RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
AppSec & Supply Chain SecurityJune 12, 2023

Self-attestation on software security: What development teams need to know

Software vendors that do business with the government must prove they are practicing basic supply chain security. Here's a rundown on the requirements.

paul roberts headshot black and white
Paul Roberts, Director of Content and Editorial at RLPaul Roberts
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
Self-attestation on software security: What development teams need to know

Software companies supplying the U.S. federal government must begin attesting to the security of critical software by June 11 — and more deadlines for attesting to the security of a wider range of software are approaching in the months ahead.

But what does it mean to self-attest? And what other government requirements are in store for software providers in the months and years ahead?

Here's a briefing on self-attestation to help you understand these new requirements that focus on the software supply chain.

See also: A timeline of federal guidance on software supply chain securityKey takeaways: Supply chain security risks addressed in new Gartner report

What is self-attestation all about?

As of June 11, 2023, software producers that sell critical software to U.S. federal agencies are required to provide those agencies with “attestation letters.” That’s according to the language of a memorandum by the Office of Management and Budget (OMB), M-22-18 (PDF), released in September 2022, that set specific deadlines for producers to attest to the cybersecurity of both critical and noncritical software sold or licensed to the federal government.

Critical software is defined in another OMB memo, M-21-30, as referring to so-called EO-Critical Software as defined by NIST, the National Institute of Standards and Technology, which refers to “any software that has, or has direct software dependencies upon, one or more components with at least one of these attributes:

  • Is designed to run with elevated privilege or manage privileges;
  • Has direct or privileged access to networking or computing resources;
  • Is designed to control access to data or operational technology;
  • Performs a function critical to trust; or,
  • Operates outside of normal trust boundaries with privileged access."

As of September 13, 2023 — a year following publication of M-22-18 — federal agencies are instructed to collect attestation letters “for all software subject to the requirements of this memorandum,” critical or not.

As our team reported at the time, the OMB memo applies to all third-party software, including software renewals and major version changes, and to all new software purchases made after the issuance of the memorandum and to any software that receives a major version upgrade subsequent to the release of the memorandum.

What software is covered?

According to M-22-18, software sold or licensed to the federal government requires self-attestation by the software maker if it was developed after September 14, 2022, or modified by major version change after September 14, 2022 (e.g., from Version 2.5 to Version 3.0) or if it is software to which the producer delivers continuous changes to the software code (such as software-as-a-service products or other products using continuous delivery/continuous deployment).

Software products and components that do not require self-attestation under M-22-18 include software developed by federal agencies and software that is freely obtained (e.g., freeware and open-source software) directly by a federal agency.

What is self-attestation for software?

Self-attestation is what it sounds like: Software makers are attesting to the cybersecurity of the software they are selling or licensing to the federal government, without needing an independent, third-party assessment of the software’s security. The federal government is taking them at their word, so to speak. This is distinct from other government mandates. For example, frameworks such as the Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) initially required third-party attestation of software security sold or licensed to the DOD.

By allowing software companies to self-attest to the security of their code — and prove the existence of supply chain risk management controls — the White House is erring on the side of efficiency and clearing the way for software suppliers to the federal government to document security controls and make security assurances.

It also removes the strong likelihood that bottlenecks would result if tens of thousands of software makers had been forced to turn to a limited number of third parties to obtain certifications. However, under the memorandum, third-party assessments via a “Third Party Assessor Organization (3PAO)” are also allowed, especially for open-source software that might be part of a third-party software application.

By allowing software companies to self-attest to the security of their code — and prove the existence of supply chain risk management controls — the White House is erring on the side of efficiency and clearing the way for software suppliers to the federal government to document security controls and make security assurances.

How does self-attestation work?

At the time that M-22-18 was released, the details of how self-attestation to federal agencies would work was an open question. The memorandum called for software makers to use a standardized government attestation form but noted that no such form existed. In April 2023, CISA (the Cybersecurity and Infrastructure Security Agency) released its Secure Software Attestation Common Form (PDF).

That form asks software makers to attest to a number of statements about the process they used to develop the software in question. Those include:

  • That the software was “developed and built in secure environments"
  • That the software producer made “a good-faith effort" to maintain trusted source code supply chains
  • That the producer maintains provenance data for internal and third-party code incorporated into the software, scans for security vulnerabilities in the code, and so on

Forms must be completed and signed by the CEO of the software producer and submitted via email to the relevant federal agency using a naming convention spelled out in the standard form.

What about SBOMs?

Despite figuring prominently in discussions of federal software supply chain security and getting mentions in both Executive Order 14028 and Memorandum M-22-18, software bills of materials (SBOMs) are not required from software producers as part of the attestation process by default. However, CISA makes clear that producers may be asked by individual agencies to provide “additional attestation artifacts or documentation,” including SBOMs and documentation from third-party assessors, as a condition of the agency using the software in question.

Learn more about SBOMs Get a free SBOM and supply chain risk analysis

Agencies that opt to require additional artifacts or documentation beyond the self-attestation form can instruct the software producers that sell to them to maintain SBOMs or other requested elements needed for attestation among their own records, or to include them with the self-attestation form.

SBOMs submitted as part of the self-attestation process have to use a data format defined by the National Telecommunications and Information Administration (NTIA), which include SPDX, CycloneDX and SWID.

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:AppSec & Supply Chain Security

More Blog Posts

AI coding racing

Can AppSec keep pace with AI coding?

AI lets software teams generate code at a rate faster than security can validate it. One way to win the race: more AI.

Learn More about Can AppSec keep pace with AI coding?
Can AppSec keep pace with AI coding?
Finger on map

LLMmap puts its finger on ML attacks

Researchers show how LLM fingerprinting can be used to automate generation of customized attacks.

Learn More about LLMmap puts its finger on ML attacks
LLMmap puts its finger on ML attacks
Vibeware bad vibes

Vibeware: More than bad vibes for AppSec

Threat actors are leveraging the freewheeling vibe-coding trend to deliver malicious software at scale.

Learn More about Vibeware: More than bad vibes for AppSec
Vibeware: More than bad vibes for AppSec
CRA accelerates advantage

The CRA is coming: Are you ready?

Here's how the EU's Cyber Resilience Act will reshape the software industry — and how that accelerates advantages.

Learn More about The CRA is coming: Are you ready?
The CRA is coming: Are you ready?

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top