Get details on the CISA Attestation, how to address it, and how Legit can help.
In the rapidly evolving cybersecurity landscape, the imperative for robust and standardized security measures has never been more critical. We see this more now than ever as software supply chain attacks continually increase 600-700% year over year. To add some governance to the chaos, the Cybersecurity and Infrastructure Security Agency (CISA) was born in 2018 with the mission to fortify the nation’s cyber and infrastructure resilience.
This organization has been tasked with making sure critical applications and infrastructure are secure and protected from malicious actors globally. In doing so they have enacted policies and best practices to help government and civilian entities create safer and more secure software.
More than four years ago, the application security world was rocked with one of the largest and most costly attacks seen: the SolarWinds breach. Malicious actors infiltrated SolarWinds’ development pipelines and injected malicious code without the knowledge of security. This malicious package was then sent to thousands of victims (i.e., SolarWinds customers) downstream.
It was this attack that was the catalyst for the creation of President Joe Biden’s Executive Order (EO) on America’s Supply Chains in February 2021. This EO specifically called out the need for a new industry framework around securing the nation’s software supply chains. The National Institute of Standards and Technology (NIST) responded by creating the NIST Secure Software Development Framework (SSDF), otherwise known as NIST SP 800-218.
The NIST Secure Software Development Framework (SSDF) provides a comprehensive set of guidelines aimed at integrating security into the software development lifecycle, thereby enhancing the security posture of software products from inception to deployment. It outlines best practices and actionable recommendations for organizations to minimize vulnerabilities, improve security incident response, and foster a culture of security within software development teams.
As part of this newly formed framework, CISA set two deadlines for organizations selling software to the U.S. government to adhere to the SSDF framework: June 11, 2023 for all critical software and infrastructure and Sept 13, 2023 for all non-critical software and infrastructure. Some examples of what constitutes critical software would be software with any components that are designed to run with elevated privileges, has access to privileged networks or computing systems, or performs a function critical to trust or operates outside of normal trust boundaries.
To verify and validate that organizations meet the controls needed to be NIST SSDF compliant, CISA created an attestation form that needs to be signed by a high-level executive, currently limited to the CEO or COO, within an organization. We’re already seeing federal agencies, such as the FDA, start to hold vendors accountable to the controls found in NIST SSDF.
Additionally, OMB, Office of Management and Budget, has stated that agencies must take action to adopt NIST’s SSDF guidelines when procuring software, “effective immediately.” With that said, OMB Memorandum M-22-18 has delayed the attestation requirements by 30 and 60 days after the approval of the CISA Attestation Common Form for critical and non-critical software respectively.
The new CISA Attestation form allows organizations to verify and “attest” that they adhere to the SSDF guidelines and comply with a subset of the controls listed in SSDF as listed in the CISA Attestation form. Within this attestation there are four main areas of concern that need to be attested to:
Within each of these areas, there are several complex controls that need to be implemented, verified and evidenced in order to meet the requirements set by CISA.
This is no easy feat due to the complexity of modern application development, and one of the main concerns voiced by organizations during the CISA Attestation commenting period is the difficulty and complexity of validating these controls and providing evidence for them.
CISA attestation serves as a powerful tool for organizations and governments and provides a structured framework to elevate cybersecurity practices, including:
There are several real benefits to having an attestation process like this:
By setting and enforcing robust cybersecurity standards, CISA attestation helps protect critical infrastructure and key resources that are vital to the nation’s security, economy, public health, and safety. This includes sectors such as energy, transportation, banking, and healthcare, among others.
CISA attestation provides a framework for organizations to assess, validate, and demonstrate their compliance with established cybersecurity practices and protocols. This ensures a consistent and high level of security across different sectors and organizations. Additionally, the attestation framework breaks the larger NIST SSDF into more “bite-sized” and manageable pieces for organizations while highlighting the areas where an organization should start to improve their software supply chain maturity.
Through the attestation process, organizations are encouraged to adopt a proactive approach to identifying, assessing, and managing cybersecurity risks. This includes regular assessments, threat monitoring, and the implementation of effective security measures to mitigate risks.
CISA attestation fosters collaboration between government agencies and private sector entities. This partnership is crucial for sharing threat intelligence, best practices, and resources to enhance the collective cybersecurity defense.
For organizations, achieving CISA attestation can build trust among stakeholders, customers, and partners by demonstrating a commitment to maintaining high standards of cybersecurity. This can be particularly important for companies that handle sensitive data or are part of critical supply chains.
The attestation process encourages organizations to continuously review and enhance their cybersecurity practices in response to evolving threats and technological advancements. This commitment to continuous improvement helps ensure that security measures remain effective over time.
While not an exhaustive list, here are several things you can do now to prepare and shore up your SDLC security practices:
Security is hard, particularly in the context of securing fast-moving development pipelines. Add to that the pressure of verifying that you meet compliance, and it becomes a Sisyphean task without the right tools or processes in place.
This is one of the main reasons Legit has focused so heavily on helping organizations understand where they stand regarding compliance standards.
So how can Legit help you? Let’s break it down based on the four focus areas of the CISA Attestation.
Most important, because of the comprehensive visibility, deep understanding of an organization’s SDLC, and robust set of built-in governance policies, we have the unique ability to provide real-time compliance assessments across your entire company product portfolio, business unit, or even individual product line and instantly tell you whether you meet CISA Attestation requirements. And when we find gaps, we don’t just point them out … we tell you where they live, who owns them, and how to go about remediating them so you can close them fast.
Lastly, while this blog is about CISA Attestation and how we can help with that area, I’d be remiss to not mention that we do this same compliance mapping and gap identification for several other commonly used standards including PCI, SOC2, SSDF, SLSA & FedRAMP.
In the complex journey toward CISA Attestation and SSDF compliance, the challenges can seem daunting, particularly given the stringent requirements and myriad controls involved. Legit Security stands out by offering not just tools but a comprehensive understanding of the software security program, tailored to help organizations navigate the detailed requirements of attestation. Legit Security’s approach focuses on providing deep insights into your software development processes, helping to identify vulnerabilities and streamline remediation efforts. This support is crucial not only for achieving compliance but also for fostering a culture of continuous improvement in cybersecurity practices, ensuring that organizations can maintain a strong security posture in the face of evolving threats.
Learn more about how Legit helps organizations comply with regulations.
*** This is a Security Bloggers Network syndicated blog from Legit Security Blog authored by Joe Nicastro. Read the original post at: https://www.legitsecurity.com/blog/how-to-address-cisa-attestation