Requires all government agencies to request self-attestations about the security posture of the software they consume. These self-attestation forms should be provided by the agency, but it’s time for those software organizations selling to the government to start preparing their internal teams to respond to these requests.
SSDF Practices Corresponding to EO 14028 Subsections
| EO 14028 Subsection | Subsection Summary (Refer to the next column for a complete list) | SSDF Practice and Task Reference Numbers |
| 4e(i) | Have secure software development environments, including: | [See rows below] |
| 4e(i)(A) |
|
PO.5.1 |
| 4e(i)(B) |
|
PO.5.1 |
| 4e(i)(C) |
|
PO.5.1, PO.5.2 |
| 4e(i)(D) |
|
PO.5.1 |
| 4e(i)(E) |
|
PO.5.2 |
| 4e(i)(F) |
|
PO.3.2, PO.3.3, PO.5.1, PO.5.2 |
| 4e(ii) | Provide artifacts from 4e(i) upon request. | PO.3.2, PO.3.3, PO.5.1, PO.5.2 |
| 4e(iii) | Maintain trusted source code supply chains. | PO.3.1, PO.3.2, PO.5.1, PO.5.2, PS.1.1, PS.2.1, PS.3.1, PW.4.1, PW.4.4 |
| 4e(iv) | Check software for vulnerabilities and remediate them. | PO.4.1, PO.4.2, PS.1.1, PW.2.1, PW.4.4, PW.5.1, PW.6.1, PW.6.2, PW.7.1, PW.7.2, PW.8.2, PW.9.1, PW.9.2, RV.1.1, RV.1.2, RV.2.1, RV.2.2, RV.3.3 |
| 4e(v) | Provide artifacts from 4e(iii) and 4e(iv) upon request, and make a summary description of risks assessed and mitigated publicly available. | PO.3.2, PO.3.3, PO.4.1, PO.4.2, PO.5.1, PO.5.2, PW.1.2, PW.2.1, PW.7.2, PW.8.2, RV.2.2 |
| 4e(vi) | Maintain provenance data for internal and 3rd party components. | PO.3.2, PO.3.3, PO.4.1, PO.4.2, PO.5.1, PO.5.2, PW.1.2, PW.2.1 PW.7.2, PW.8.2, RV.2.2 |
| 4e(vii) | Provide a software bill of materials (SBOM) for each product. | PS.3.2 |
| 4e(viii) | Participate in a vulnerability disclosure program. | RV.1.1, RV.1.2, RV.1.3, RV.2.1, RV.2.2, RV.3.3 |
| 4e(ix) | Attest to conformity with secure software development practices. | All practices and tasks consistent with a risk-based approach |
| 4e(x) | Attest to the integrity and provenance of open-source software components. | PS.2.1, PS.3.1, PS.3.2, PW.4.1, PW.4.4 |
Contrast Security offers public sector and government agencies working with limited security resources full transparency of their application risk layer while also protecting against targeted attacks and zero-day events. By embedding security sensors within the code itself, the Contrast Security platform shifts security left in application development, empowering DevOps to secure as they code and to dramatically reduce application security incidents.
Contrast Security is committed to protecting American cyberspace. See how the Contrast Secure Code Platform can help your business defend against entire classes of application attacks and build SBOMs in minutes. Visit www.contrastsecurity.com/federal to learn more.
Sources:
Schedule a demo and see how to eliminate your application-layer blind spots.
Book a demo