Feds seek attestation on secure software

The US federal government has released a software attestation form intended to ensure that software producers partnering with the government leverage minimum secure development techniques and tool sets.
The form was announced March 11 by the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency, which developed the form with the Office of Management and Budget.
The form identifies minimum secure software development requirements a software producer must meet and attest to meeting.
Software requires attestation if it was developed after September 14, 2022.
Software developed prior to this date requires attestation if it was modified by major version changes after September 14, 2022.
Attestation also is required if the producer delivers constant changes to the code.
Those seeking attestation must vow that the software was developed and built in secure environments.
Environments are to have been secured by actions such as enforcement of multifactor authentication and conditional access across the environments relevant to developing and building software in a manner that minimizes security risk.
Software developed by federal agencies does not require self-attestation.
Neither does open source software freely and directly obtained by a federal agency, third-party open source and proprietary components incorporated into the software, or software that is freely obtained and publicly available.
CISA's repository for online form submission is expected to be available in late-March, providing a window to ensure relevant software providers have the necessary time to understand the form's content and requirements.
Paul Krill is an editor at large at InfoWorld, whose coverage focuses on application development.


This Cyber News was published on www.infoworld.com. Publication date: Wed, 13 Mar 2024 22:43:07 +0000


Cyber News related to Feds seek attestation on secure software

Feds seek attestation on secure software - The US federal government has released a software attestation form intended to ensure that software producers partnering with the government leverage minimum secure development techniques and tool sets. The form was announced March 11 by the ...
8 months ago Infoworld.com
The Limitations of Google Play Integrity API - This overview outlines the history and use of Google Play Integrity API and highlights some limitations. We also compare and contrast Google Play Integrity API with the comprehensive mobile security offered by Approov. Google provides app attestation ...
11 months ago Securityboulevard.com
CISA Publishes Repository for Software Attestation and Artifacts - WASHINGTON - The Cybersecurity and Infrastructure Security Agency announces today the availability of the Repository for Software Attestation and Artifacts that software producers who partner with the federal government can use to upload software ...
8 months ago Cisa.gov
In Effort to Bolster Government Cybersecurity, Biden Administration Takes Step to Ensure Secure Development Practices - Today, in an effort to ensure a safe and secure digital ecosystem for all Americans, the Biden-Harris Administration approved a secure software development attestation form, taking a major step in the implementation of its requirement that producers ...
8 months ago Cisa.gov
The Crucial Need for a Secure Software Development Lifecycle in Today's Digital Landscape - In today's increasingly digital world, software is the backbone of business operations, from customer-facing applications to internal processes. The rapid growth of software development has also made organizations more vulnerable to security threats. ...
10 months ago Cyberdefensemagazine.com
CVE-2022-35929 - cosign is a container signing and verification utility. In versions prior to 1.10.1 cosign can report a false positive if any attestation exists. `cosign verify-attestation` used with the `--type` flag will report a false positive verification when ...
2 years ago
What Is Software Piracy? - Software piracy has become a worldwide issue, with China, the United States and India being the top three offenders. In 2022, 6.2% of people worldwide visited software piracy websites. Software piracy doesn't require a hacker or skilled coder. Any ...
11 months ago Pandasecurity.com
Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy - You hear a lot about zero trust microsegmentation these days and rightly so. While a host-based enforcement approach is immensely powerful because it provides access to rich telemetry in terms of processes, packages, and CVEs running on the ...
11 months ago Feedpress.me
Feds go Fancy Bear hunting, take down Russia's GRU botnet The Register - The US government today said it disrupted a botnet that Russia's GRU military intelligence unit used for phishing expeditions, spying, credential harvesting, and data theft against American and foreign governments and other strategic targets. Moobot ...
9 months ago Go.theregister.com
FBI's latest defense of warrantless S. 702 snooping is China The Register - Analysis The FBI's latest PR salvo, as it fights to preserve its warrantless snooping powers on Americans via FISA Section 702, is more big talk of cyberattacks by the Chinese government. Wray cited an example he's used previously about how, last ...
