explicit about subcontractors, privacy boundaries, and incident management obligations.
Implementation Sequence
The current v1 sequence is structured to get from tenant creation to operational cadence with minimal dependency on bespoke services.