National Cybersecurity Center of Excellence (NCCoE) Software Supply Chain and DevOps Security Practices, 30947-30950 [2023-10221]
Download as PDF
Federal Register / Vol. 88, No. 93 / Monday, May 15, 2023 / Notices
funded by USDA (not all bases apply to
all programs).
ddrumheller on DSK120RN23PROD with NOTICES1
USDA Non-Discrimination Policy
In accordance with Federal civil
rights law and U.S. Department of
Agriculture (USDA) civil rights
regulations and policies, USDA, its
Agencies, offices, and employees, and
institutions participating in or
administering USDA programs are
prohibited from discriminating based on
race, color, national origin, religion, sex,
gender identity (including gender
expression), sexual orientation,
disability, age, marital status, family or
parental status, income derived from a
public assistance program, political
beliefs, or reprisal or retaliation for prior
civil rights activity, in any program or
activity conducted or funded by USDA
(not all bases apply to all programs).
Remedies and complaint filing
deadlines vary by program or incident.
Individuals who require alternative
means of communication for program
information (for example, braille, large
print, audiotape, American Sign
Language, etc.) should contact the
responsible Agency or USDA TARGET
Center at (202) 720–2600 (voice and text
telephone (TTY)) or dial 711 for
Telecommunicaions Relay Service (both
voice and text telephone users can
initiate this call from any phone).
Additionally, program information may
be made available in languages other
than English.
To file a program discrimination
complaint, complete the USDA Program
Discrimination Complaint Form, AD–
3027, found online at https://
www.usda.gov/oascr/how-to-file-aprogram-discrimination-complaint and
at any USDA office or write a letter
addressed to USDA and provide in the
letter all the information requested in
the form. To request a copy of the
complaint form, call (866) 632–9992.
Submit your completed form or letter to
USDA by mail to: U.S. Department of
Agriculture, Office of the Assistant
Secretary for Civil Rights, 1400
Independence Avenue SW, Washington,
DC 20250–9410 or email: OAC@
usda.gov.USDA is an equal opportunity
provider, employer, and lender.
Dated: May 3, 2023.
Cikena Reid,
Committee Management Officer, USDA.
[FR Doc. 2023–10217 Filed 5–12–23; 8:45 am]
BILLING CODE 3410–16–P
VerDate Sep<11>2014
19:07 May 12, 2023
Jkt 259001
DEPARTMENT OF COMMERCE
International Trade Administration
United States Travel and Tourism
Advisory Board: Meeting of the United
States Travel and Tourism Advisory
Board
International Trade
Administration, U.S. Department of
Commerce.
ACTION: Notice of an open meeting.
AGENCY:
The United States Travel and
Tourism Advisory Board (Board or
TTAB) will hold a meeting on
Thursday, June 1, 2023. The Board
advises the Secretary of Commerce on
matters relating to the U.S. travel and
tourism industry. The main purpose of
this meeting is for Board members to
discuss priority issues related to travel
and tourism. The final agenda will be
posted on the Department of Commerce
website for the Board at https://
www.trade.gov/ttab-meetings at least
two days prior to the meeting.
DATES: Thursday, June 1, 2023, 9 a.m.–
12 p.m. EDT. The deadline for members
of the public to register for the meeting
or to submit written comments for
dissemination prior to the meeting is 5
p.m. EDT on Tuesday, May 30, 2023.
ADDRESSES: The meeting will be held in
person in Washington, DC and virtually.
The access information will be provided
by email to registrants. Requests to
register (including to speak or for
auxiliary aids) and any written
comments should be submitted by email
to TTAB@trade.gov.
FOR FURTHER INFORMATION CONTACT:
Jennifer Aguinaga, the United States
Travel and Tourism Advisory Board,
National Travel and Tourism Office,
U.S. Department of Commerce;
telephone: 202–482–2404; email:
TTAB@trade.gov.
SUPPLEMENTARY INFORMATION:
Public Participation: The meeting will
be open to the public and will be
accessible to people with disabilities.
Any member of the public requesting to
join the meeting is asked to register in
advance by the deadline identified
under the DATES caption. Requests for
auxiliary aids must be submitted by the
registration deadline. Last minute
requests will be accepted but may not be
possible to fill. There will be fifteen (15)
minutes allotted for oral comments from
members of the public joining the
meeting. To accommodate as many
speakers as possible, the time for public
comments may be limited to three (3)
minutes per person. Members of the
public wishing to reserve speaking time
during the meeting must submit a
SUMMARY:
PO 00000
Frm 00005
Fmt 4703
Sfmt 4703
30947
request at the time of registration, as
well as the name and address of the
proposed speaker. If the number of
registrants requesting to make
statements is greater than can be
reasonably accommodated during the
meeting, the International Trade
Administration may conduct a lottery to
determine the speakers. Speakers are
requested to submit a written copy of
their prepared remarks by 5 p.m. EDT
on Tuesday, May 30, 2023, for inclusion
in the meeting records and for
circulation to the members of the Board.