9 months ago Go.theregister.com
CISA Issues Request For Information on Secure by Design Software Whitepaper - WASHINGTON - Today, the Cybersecurity and Infrastructure Security Agency published a Request for Information from all interested parties on secure by design software practices, including the Shifting the Balance of Cybersecurity Risk: Principles and ...
11 months ago Cisa.gov
Repository for Software Attestation and Artifacts Now Live - Software producers who partner with the federal government can now upload their Secure Software Development Attestation Forms to CISA's Repository for Software Attestation and Artifacts. Software producers that provide the government software can ...
8 months ago Cisa.gov
Understanding SBOMs - In recent years, the adoption of open-source software in development has surged, now comprising up to 90% of what's built. There is a crucial aspect to consider when integrating open-source software components. To make sure their software is safe, ...
11 months ago Securityboulevard.com
How Secure Cloud Development Replaces Virtual Desktop Infrastructures - The need to secure corporate IT environments is common to all functions of organizations, and software application development is one of them. Development environments have notoriously complex setups and often require significant maintenance because ...
8 months ago Feeds.dzone.com
DevSecOps: Definition, Benefits and Best Practices - DevSecOps is an approach that focuses on the alignment of the three core pillars of DevOps — Development, Operations, and Security. It’s a combination of processes, tools and practices designed to enable organizations to adopt innovative and ...
1 year ago Heimdalsecurity.com
EdTech Evaluation: Choosing Secure Educational Software - The evaluation of EdTech tools for their security features is crucial in safeguarding data and maintaining a secure learning environment. An edtech security evaluation is essential to determine if the software adequately protects student and teacher ...
10 months ago Securityzap.com
Consumer Software Security Assessment: Should We Follow NHTSA's Lead? - The US National Highway Traffic Safety Administration is dedicated to its mission: "To save lives, prevent injuries, and reduce economic costs due to road traffic crashes, through education, research, safety standards, and enforcement." Is it time to ...
11 months ago Darkreading.com
Beware of Expired or Compromised Code Signing Certificates - One of the vital security measures taken in this direction is the use of code signing certificates to prove software authenticity, integrity and security. Code signing certificates, used for digitally signing applications and software, are an ...
11 months ago Securityboulevard.com
Categorically Unsafe Software - We've had many people ask us why we urge software manufacturers to eliminate entire classes of defect like cross-site scripting, SQL injection, directory traversal, and memory unsafety, as called for in our Secure by Design Pledge. While it might ...
6 months ago Cisa.gov
Feds Seize 'Sinbad' Crypto Mixer Used by North Korea's Lazarus - In its continued efforts to crack down on North Korea's most formidable state-sponsored threat group, the US government has seized a virtual currency mixer that has been serving as the principal way the group launders money stolen from its ...
11 months ago Darkreading.com
FBI Director: FISA 702 warrant requirement 'de facto ban' The Register - FBI director Christopher Wray made yet another impassioned plea to US lawmakers to kill a proposed warrant requirement for so-called "US person queries" of data collected via the Feds' favorite snooping tool, FISA Section 702. This controversial ...
11 months ago Theregister.com
New "MITRE ATT&CK-like" framework outlines software supply chain attack TTPs - A new open framework seeks to outline a comprehensive and actionable way for businesses and security teams to understand attacker behaviors and techniques specifically impacting the software supply chain. The Open Software Supply Chain Attack ...
1 year ago Csoonline.com
'Secure by design' makes waves at RSA Conference 2024 - Secure by design refers to the principle that software should be developed with security in mind through established development frameworks and best practices. Though the concept is far from new, the approach has been featured in multiple different ...
6 months ago Techtarget.com
12 Software Dev Predictions for Future - Predicting the future of software development trends is always a tough call. Such trends will also rule the future of the software development industry. Analyzing these future software development trends will put enthusiasts ahead of the competition. ...
10 months ago Feeds.dzone.com
Zero Trust Security: How to Secure Critical Infrastructure - Zero trust security is a critical component of any organization's security strategy that enables organizations to protect their data and systems from malicious actors, cyber threats, and unauthorized access. With the ever-evolving cyber threats ...
1 year ago Csoonline.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)