ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

General Services Administration (GSA) is an independent agency of the United States government established in 1949 to help manage and support the basic functioning of federal agencies. Our organization includes the Public Buildings Service (PBS), Federal Acquisition Service (FAS), and a variety of Service and Staff Offices. Learn more about our organization at gsa.gov. Our Mission GSA's mission is to deliver value and savings in real estate, acquisition, technology, and other mission-support services across government. Our Vision Effective and efficient government for the American people. Our Values Service, Accountability, and Innovation ----------- You can also find us on these social media sites: Twitter: https://twitter.com/usgsa Facebook: https://www.facebook.com/GSA/ Instagram: https://www.instagram.com/usgsa/

GSA A.I CyberSecurity Scoring

GSA

Company Details

Linkedin ID:

gsa

Employees number:

13,462

Number of followers:

119,167

NAICS:

92

Industry Type:

Government Administration

Homepage:

gsa.gov

IP Addresses:

0

Company ID:

GSA_6035292

Scan Status:

In-progress

AI scoreGSA Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/gsa.jpeg
GSA Government Administration
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreGSA Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/gsa.jpeg
GSA Government Administration
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

GSA Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

GSA Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for GSA

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for GSA in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for GSA in 2025.

Incident Types GSA vs Government Administration Industry Avg (This Year)

No incidents recorded for GSA in 2025.

Incident History — GSA (X = Date, Y = Severity)

GSA cyber incidents detection timeline including parent company and subsidiaries

GSA Company Subsidiaries

SubsidiaryImage

General Services Administration (GSA) is an independent agency of the United States government established in 1949 to help manage and support the basic functioning of federal agencies. Our organization includes the Public Buildings Service (PBS), Federal Acquisition Service (FAS), and a variety of Service and Staff Offices. Learn more about our organization at gsa.gov. Our Mission GSA's mission is to deliver value and savings in real estate, acquisition, technology, and other mission-support services across government. Our Vision Effective and efficient government for the American people. Our Values Service, Accountability, and Innovation ----------- You can also find us on these social media sites: Twitter: https://twitter.com/usgsa Facebook: https://www.facebook.com/GSA/ Instagram: https://www.instagram.com/usgsa/

Loading...
similarCompanies

GSA Similar Companies

State of Michigan

Every day the contributions and achievements of State of Michigan employees have a direct impact on over 10 million Michiganders across the state. If you're looking for a fulfilling career in state government that can make a real difference in the lives of others, you can find your place working wit

State of California

Californians deserve a government that works for them and with them. One that will work to ensure opportunity and justice. We are building a California not for the few, but for all — including those who have historically been left out. We are doing the work to make our state a place for every Cali

State of Florida

Join Florida’s talented workforce to fulfill your professional goals and achieve a meaningful career. Our talented public servants work hard to serve more than 19 million residents across Florida, and you, too, can realize success in the Sunshine State. Working in Florida’s state government mean

European Commission

The Commission represents and upholds the interests of the EU as a whole, and is independent of national governments. The European Commission prepares legislation for adoption by the Council (representing the member countries) and the Parliament (representing the citizens). It administers the budge

State of Missouri

Build the Missouri of tomorrow. Ensure a strong foundation today. Join a group of innovative team members focused on driving the State of Missouri forward. As public servants, our team members have the opportunity to produce work that is both lasting and important. This work serves to protect famil

Region Midtjylland

Region Midtjyllands mål er at skabe sundhed, trivsel, vækst og velstand for regionens 1,3 millioner borgere. Vi er cirka 30.000 kolleger, der er fælles om at sikre helhed og sammenhæng for patienter, brugere og borgere i regionen. Det gælder lige fra at tilbyde den bedste behandling her og nu til

Commonwealth of Massachusetts

Year after year, the Commonwealth of Massachusetts has continued to pioneer bold legislative actions and programs, some of which have been embraced on a national scale. We are always looking for talented individuals to help us maintain this momentum and improve the services that millions of people d

Comunidad de Madrid

Si necesitas información general y especializada sobre los servicios públicos madrileños puedes llamar al teléfono de Atención al Ciudadano 012. En la Comunidad de Madrid estamos encantados de recibir comentarios y favorecer el diálogo, por eso te proponemos unas normas básicas de participación:

The United States Department of Agriculture is the United States federal executive department responsible for developing and executing U.S. federal government policy on farming, agriculture, and food. It aims to meet the needs of farmers and ranchers, promote agricultural trade and production, work

newsone

GSA CyberSecurity News

October 16, 2025 07:00 AM
VirnetX Awarded Coveted GSA Schedule Contract

VirnetX Holding Corporation (Nasdaq: VHC), a global leader in secure communications and zero-trust cybersecurity solutions, today announced...

