The following FAQs provide additional information on the guidance.
For more detailed information on conformity assessment, see NIST SP 2000-01, ABC's of Conformity Assessment; NIST SP 2000-02, Conformity Assessment Considerations for Federal Agencies; and ISO/IEC 17000:2020 – Conformity assessment – vocabulary and general principles. NIST SP 2000-01 and SP 2000-02 reference ISO/IEC 17000 and cite several of its definitions, including “conformity assessment.”
Additional information is available from NIST SP 2000-01, ABC's of Conformity Assessment and ISO/IEC 17050-1:2004, Conformity assessment – Supplier’s declaration of conformity – Part 1: General requirements.
Yes, see NIST’s C-SCRM project website for links to all the resources. An example is the Federal C-SCRM Forum, which NIST hosts; the Forum fosters collaboration and the exchange of C-SCRM information among federal agencies to improve the security of federal supply chains. Examples of NIST C-SCRM guidance include SP 800-161, Supply Chain Risk Management Practices for Federal Information Systems and Organizations and SP 800-161 Rev. 1 (Second Draft), Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations.
Yes. Section 4n references section 4k, which was discussed in the introduction to this guidance. Here is the text of Section 4n:
(Section 4n) Within 1 year of the date of this order, the Secretary of Homeland Security, in consultation with the Secretary of Defense, the Attorney General, the Director of OMB, and the Administrator of the Office of Electronic Government within OMB, shall recommend to the FAR Council contract language requiring suppliers of software available for purchase by agencies to comply with, and attest to complying with, any requirements issued pursuant to subsections (g) through (k) of this section.
Yes, agencies can choose to implement the recommendations with agency-based software developers in order to help assess the security risks associated with their software and make risk-based decisions about its implementation and use.
Yes, agencies can choose to use attestations and artifacts from open-source software producers who make such content available. This may help agencies to assess the security risks associated with the software and make risk-based decisions about its implementation and use.
The following table maps each Section 4e subsection to the SSDF practices and tasks that help address each subsection. See SP 800-218 for more information on each SSDF practice and task.
SSDF Practices Corresponding to EO 14028 Subsections
EO 14028 Subsection |
Subsection Summary |
SSDF Practice and Task |
4e(i) |
Have secure software development environments, including: |
[See rows below] |
administratively separate build environments; |
PO.5.1 |
|
trust relationship auditing; |
PO.5.1 |
|
multi-factor, risk-based authentication and conditional access; |
PO.5.1, PO.5.2 |
|
minimized dependencies on enterprise products in development environments; |
PO.5.1 |
|
data encryption; and |
PO.5.2 |
|
operational monitoring and incident detection and response. |
PO.3.2, PO.3.3, PO.5.1, PO.5.2 |
|
Provide artifacts from 4e(i) upon request. |
PO.3.2, PO.3.3, PO.5.1, PO.5.2 |
|
Maintain trusted source code supply chains. |
PO.3.1, PO.3.2, PO.5.1, PO.5.2, PS.1.1, PS.2.1, PS.3.1, PW.4.1, PW.4.4 |
|
Check software for vulnerabilities and remediate them. |
PO.4.1, PO.4.2, PS.1.1, PW.2.1, PW.4.4, PW.5.1, PW.6.1, PW.6.2, PW.7.1, PW.7.2, PW.8.2, PW.9.1, PW.9.2, RV.1.1, RV.1.2, RV.2.1, RV.2.2, RV.3.3 |
|
Provide artifacts from 4e(iii) and 4e(iv) upon request, and make a summary description of risks assessed and mitigated publicly available. |
PO.3.2, PO.3.3, PO.4.1, PO.4.2, PO.5.1, PO.5.2, PW.1.2, PW.2.1, PW.7.2, PW.8.2, RV.2.2 |
|
Maintain provenance data for internal and 3rd party components. |
PO.1.3, PO.3.2, PO.5.1, PO.5.2, PS.3.1, PS.3.2, PW.4.1, PW.4.4, RV.1.1, RV.1.2 |
|
Provide a software bill of materials (SBOM) for each product. |
PS.3.2 |
|
Participate in a vulnerability disclosure program. |
RV.1.1, RV.1.2, RV.1.3, RV.2.1, RV.2.2, RV.3.3 |
|
Attest to conformity with secure software development practices. |
All practices and tasks consistent with a risk-based approach |
|
Attest to the integrity and provenance of open-source software components. |
PS.2.1, PS.3.1, PS.3.2, PW.4.1, PW.4.4 |
Software purchasers from a federal agency should ask software producers to provide a conformance statement attesting that their software development processes follow SSDF practices, including those specifically called out in Section 4e as presented in FAQ #7. The conformance statement should include:
You should provide a conformance statement, which is described in FAQ #8.
Additionally, you can choose to exceed the EO 14028 Section 4e requirements by providing a reference or URL to a summary of secure software development activities related to the SSDF practices and tasks, including risk-based and mitigation actions. A sample template is posted here for reuse in documenting the activities.
You should ensure that you can provide a reference to the software producer’s conformance statement, as described in FAQ #8, for each software you resell to software purchasers.