In addition, any member of the public
may submit pertinent written comments
concerning the Board’s affairs at any
time before or after the meeting.
Comments may be submitted to Jennifer
Aguinaga at the contact information
indicated above. To be considered
during the meeting, comments must be
received no later than 5 p.m. EDT on
Tuesday, May 30, 2023, to ensure
transmission to the Board prior to the
meeting. Comments received after that
date and time will be transmitted to the
Board but may not be considered during
the meeting. Copies of Board meeting
minutes will be available within 90 days
of the meeting.
This Notice is published pursuant to
the Federal Advisory Committee Act, as
amended (FACA), 5 U.S.C. app. 9(c). It
has been determined that the Committee
is necessary and in the public interest.
The Committee was established
pursuant to Commerce’s authority under
15 U.S.C. 1512, established under the
FACA, as amended, 5 U.S.C. app., and
with the concurrence of the General
Services Administration.
Jennifer Aguinaga,
Designated Federal Officer, United States
Travel and Tourism Advisory Board.
[FR Doc. 2023–10234 Filed 5–12–23; 8:45 am]
BILLING CODE 3510–DR–P
DEPARTMENT OF COMMERCE
National Institute of Standards and
Technology
RIN 0693–XC127
National Cybersecurity Center of
Excellence (NCCoE) Software Supply
Chain and DevOps Security Practices
National Institute of Standards
and Technology, Department of
Commerce.
ACTION: Notice.
AGENCY:
The National Institute of
Standards and Technology (NIST)
invites organizations to provide letters
of interest describing products and
SUMMARY:
E:\FR\FM\15MYN1.SGM
15MYN1
30948
Federal Register / Vol. 88, No. 93 / Monday, May 15, 2023 / Notices
technical expertise to support and
demonstrate an applied risk-based
approach and recommendations for
secure DevOps (software development
and operations) and software supply
chain practices for the Software Supply
Chain and DevOps Security Practices
project. This notice is the initial step for
the National Cybersecurity Center of
Excellence (NCCoE) in collaborating
with technology companies to address
DevOps and software supply chain
security challenges identified under the
Software Supply Chain and DevOps
Security Practices project. Participation
in the project is open to all interested
organizations.
Collaborative activities will
commence as soon as enough completed
and signed letters of interest have been
returned to address all the necessary
components and capabilities, but no
earlier than June 14, 2023.
ADDRESSES: The NCCoE is located at
9700 Great Seneca Highway, Rockville,
MD 20850. Letters of interest must be
submitted to devsecops-nist@nist.gov or
via hardcopy to National Institute of
Standards and Technology, NCCoE;
9700 Great Seneca Highway, Rockville,
MD 20850. Interested parties can
request the letter of interest template by
visiting https://www.nccoe.nist.gov/
projects/software-supply-chain-anddevops-security-practices and
completing the letter of interest
webform. NIST will announce the
completion of the selection of
participants and inform the public that
it is no longer accepting letters of
interest for this project at https://
www.nccoe.nist.gov/projects/softwaresupply-chain-and-devops-securitypractices. Organizations whose letters of
interest are accepted in accordance with
the process set forth in the
SUPPLEMENTARY INFORMATION section of
this notice will be asked to sign a
consortium NCCoE Cooperative
Research and Development Agreement
(CRADA) with NIST; a template NCCoE
Consortium CRADA can be found at:
https://nccoe.nist.gov/library/nccoeconsortium-crada-example.
FOR FURTHER INFORMATION CONTACT: Paul
Watrobski via email devsecops-nist@
nist.gov, by telephone at (240) 479–
1830, or by mail to National Institute of
Standards and Technology, NCCoE;
9700 Great Seneca Highway, Rockville,
MD 20850. Additional details about the
Software Supply Chain and DevOps
Security Practices project are available
at https://www.nccoe.nist.gov/projects/
software-supply-chain-and-devopssecurity-practices.
SUPPLEMENTARY INFORMATION:
ddrumheller on DSK120RN23PROD with NOTICES1
DATES:
VerDate Sep<11>2014
19:07 May 12, 2023
Jkt 259001
Background: The NCCoE, part of
NIST, is a public-private collaboration
for accelerating the widespread
adoption of integrated cybersecurity
tools and technologies. The NCCoE
brings together experts from industry,
government, and academia under one
roof to develop and document an
applied risk-based approach and
recommendations for secure DevOps
(DevSecOps) and software supply chain
practices consistent with the Secure
Software Development Framework
(SSDF), Cybersecurity Supply Chain
Risk Management (C–SCRM), and other
NIST, government, and industry
guidance. Industry, government, and
other organizations could then apply the
guidelines when choosing and
implementing DevSecOps practices in
order to improve the security of the
software they develop and operate.