October 16, 2025 07:00 AM
VirnetX awarded GSA contract for government cybersecurity solutions

"Being awarded a GSA Schedule contract is a major step forward for VirnetX," said Kendall Larsen, CEO and President of VirnetX, in the press...

October 09, 2025 07:00 AM
Palindrome Technologies Awarded GSA Multiple Award Schedule (MAS) Contract for Highly Adaptive Cybersecurity Services (HACS)

PRNewswire/ -- Palindrome Technologies, a distinguished Cyber Security Research and Testing Lab, today announced it has been awarded a...

September 23, 2025 07:00 AM
Quzara LLC Awarded GSA Highly Adaptive Cybersecurity Services (HACS) SIN for Incident Handling & Emergency Management (IHEM)

This award formally recognizes Quzara's expertise in advanced incident response, emergency management, and cyber hunt operations, ensuring...

September 09, 2025 07:00 AM
A New Era in Federal Procurement Has Launched

Federal procurement is getting a major makeover. Big changes have occurred, and more are on the horizon. Companies that sell into the...

August 26, 2025 07:00 AM
Global GSA group secures ISO 27001 to strengthen air cargo cybersecurity

Certification assures partners of stronger data protection, compliance and resilience across air cargo operations.

August 19, 2025 07:00 AM
Ingalls Information Security Awarded General Services Administration (GSA) Highly Adaptive Cybersecurity Services (HACS) Contract to Enhance Cyber Resilience

The GSA HACS contract award positions Ingalls to deliver advanced cybersecurity solutions and support to state, local, and federal agencies...

August 05, 2025 07:00 AM
GAO calls out agency trio for IT recommendation failures

Updated The Government Accountability Office (GAO) scolded a trio of federal agencies on Monday because their CIOs haven't implemented...

July 28, 2025 07:00 AM
Recent Cybersecurity FCA Settlement Demonstrates Heightened FCA Risk to Government Contractors

On July 14, 2025, the U.S. Department of Justice (DoJ) and General Services Administration (GSA) announced a $14.75 million settlement of...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

GSA CyberSecurity History Information

Official Website of GSA

The official website of GSA is http://www.gsa.gov.

GSA’s AI-Generated Cybersecurity Score

According to Rankiteo, GSA’s AI-generated cybersecurity score is 782, reflecting their Fair security posture.

How many security badges does GSA’ have ?

According to Rankiteo, GSA currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does GSA have SOC 2 Type 1 certification ?

According to Rankiteo, GSA is not certified under SOC 2 Type 1.

Does GSA have SOC 2 Type 2 certification ?

According to Rankiteo, GSA does not hold a SOC 2 Type 2 certification.

Does GSA comply with GDPR ?

According to Rankiteo, GSA is not listed as GDPR compliant.

Does GSA have PCI DSS certification ?

According to Rankiteo, GSA does not currently maintain PCI DSS compliance.

Does GSA comply with HIPAA ?

According to Rankiteo, GSA is not compliant with HIPAA regulations.

Does GSA have ISO 27001 certification ?

According to Rankiteo,GSA is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of GSA

GSA operates primarily in the Government Administration industry.

Number of Employees at GSA

GSA employs approximately 13,462 people worldwide.

Subsidiaries Owned by GSA

GSA presently has no subsidiaries across any sectors.

GSA’s LinkedIn Followers

GSA’s official LinkedIn profile has approximately 119,167 followers.

NAICS Classification of GSA

GSA is classified under the NAICS code 92, which corresponds to Public Administration.

GSA’s Presence on Crunchbase

No, GSA does not have a profile on Crunchbase.

GSA’s Presence on LinkedIn

Yes, GSA maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/gsa.

Cybersecurity Incidents Involving GSA

As of November 27, 2025, Rankiteo reports that GSA has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

GSA has an estimated 11,115 peer or competitor companies worldwide.

GSA CyberSecurity History Information

How many cyber incidents has GSA faced ?

Total Incidents: According to Rankiteo, GSA has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at GSA ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=gsa' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge