Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Government’s new approach to software security oversight could complicate things for vendors
    Cybersecurity

    Government’s new approach to software security oversight could complicate things for vendors

    adminBy adminJanuary 28, 2026No Comments6 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Government’s new approach to software security oversight could complicate things for vendors
    Share
    Facebook Twitter LinkedIn Pinterest Email

    This audio is auto-generated. Please let us know if you have feedback.

    The Trump administration’s elimination of a security attestation requirement for federal software vendors could change how those companies demonstrate their products’ security to customers in the government and beyond.

    On Jan. 23, the White House’s Office of Management and Budget rescinded a Biden administration directive that told agencies to require their software providers to fill out a security attestation form developed by the Cybersecurity and Infrastructure Security Agency. The memo said the attestation requirement “imposed unproven and burdensome software accounting processes that prioritized compliance over genuine security investments.”

    OMB’s move to scrap the attestation requirement leaves agencies to decide for themselves how much information to require from vendors about their products’ security. The decision immediately prompted sharply divided reactions from the cybersecurity community, with some experts warning that the move would undermine efforts to push companies toward better security practices.

    “The self-attestation process was a stepping stone to more secure software,” said Nicholas Leiserson, who served as the assistant national cyber director for cyber policy and programs during the Biden administration. “Eliminating [the process] without providing a replacement mechanism is an unequivocal step backward for government cybersecurity.”

    Allan Friedman, a former senior adviser and strategist at CISA who led efforts to improve software transparency, wrote on LinkedIn that the requirements and CISA’s attestation form were meant to help agencies that lacked the resources to “design their own risk management approaches,” as well as to “help vendors not have to comply with dozens of unique requirements.”

    OMB did not respond to a request for comment.

    The attestation mandate was part of the Biden administration’s strategy to use the government’s purchasing power to drive software vendors toward more security-minded development practices. CISA led that strategy through its Secure by Design campaign, which encouraged companies to assume more of the burden for the secure operation of their products. The leaders of that campaign left the government early in the Trump administration, leaving its fate uncertain.

    Leiserson, who is now senior vice president for policy at the Institute for Security and Technology, a nonprofit think tank, said the Biden administration designed the attestation requirement to be a “backstop” to more forward-leaning initiatives like Secure by Design.

    “It ensures that software security does not become an afterthought by making it easier to bring a claim if a vendor fails to live up to its obligations,” he said.

    The government has been trying to get software makers to take more responsibility for their products since the 1990s, said James Lewis, a longtime cyber policy expert and former government official who is now at the Center for European Policy Analysis (CEPA). Lewis called the elimination of the attestation requirement “idiocy” and “a step backward.”

    Imperfect process

    Critics of the attestation process said agencies implemented it haphazardly, even after CISA developed the common form for all agencies to use. “Some agencies continued to follow up with additional questions or to emphasize different aspects of the requirements,” said Ari Schwartz, the managing director of cybersecurity services at the law firm Venable. “For vendors with large product portfolios and multiple software versions, the process still represented a substantial paperwork effort.”

    Schwartz said some companies told him that agencies asked them to attest to the security of products that were “well past their end of life.” Because of the security flaws inherent in those out-of-date products, Schwartz said, the companies couldn’t meet the agencies’ demands.

    The tech industry, which repeatedly criticized the attestation form as poorly designed, asked the Biden administration to clarify elements it considered vague or problematic.

    Gordon Bitko, executive vice president of public sector for the Information Technology Industry Council, praised the Trump administration’s “decision to move away from prescriptive mandates in favor of a risk-based approach” to security.

    Henry Young, senior director of policy for the Business Software Alliance, said the attestation form “proved difficult to implement consistently and diverted resources away from managing real cybersecurity risk.”

    Leiserson pushed back on those claims. “The form in question takes roughly three hours to complete,” he said.

    Vendors’ fear of liability for misrepresenting their products’ security “was the real burden,” CEPA’s Lewis argued.

    Every agency for itself

    With the White House leaving it up to individual agencies to decide how to hold their software vendors accountable, the result could be a fragmented landscape of inconsistently stringent oversight.

    Some agencies may continue using CISA’s form, while others may develop their own processes that ask for more or less information from software companies. That might make things even more complicated for vendors than the mandate whose demise they celebrated.

    “If agencies all go in different directions and adopt very different approaches,” Schwartz said, “that could end up increasing the burden on companies without necessarily improving security.”

    ITI’s Bitko urged the White House to “guard against fragmented, agency-specific requirements” that could make compliance more expensive.

    The White House memo offered several suggestions to agencies, including referencing the National Institute of Standards and Technology’s Secure Software Development Framework (SSDF) or requesting software or hardware bills of materials from vendors. On LinkedIn, Friedman called the SSDF “a solid tool” but said it was “not designed for compliance or measurement.”

    Schwartz said it would be best if agencies converged on “broadly similar” security expectations that they implemented through contract language. BSA’s Young said the most effective approaches would base requirements on risk levels and use international standards.

    An ongoing White House initiative could help prevent a sprawling patchwork of requirements. The Trump administration is in the process of revising the way agencies certify technology for use, which could lead to new government-wide standards for software security.

    On alert for cascading security lapses

    Most of the software that the government buys is the same commercial technology available to private businesses. If vendors’ attention to security slackens without strict oversight from their government customers, the consequences could endanger all of their customers.

    Many cybersecurity experts have argued that the government’s longstanding deference toward Microsoft, one of its most important suppliers, encouraged the erosion of the company’s security culture that enabled a series of major cyberattacks on Microsoft products.

    “Improvements in software security in response to market signals from the government [help] all users of that software, not just the government,” Leiserson said. “Conversely, the removal of such incentives will leave the ecosystem more vulnerable.”

    For now, Schwartz said, “it’s too early to say whether this will meaningfully change the security of the software [that] agencies use.” Much will depend, he said, on how agencies — especially the biggest ones, which have the most significant software contracts — refashion their vendor oversight in response to the new White House guidance.

    approach complicate Governments oversight Security software vendors
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow Andreea Matei Earned $180K with 3,500 Amazon Influencer Videos
    Next Article Amazon confirms 16,000 job cuts, including to AWS
    admin
    • Website

    Related Posts

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

    March 5, 2026

    Fideo Intelligence enhances dark web monitoring capabilities to reduce payment fraud

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    What SMEC’s Data Reveals About AI Max Performance

    March 5, 2026

    This Ultra phone first to use Sony’s new 200MP camera sensor

    March 5, 2026

    Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (622)
    • Privacy & Online Earning (92)
    • SEO & Digital Marketing (395)
    • Tech Tools & Mobile / Apps (759)
    • WiFi / Internet & Networking (111)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    What SMEC’s Data Reveals About AI Max Performance

    March 5, 2026

    This Ultra phone first to use Sony’s new 200MP camera sensor

    March 5, 2026
    Most Popular
    • Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
    • What SMEC’s Data Reveals About AI Max Performance
    • This Ultra phone first to use Sony’s new 200MP camera sensor
    • Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
    • Yep, Amazon Is Down | Lifehacker
    • Fideo Intelligence enhances dark web monitoring capabilities to reduce payment fraud
    • AI Max increases revenue 13% but drives higher CPA: Study
    • Why everyone should use VS Code (even if they aren’t programmers)
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.