That, in turn, would improve the
security of the organizations using that
software, and so on throughout the
software supply chain.
Process: NIST is soliciting responses
from all sources of relevant security
capabilities (see below) to enter into a
Cooperative Research and Development
Agreement (CRADA) to provide
products and technical expertise to
support and demonstrate an applied
risk-based approach and
recommendations for secure DevOps
(software development and operations)
and software supply chain practices for
the Software Supply Chain and DevOps
Security Practices project. The full
project can be viewed at: https://
www.nccoe.nist.gov/projects/softwaresupply-chain-and-devops-securitypractices.
Interested parties can access the
template for a letter of interest by
visiting the project website at https://
www.nccoe.nist.gov/projects/softwaresupply-chain-and-devops-securitypractices and completing the letter of
interest webform. On completion of the
webform, interested parties will receive
access to the letter of interest template,
which the party must complete, certify
as accurate, and submit to NIST by
email or hardcopy. NIST will contact
interested parties if there are questions
regarding the responsiveness of the
letters of interest to the project objective
or requirements identified below. NIST
will select participants who have
submitted complete letters of interest on
a first come, first served basis within
each category of product components or
capabilities listed in the Requirements
for Letters of Interest section below, up
to the number of participants in each
category necessary to carry out this
project. There may be continuing
opportunity to participate even after
PO 00000
Frm 00006
Fmt 4703
Sfmt 4703
initial activity commences for
participants who were not selected
initially or have submitted the letter of
interest after the selection process.
Selected participants will be required to
enter into an NCCoE consortium
CRADA with NIST (for reference, see
ADDRESSES section above).
When the project has been completed,
NIST will post a notice on the Software
Supply Chain and DevOps Security
Practices project website at https://
www.nccoe.nist.gov/projects/softwaresupply-chain-and-devops-securitypractices announcing the completion of
the project.
Project Objective
This project’s goal is to develop and
document an applied risk-based
approach and recommendations for
DevSecOps practices. This project is
intended to help enable organizations to
maintain the velocity and volume of
software delivery in a cloud-native way
and take advantage of automated tools.
The project’s objective is to produce
practical and actionable guidelines that
meaningfully integrate security
practices into development
methodologies. The project intends to
demonstrate how an organization can
generate artifacts as a byproduct of its
DevSecOps practices to support and
inform the organization’s self-attestation
and declaration of conformance to
applicable NIST and industryrecommended practices for secure
software development and cybersecurity
supply chain risk management. The
project will also strive to demonstrate
the use of current and emerging secure
development frameworks, practices, and
tools to address cybersecurity
challenges.
Project Background
DevOps brings together software
development and operations to shorten
development cycles, allow organizations
to be agile, and maintain the pace of
innovation while taking advantage of
cloud-native technology and practices.
Industry and government have fully
embraced and are rapidly implementing
these practices to develop and deploy
software in operational environments,
often without a full understanding and
consideration of security. The NCCoE is
undertaking a practical demonstration
of technology and tools that
meaningfully integrate security
practices into development
methodologies. DevSecOps helps ensure
that security is addressed as part of all
DevOps practices by integrating security
practices and automatically generating
security and compliance artifacts
throughout the processes and
E:\FR\FM\15MYN1.SGM
15MYN1
Federal Register / Vol. 88, No. 93 / Monday, May 15, 2023 / Notices
environments, including software
development, builds, packaging,
distribution, and deployment.
Furthermore, there is increasing
recognition of how security concerns
inherent in modern day supply chains
directly affect the DevOps process.
DevSecOps practices can help identify,
assess, and mitigate cybersecurity risk
for the software supply chain.
ddrumheller on DSK120RN23PROD with NOTICES1
Project Activities
To meet the need to accelerate
widespread adoption of improved
DevOps and software supply chain
security practices across various
industry sectors, the NCCoE Software
Supply Chain and DevOps Security
Practices project will produce and
demonstrate practical and actionable
guidelines that meaningfully integrate
security practices into development
methodologies. Additionally, the project
will demonstrate how an organization
can generate artifacts as a byproduct of
its DevSecOps practices to support and
inform the organization’s self-attestation
and declaration of conformance to
applicable NIST and industryrecommended practices for secure
software development and cybersecurity
supply chain risk management. The
project will also strive to demonstrate
the use of current and emerging secure
development frameworks, practices, and
tools to address cybersecurity
challenges. Lessons learned during the
project will be shared with the security
and software development communities
to inform improvements to secure
development frameworks, practices, and
tools. Lessons learned will also be
shared with standards developing
organizations to inform their
DevSecOps-related work. The intention
is to demonstrate DevSecOps practices,
especially using automation, that would
apply to organizations of all sizes and
from all sectors, and to development for
information technology (IT), operational
technology (OT), Internet of Things
(IoT), and other technology types.
