Revenera logo
Image: CISA’s Secure Software Development Attestation Form

What You Need To Know

Cybersecurity threats are increasingly sophisticated and pervasive, forcing the federal agencies to be extra paranoid about the security of. To address this critical need, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Office of Management and Budget (OMB), has introduced the Secure Software Development Attestation form. This form serves as a key instrument for software producers who partner with the federal government, helping to verify that they adhere to secure software development practices.

What is the Secure Software Development Attestation Form?

The Secure Software Development Attestation form is designed to ensure that software producers implement minimum secure development techniques and toolsets. By attesting to these practices, software producers provide transparency and assurance regarding the security of their software products. This aligns with the broader goal of reducing cyber risks and protecting federal systems from malicious cyber actors.

Secure Software Development Attestation Form: Key Requirements

  1. Secure Software Development Lifecycle (SDLC): Software producers must demonstrate that they follow a secure software development lifecycle. This includes practices such as threat modeling, code review, static and dynamic analysis, and vulnerability assessments. The goal is to identify and mitigate security risks throughout the software development process.
  2. Use of Automated Tools: The form emphasizes the importance of using automated tools to enhance the security of the software development process. This includes tools for static and dynamic analysis, software composition analysis (SCA), and continuous integration/continuous deployment (CI/CD) pipelines. Automated tools help identify and address security vulnerabilities early in the development lifecycle.
  3. Supply Chain Security: Software producers must attest to the implementation of supply chain security measures. This includes verifying the integrity of third-party components, managing dependencies, and ensuring the security of the software supply chain. By doing so, producers help prevent the introduction of vulnerabilities through third-party software.
  4. Compliance with Standards and Guidelines: The attestation form requires software producers to comply with relevant industry standards and guidelines. This includes adherence to secure coding practices, encryption standards, and other best practices for software security. Compliance with these standards ensures that the software meets the highest security benchmarks.
  5. Regular Security Training: To maintain a robust security posture, software producers must provide regular security training for their development teams. This training should cover secure coding practices, threat awareness, and the use of security tools. By equipping developers with the knowledge and skills to identify and mitigate security risks, producers can enhance the overall security of their software.

The completed software attestation form, along with any supporting artifacts, can be submitted online through the Repository for Software Attestations and Artifacts or via email. The repository provides a centralized platform for managing and verifying secure software development attestations, promoting transparency and accountability.

This process introduced in 2024 continues to evolve. There was some serious talk about how to make this form machine readable to remove ambiguity and human intervention. While the form outlines the key requirements for secure software development, some of the criteria could benefit from additional clarity and specificity. For instance, the guidelines for supply chain security could include more detailed instructions on verifying third-party components and managing dependencies. We are hoping that this will be part of the next version of the form.

One of the key elements of the Secure Software Development Attestation form is the requirement for a CEO or an equivalent executive to serve as the signatory. This mandate underscores the importance of accountability at the highest levels of an organization. By requiring an executive-level attestation, the form ensures that the responsibility for secure software development practices is not just delegated to technical teams but is recognized and endorsed at the top of the organizational hierarchy. This level of commitment emphasizes the critical importance of cybersecurity and fosters a culture of security awareness throughout the entire organization. It reinforces the idea that secure software development is a strategic priority and requires executive oversight and support to be effectively implemented and maintained.