Assessing the Response (or Lack Thereof) to the Secure Software Attestation Form
July 30, 2024

Nick Mistry
Lineaje

In May 2021, the Biden Administration issued Executive Order (EO) 14028, Improving the Nation's Cybersecurity. The legislation urged any organization working with federal agencies to modernize and prioritize security protocols to safeguard the sensitive data created and stored by the government.

A key theme within the EO was the importance of secure software, and rightfully so. Despite the Biden Administration calling attention to this issue, software supply chain attacks in the US impacted over 2,700 organizations in 2023 — growing over 50% year-over-year.

To better facilitate the secure development of software built and bought by federal agencies, the Cybersecurity and Infrastructure Security Agency (CISA) and Office of Management and Budget (OMB) created the Secure Software Development Attestation form. Software producers working with federal agencies had until June 11, 2024 for critical software and until September 11, 2024 for all software to submit the form, signed by the software producer's CEO.

The Secure Software Attestation Form Requirements

The Secure Software Attestation Form requires software producers to use industry standards derived from the National Institute of Standards and Technology (NIST) secure software development framework (SSDF). The form calls for software producers to:

■ Protect and segregate network environments involved in building software.

■ Monitor those who have authorization to access the code.

■ Enforce basic security hygiene practices, including multi-factor authentication (MFA).

■ Maintain trusted source code supply chains by managing risks of the supply chain.

Be able to determine the lineage of the software for any internal code, open-source and third-party software components.

■ Utilize automated tools or similar processes to scan for security vulnerabilities, ensuring that software is up-to-date on current releases.

■ Notify any federal agencies if software violates the terms of the Secure Software Development Attestation form.

Are Organizations Ready to Comply?

While the time to fill out the Secure Software Attestation Form has come and gone for critical software and around the corner for all software, a recent survey from Lineaje, conducted a month before the June deadline, revealed significant gaps in software producers' preparedness and awareness.

The survey, which polled over 100 security professionals attending RSA Conference 2024, found that less than one in five companies impacted by the form were prepared to meet the imminent deadline.

Failure to comply with the form requirements has the potential to cause severe consequences for software producers and federal agencies alike, including potential legal and financial penalties for software producers, increased vulnerability to cyberattacks, and damage to both the software producers and federal agencies' reputations.

Despite the looming threats, an overwhelming majority of respondents (84%) had not yet implemented Software Bills of Materials (SBOMs) into development processes — which EO 14028 made mandatory back in May of 2021. Even more concerning, over half (65%) had never even heard of EO 14028. Even those who were familiar with it, half were unaware of its specific requirements.

Organizations Are Missing the Tools and Resources to Secure Software Supply Chain

In addition to the lack of knowledge of the latest compliance regulations, many security professionals simply do not have the tools to identify and mitigate security concerns in the software supply chain.

Open-source software components make up anywhere from 80%-90% of all software built today. While convenient, 82% of open-source software components are inherently risky. Over half of respondents in the survey said their companies utilized open source software components, but only 16% say the average open source is secure.

Many security professionals (56%) claimed to have the tools to identify and mitigate security concerns in open source software, but nearly a quarter were unsure, and one in five had no tools. In addition, 45% of security professionals are struggling with budget limitations and staffing resources (33%) to adopt proper software supply security measures.

Moving Forward

Businesses can't operate without open source software. However, organizations also can't survive long-term if that software is compromised with security vulnerabilities. To stay secure, software vendors and cybersecurity professionals must educate themselves and examine where they fall short on compliance deadlines. Doing so will protect their organizations, and also contribute to enhancing national security. 

In addition, organizations need to prioritize the creation and upkeep of SBOMs. With an SBOM, organizations are able to assess software components' risks and address any vulnerabilities before an adversary can exploit it.

Software producers and consumers must also have real-time visibility into the quality of software components. It can often be the difference between a well-maintained and secure software supply chain, or one that is easily manipulated by threat actors.

Over the next few years, I suspect that compliance measures like EO 14028 will continue to emerge. If the response, or lack thereof, to the Secure Software Development Attestation form is a preview of what we can expect with future legislation, we'll likely see software supply chain attacks continue to plague public and private sector organizations alike. However, if developers and security professionals partner together to create and maintain secure code, prioritize real-time visibility, and commit to investing in technologies that enable them to adequately protect their software supply chain, we may be able to fulfill the vision of improving the nation's cybersecurity after all.

Nick Mistry is SVP and CISO at Lineaje
Share this

Industry News

November 20, 2024

Spectro Cloud completed a $75 million Series C funding round led by Growth Equity at Goldman Sachs Alternatives with participation from existing Spectro Cloud investors.

November 20, 2024

The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, has announced significant momentum around cloud native training and certifications with the addition of three new project-centric certifications and a series of new Platform Engineering-specific certifications:

November 20, 2024

Red Hat announced the latest version of Red Hat OpenShift AI, its artificial intelligence (AI) and machine learning (ML) platform built on Red Hat OpenShift that enables enterprises to create and deliver AI-enabled applications at scale across the hybrid cloud.

November 20, 2024

Salesforce announced agentic lifecycle management tools to automate Agentforce testing, prototype agents in secure Sandbox environments, and transparently manage usage at scale.

November 19, 2024

OpenText™ unveiled Cloud Editions (CE) 24.4, presenting a suite of transformative advancements in Business Cloud, AI, and Technology to empower the future of AI-driven knowledge work.

November 19, 2024

Red Hat announced new capabilities and enhancements for Red Hat Developer Hub, Red Hat’s enterprise-grade developer portal based on the Backstage project.

November 19, 2024

Pegasystems announced the availability of new AI-driven legacy discovery capabilities in Pega GenAI Blueprint™ to accelerate the daunting task of modernizing legacy systems that hold organizations back.

November 19, 2024

Tricentis launched enhanced cloud capabilities for its flagship solution, Tricentis Tosca, bringing enterprise-ready end-to-end test automation to the cloud.

November 19, 2024

Rafay Systems announced new platform advancements that help enterprises and GPU cloud providers deliver developer-friendly consumption workflows for GPU infrastructure.

November 19, 2024

Apiiro introduced Code-to-Runtime, a new capability using Apiiro’s deep code analysis (DCA) technology to map software architecture and trace all types of software components including APIs, open source software (OSS), and containers to code owners while enriching it with business impact.

November 19, 2024

Zesty announced the launch of Kompass, its automated Kubernetes optimization platform.

November 18, 2024

MacStadium announced the launch of Orka Engine, the latest addition to its Orka product line.

November 18, 2024

Elastic announced its AI ecosystem to help enterprise developers accelerate building and deploying their Retrieval Augmented Generation (RAG) applications.

Read the full news on APMdigest

November 18, 2024

Red Hat introduced new capabilities and enhancements for Red Hat OpenShift, a hybrid cloud application platform powered by Kubernetes, as well as the technology preview of Red Hat OpenShift Lightspeed.

November 18, 2024

Traefik Labs announced API Sandbox as a Service to streamline and accelerate mock API development, and Traefik Proxy v3.2.