Project Outcomes
The proposed proof-of-concept
solution(s) will integrate free and open
source software (FOSS) and closed
source software to demonstrate the use
case scenarios detailed in Section 2 of
the Software Supply Chain and DevOps
Security Practices project description at
https://www.nccoe.nist.gov/projects/
software-supply-chain-and-devopssecurity-practices. This project will
result in a publicly available NIST
Cybersecurity Practice Guide as a
Special Publication 1800 series, a
detailed implementation guide
describing the practical steps needed to
VerDate Sep<11>2014
19:07 May 12, 2023
Jkt 259001
implement a cybersecurity reference
design that addresses this challenge.
Supporting outputs may include public
tools, code, and white papers.
Requirements for Letters of Interest:
Each responding organization’s letter of
interest should identify which security
platform component(s) or capability(ies)
it is offering. Letters of interest should
not include company proprietary
information, and all components and
capabilities must be commercially
available. Components are listed in
Section 3 of the Software Supply Chain
and DevOps Security Practices project
description at https://
www.nccoe.nist.gov/projects/softwaresupply-chain-and-devops-securitypractices and include, but are not
limited to:
• Developer endpoints, including PCs
(desktops or laptops) and virtual
environments, both PC-based and
cloud-based
• Network/infrastructure devices
• Services and applications, both onpremises and cloud-based,
including:
Æ Toolchains and their tools (build
tools, packaging tools, repositories,
etc.)
Æ Vulnerability management (patch
and configuration)
Æ Version control software and
services
Æ Software security review, analysis,
and testing tools (e.g., static and
dynamic code analyzers, fuzzers,
just-in-time secure coding training
for developers)
Æ Secure software design tools (e.g.,
threat modeling tools)
Æ Memory safe programming
languages
• Build systems (test, integration,
production)
• Distribution/delivery systems
• Production systems that host apps
Each responding organization’s letter
of interest should identify how their
products help address one or more of
the following demonstration scenarios
in Section 2 of the Software Supply
Chain and DevOps Security Practices
project description at https://
www.nccoe.nist.gov/projects/softwaresupply-chain-and-devops-securitypractices:
• Free and open source software
development
• Closed source software development
In their letters of interest, responding
organizations need to acknowledge the
importance of and commit to provide:
1. Access for all participants’ project
teams to DevOps component interfaces
and the organization’s experts necessary
to make functional connections among
DevOps components.
PO 00000
Frm 00007
Fmt 4703
Sfmt 4703
30949
2. Support for development and
demonstration of the Software Supply
Chain and DevOps Security Practices
project at the NCCoE, which will be
conducted in a manner consistent with
the most recent version of the following
standards and guidance: Cybersecurity
Supply Chain Risk Management
Practices for Systems and Organizations
(NIST SP 800–161) (https://doi.org/
10.6028/NIST.SP.800-161r1),
Framework for Improving Critical
Infrastructure Cybersecurity
(Cybersecurity Framework) (https://
www.nist.gov/cyberframework/
framework), and Secure Software
Development Framework (SSDF) (NIST
SP 800–218) (https://doi.org/10.6028/
NIST.SP.800-218). Additional details
about the Software Supply Chain and
DevOps Security Practices project are
available at https://www.nccoe.nist.gov/
projects/software-supply-chain-anddevops-security-practices.
NIST cannot guarantee that all of the
products proposed by respondents will
be used in the demonstration. Each
prospective participant will be expected
to work collaboratively with NIST staff
and other project participants under the
terms of the NCCoE consortium CRADA
in the development of the Software
Supply Chain and DevOps Security
Practices project. Prospective
participants’ contribution to the
collaborative effort will include
assistance in establishing the necessary
interface functionality, connection and
set-up capabilities and procedures,
demonstration harnesses, environmental
and safety conditions for use, integrated
platform user instructions, and
demonstration plans and scripts
necessary to demonstrate the desired
capabilities. Each participant will train
NIST personnel, as necessary, to operate
its product in capability
demonstrations. Following successful
demonstrations, NIST will publish a
description of the DevSecOps proof-ofconcept builds and their characteristics
sufficient to permit other organizations
to develop and deploy DevSecOps
practices that meet the objectives of the
Software Supply Chain and DevOps
Security Practices project. These
descriptions will be public information.
Under the terms of the NCCoE
consortium CRADA, NIST will support
development of interfaces among
participants’ products by providing IT
infrastructure, laboratory facilities,
office facilities, collaboration facilities,
and staff support to component
composition, platform documentation,
and demonstration activities.
The dates of the demonstration of the
Software Supply Chain and DevOps
Security Practices project capability will
E:\FR\FM\15MYN1.SGM
15MYN1
30950
Federal Register / Vol. 88, No. 93 / Monday, May 15, 2023 / Notices
be announced on the NCCoE website at
least two weeks in advance at https://
nccoe.nist.gov/. The expected outcome
will demonstrate how the components
of the solutions that address Software
Supply Chain and DevOps Security
Practices can enhance capabilities that
provide assurance of management of
identified risks while continuing to
meet industry sectors’ compliance
requirements. Participating
organizations will gain from the
knowledge that their products are
interoperable with other participants’
offerings.
For additional information on the
NCCoE governance, business processes,
and NCCoE operational structure, visit
the NCCoE website https://
nccoe.nist.gov/.
Alicia Chambers,
NIST Executive Secretariat.
[FR Doc. 2023–10221 Filed 5–12–23; 8:45 am]
BILLING CODE 3510–13–P
FOR FURTHER INFORMATION CONTACT:
DEPARTMENT OF COMMERCE
National Oceanic and Atmospheric
Administration
Evaluation of Heeia National Estuarine
Research Reserve; Notice of Public
Meeting; Request for Comments
Office for Coastal Management,
National Ocean Service, National
Oceanic and Atmospheric
Administration, Department of
Commerce.
ACTION: Notice of public meeting and
opportunity to comment.
AGENCY:
The National Oceanic and
Atmospheric Administration (NOAA),
Office for Coastal Management, will
hold an in-person public meeting to
solicit input on the performance
evaluation of the Heeia National
Estuarine Research Reserve. NOAA also
invites the public to submit written
comments.
DATES: NOAA will hold an in-person
public meeting on Tuesday, June 6,
2023, at 6 p.m. Hawaii Standard Time.
NOAA will consider all relevant written
comments received by Friday, June 16,
2023.
ADDRESSES: Comments may be
submitted by one of the following
methods:
• In-Person Public Meeting: Provide
oral comments during the in-person
public meeting on Tuesday, June 6,
2023, at 6 p.m. Hawaii Standard Time
at Kakoo Oiwi, 46–406 Kamehameha
Hwy., Kaneohe, HI 96744.
• Email: Send written comments to
Michael Migliori, Evaluator, NOAA
ddrumheller on DSK120RN23PROD with NOTICES1
SUMMARY:
VerDate Sep<11>2014
19:07 May 12, 2023
Office for Coastal Management, at
Michael.Migliori@noaa.gov. Include
‘‘Comments on Performance Evaluation
of Heeia National Estuarine Research
Reserve’’ in the subject line of the
message. NOAA will accept anonymous
comments; however, the written
comments NOAA receives are
considered part of the public record,
and the entirety of the comment,
including the name of the commenter,
email address, attachments, and other
supporting materials, will be publicly
accessible. Sensitive personally
identifiable information, such as
account numbers and Social Security
numbers, should not be included with
the comments. Comments that are not
related to the performance evaluation of
the Heeia National Estuarine Research
Reserve or that contain profanity,
vulgarity, threats, or other inappropriate
language will not be considered.
Jkt 259001
Michael Migliori, Evaluator, NOAA
Office for Coastal Management, by email
at Michael.Migliori@noaa.gov or by
phone at (443) 332–8936. A copy of the
reserve management plan, may be
viewed and downloaded at https://
coast.noaa.gov/czm/evaluations/. A
copy of the evaluation notification letter
and most recent progress report may be
obtained upon request by contacting
Michael Migliori.
Section
315(f) of the Coastal Zone Management
Act (CZMA) requires NOAA to conduct
periodic evaluations of federally
approved national estuarine research
reserves. The evaluation process
includes holding one or more public
meetings, considering public comments,
and consulting with interested Federal,
State, and local agencies and members
of the public. During the evaluation,
NOAA will consider whether the
management and operation of the
reserve is deficient and whether the
research at the reserve is consistent with
the research guidelines developed under
section 315(c) of the CZMA. When the
evaluation is complete, NOAA’s Office
for Coastal Management will place a
notice in the Federal Register
announcing the availability of the final
evaluation findings.
SUPPLEMENTARY INFORMATION:
(Authority: 16 U.S.C. 1461)
[FR Doc. 2023–10258 Filed 5–12–23; 8:45 am]
PO 00000
Frm 00008
Fmt 4703
Sfmt 4703
National Oceanic and Atmospheric
Administration
[RTID 0648–XC920]
Determination of Overfishing or an
Overfished Condition
National Marine Fisheries
Service (NMFS), National Oceanic and
Atmospheric Administration (NOAA),
Commerce.
ACTION: Notice.
AGENCY:
This action serves as a notice
that NMFS, on behalf of the Secretary of
Commerce (Secretary), has found that
Pacific sardine is still overfished.
NMFS, on behalf of the Secretary, is
required to provide this notice
whenever it determines that a stock or
stock complex is subject to overfishing,
overfished, or approaching an
overfished condition.
FOR FURTHER INFORMATION CONTACT:
Caroline Potter, (301) 427–8522.
SUPPLEMENTARY INFORMATION: Pursuant
to section 304(e)(2) of the MagnusonStevens Fishery Conservation and
Management Act (Magnuson-Stevens
Act), 16 U.S.C. 1854(e)(2), NMFS, on
behalf of the Secretary, must publish a
notice in the Federal Register whenever
it determines that a stock or stock
complex is subject to overfishing,
overfished, or approaching an
overfished condition.
NMFS has determined that Pacific
sardine remains overfished. This
determination is based on an update
assessment completed in 2022 using
data through 2021, which indicates that
the stock remains overfished because
the biomass is less than the minimum
stock size threshold. NMFS continues to
work with the Pacific Fishery
Management Council to rebuild the
Pacific sardine stock.
SUMMARY:
Dated: May 10, 2023.
Jennifer M. Wallace,
Acting Director, Office of Sustainable
Fisheries, National Marine Fisheries Service.
[FR Doc. 2023–10320 Filed 5–12–23; 8:45 am]
BILLING CODE 3510–22–P
U.S. INTERNATIONAL DEVELOPMENT
FINANCE CORPORATION
Notice of Public Hearing
Keelin Kuipers,
Deputy Director, Office for Coastal
Management, National Ocean Service,
National Oceanic and Atmospheric
Administration.
BILLING CODE 3510–JE–P
DEPARTMENT OF COMMERCE
U.S. International Development
Finance Corporation.
ACTION: Announcement of public
hearing.
AGENCY:
The Board of Directors of the
U.S. International Development Finance
SUMMARY:
E:\FR\FM\15MYN1.SGM
15MYN1
Agencies
[Federal Register Volume 88, Number 93 (Monday, May 15, 2023)]
[Notices]
[Pages 30947-30950]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-10221]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Institute of Standards and Technology
RIN 0693-XC127
National Cybersecurity Center of Excellence (NCCoE) Software
Supply Chain and DevOps Security Practices
AGENCY: National Institute of Standards and Technology, Department of
Commerce.
ACTION: Notice.
-----------------------------------------------------------------------
SUMMARY: The National Institute of Standards and Technology (NIST)
invites organizations to provide letters of interest describing
products and
[[Page 30948]]
technical expertise to support and demonstrate an applied risk-based
approach and recommendations for secure DevOps (software development
and operations) and software supply chain practices for the Software
Supply Chain and DevOps Security Practices project. This notice is the
initial step for the National Cybersecurity Center of Excellence
(NCCoE) in collaborating with technology companies to address DevOps
and software supply chain security challenges identified under the
Software Supply Chain and DevOps Security Practices project.
Participation in the project is open to all interested organizations.
DATES: Collaborative activities will commence as soon as enough
completed and signed letters of interest have been returned to address
all the necessary components and capabilities, but no earlier than June
14, 2023.
ADDRESSES: The NCCoE is located at 9700 Great Seneca Highway,
Rockville, MD 20850. Letters of interest must be submitted to
[email protected] or via hardcopy to National Institute of
Standards and Technology, NCCoE; 9700 Great Seneca Highway, Rockville,
MD 20850. Interested parties can request the letter of interest
template by visiting https://www.nccoe.nist.gov/projects/software-supply-chain-and-devops-security-practices and completing the letter of
interest webform. NIST will announce the completion of the selection of
participants and inform the public that it is no longer accepting
letters of interest for this project at https://www.nccoe.nist.gov/projects/software-supply-chain-and-devops-security-practices.
Organizations whose letters of interest are accepted in accordance with
the process set forth in the SUPPLEMENTARY INFORMATION section of this
notice will be asked to sign a consortium NCCoE Cooperative Research
and Development Agreement (CRADA) with NIST; a template NCCoE
Consortium CRADA can be found at: https://nccoe.nist.gov/library/nccoe-consortium-crada-example.
FOR FURTHER INFORMATION CONTACT: Paul Watrobski via email [email protected], by telephone at (240) 479-1830, or by mail to National
Institute of Standards and Technology, NCCoE; 9700 Great Seneca
Highway, Rockville, MD 20850. Additional details about the Software
Supply Chain and DevOps Security Practices project are available at
https://www.nccoe.nist.gov/projects/software-supply-chain-and-devops-security-practices.
SUPPLEMENTARY INFORMATION:
Background: The NCCoE, part of NIST, is a public-private
collaboration for accelerating the widespread adoption of integrated
cybersecurity tools and technologies. The NCCoE brings together experts
from industry, government, and academia under one roof to develop and
document an applied risk-based approach and recommendations for secure
DevOps (DevSecOps) and software supply chain practices consistent with
the Secure Software Development Framework (SSDF), Cybersecurity Supply
Chain Risk Management (C-SCRM), and other NIST, government, and
industry guidance. Industry, government, and other organizations could
then apply the guidelines when choosing and implementing DevSecOps
practices in order to improve the security of the software they develop
and operate. That, in turn, would improve the security of the
organizations using that software, and so on throughout the software
supply chain.
Process: NIST is soliciting responses from all sources of relevant
security capabilities (see below) to enter into a Cooperative Research
and Development Agreement (CRADA) to provide products and technical
expertise to support and demonstrate an applied risk-based approach and
recommendations for secure DevOps (software development and operations)
and software supply chain practices for the Software Supply Chain and
DevOps Security Practices project. The full project can be viewed at:
https://www.nccoe.nist.gov/projects/software-supply-chain-and-devops-security-practices.
Interested parties can access the template for a letter of interest
by visiting the project website at https://www.nccoe.nist.gov/projects/software-supply-chain-and-devops-security-practices and completing the
letter of interest webform. On completion of the webform, interested
parties will receive access to the letter of interest template, which
the party must complete, certify as accurate, and submit to NIST by
email or hardcopy. NIST will contact interested parties if there are
questions regarding the responsiveness of the letters of interest to
the project objective or requirements identified below. NIST will
select participants who have submitted complete letters of interest on
a first come, first served basis within each category of product
components or capabilities listed in the Requirements for Letters of
Interest section below, up to the number of participants in each
category necessary to carry out this project. There may be continuing
opportunity to participate even after initial activity commences for
participants who were not selected initially or have submitted the
letter of interest after the selection process. Selected participants
will be required to enter into an NCCoE consortium CRADA with NIST (for
reference, see ADDRESSES section above).
When the project has been completed, NIST will post a notice on the
Software Supply Chain and DevOps Security Practices project website at
https://www.nccoe.nist.gov/projects/software-supply-chain-and-devops-security-practices announcing the completion of the project.
Project Objective
This project's goal is to develop and document an applied risk-
based approach and recommendations for DevSecOps practices. This
project is intended to help enable organizations to maintain the
velocity and volume of software delivery in a cloud-native way and take
advantage of automated tools. The project's objective is to produce
practical and actionable guidelines that meaningfully integrate
security practices into development methodologies. The project intends
to demonstrate how an organization can generate artifacts as a
byproduct of its DevSecOps practices to support and inform the
organization's self-attestation and declaration of conformance to
applicable NIST and industry-recommended practices for secure software
development and cybersecurity supply chain risk management. The project
will also strive to demonstrate the use of current and emerging secure
development frameworks, practices, and tools to address cybersecurity
challenges.
Project Background
DevOps brings together software development and operations to
shorten development cycles, allow organizations to be agile, and
maintain the pace of innovation while taking advantage of cloud-native
technology and practices. Industry and government have fully embraced
and are rapidly implementing these practices to develop and deploy
software in operational environments, often without a full
understanding and consideration of security. The NCCoE is undertaking a
practical demonstration of technology and tools that meaningfully
integrate security practices into development methodologies. DevSecOps
helps ensure that security is addressed as part of all DevOps practices
by integrating security practices and automatically generating security
and compliance artifacts throughout the processes and
[[Page 30949]]
environments, including software development, builds, packaging,
distribution, and deployment. Furthermore, there is increasing
recognition of how security concerns inherent in modern day supply
chains directly affect the DevOps process. DevSecOps practices can help
identify, assess, and mitigate cybersecurity risk for the software
supply chain.
Project Activities
To meet the need to accelerate widespread adoption of improved
DevOps and software supply chain security practices across various
industry sectors, the NCCoE Software Supply Chain and DevOps Security
Practices project will produce and demonstrate practical and actionable
guidelines that meaningfully integrate security practices into
development methodologies. Additionally, the project will demonstrate
how an organization can generate artifacts as a byproduct of its
DevSecOps practices to support and inform the organization's self-
attestation and declaration of conformance to applicable NIST and
industry-recommended practices for secure software development and
cybersecurity supply chain risk management. The project will also
strive to demonstrate the use of current and emerging secure
development frameworks, practices, and tools to address cybersecurity
challenges. Lessons learned during the project will be shared with the
security and software development communities to inform improvements to
secure development frameworks, practices, and tools. Lessons learned
will also be shared with standards developing organizations to inform
their DevSecOps-related work. The intention is to demonstrate DevSecOps
practices, especially using automation, that would apply to
organizations of all sizes and from all sectors, and to development for
information technology (IT), operational technology (OT), Internet of
Things (IoT), and other technology types.
Project Outcomes
The proposed proof-of-concept solution(s) will integrate free and
open source software (FOSS) and closed source software to demonstrate
the use case scenarios detailed in Section 2 of the Software Supply
Chain and DevOps Security Practices project description at https://www.nccoe.nist.gov/projects/software-supply-chain-and-devops-security-practices. This project will result in a publicly available NIST
Cybersecurity Practice Guide as a Special Publication 1800 series, a
detailed implementation guide describing the practical steps needed to
implement a cybersecurity reference design that addresses this
challenge. Supporting outputs may include public tools, code, and white
papers.
Requirements for Letters of Interest: Each responding
organization's letter of interest should identify which security
platform component(s) or capability(ies) it is offering. Letters of
interest should not include company proprietary information, and all
components and capabilities must be commercially available. Components
are listed in Section 3 of the Software Supply Chain and DevOps
Security Practices project description at https://www.nccoe.nist.gov/projects/software-supply-chain-and-devops-security-practices and
include, but are not limited to:
Developer endpoints, including PCs (desktops or laptops) and
virtual environments, both PC-based and cloud-based
Network/infrastructure devices
Services and applications, both on-premises and cloud-based,
including:
[cir] Toolchains and their tools (build tools, packaging tools,
repositories, etc.)
[cir] Vulnerability management (patch and configuration)
[cir] Version control software and services
[cir] Software security review, analysis, and testing tools (e.g.,
static and dynamic code analyzers, fuzzers, just-in-time secure coding
training for developers)
[cir] Secure software design tools (e.g., threat modeling tools)
[cir] Memory safe programming languages
Build systems (test, integration, production)
Distribution/delivery systems
Production systems that host apps
Each responding organization's letter of interest should identify
how their products help address one or more of the following
demonstration scenarios in Section 2 of the Software Supply Chain and
DevOps Security Practices project description at https://www.nccoe.nist.gov/projects/software-supply-chain-and-devops-security-practices:
Free and open source software development
Closed source software development
In their letters of interest, responding organizations need to
acknowledge the importance of and commit to provide:
1. Access for all participants' project teams to DevOps component
interfaces and the organization's experts necessary to make functional
connections among DevOps components.
2. Support for development and demonstration of the Software Supply
Chain and DevOps Security Practices project at the NCCoE, which will be
conducted in a manner consistent with the most recent version of the
following standards and guidance: Cybersecurity Supply Chain Risk
Management Practices for Systems and Organizations (NIST SP 800-161)
(https://doi.org/10.6028/NIST.SP.800-161r1), Framework for Improving
Critical Infrastructure Cybersecurity (Cybersecurity Framework)
(https://www.nist.gov/cyberframework/framework), and Secure Software
Development Framework (SSDF) (NIST SP 800-218) (https://doi.org/10.6028/NIST.SP.800-218). Additional details about the Software Supply
Chain and DevOps Security Practices project are available at https://www.nccoe.nist.gov/projects/software-supply-chain-and-devops-security-practices.
NIST cannot guarantee that all of the products proposed by
respondents will be used in the demonstration. Each prospective
participant will be expected to work collaboratively with NIST staff
and other project participants under the terms of the NCCoE consortium
CRADA in the development of the Software Supply Chain and DevOps
Security Practices project. Prospective participants' contribution to
the collaborative effort will include assistance in establishing the
necessary interface functionality, connection and set-up capabilities
and procedures, demonstration harnesses, environmental and safety
conditions for use, integrated platform user instructions, and
demonstration plans and scripts necessary to demonstrate the desired
capabilities. Each participant will train NIST personnel, as necessary,
to operate its product in capability demonstrations. Following
successful demonstrations, NIST will publish a description of the
DevSecOps proof-of-concept builds and their characteristics sufficient
to permit other organizations to develop and deploy DevSecOps practices
that meet the objectives of the Software Supply Chain and DevOps
Security Practices project. These descriptions will be public
information.
Under the terms of the NCCoE consortium CRADA, NIST will support
development of interfaces among participants' products by providing IT
infrastructure, laboratory facilities, office facilities, collaboration
facilities, and staff support to component composition, platform
documentation, and demonstration activities.
The dates of the demonstration of the Software Supply Chain and
DevOps Security Practices project capability will
[[Page 30950]]
be announced on the NCCoE website at least two weeks in advance at
https://nccoe.nist.gov/. The expected outcome will demonstrate how the
components of the solutions that address Software Supply Chain and
DevOps Security Practices can enhance capabilities that provide
assurance of management of identified risks while continuing to meet
industry sectors' compliance requirements. Participating organizations
will gain from the knowledge that their products are interoperable with
other participants' offerings.
For additional information on the NCCoE governance, business
processes, and NCCoE operational structure, visit the NCCoE website
https://nccoe.nist.gov/.
Alicia Chambers,
NIST Executive Secretariat.
[FR Doc. 2023-10221 Filed 5-12-23; 8:45 am]
BILLING CODE 3510-13-P