Request for Information on Open-Source Software Security: Areas of Long-Term Focus and Prioritization, 54315-54317 [2023-17239]

Download as PDF Federal Register / Vol. 88, No. 153 / Thursday, August 10, 2023 / Notices Notice of proposed settlement; request for public comment. ACTION: In accordance with the requirements of the Comprehensive Environmental Response, Compensation, and Liability Act of 1980, as amended (‘‘CERLCA’’), notice is hereby given that a proposed CERCLA Cashout Settlement Agreement for Peripheral Parties (‘‘Proposed Agreement’’) associated with the Colorado Smelter Superfund Site, Pueblo, Colorado (‘‘Site’’) was executed by the U.S. Environmental Protection Agency (‘‘EPA’’), Region 8 and is now subject to public comment, after which EPA may modify or withdraw its consent if comments received disclose facts or considerations that indicate that the Proposed Agreement is inappropriate, improper, or inadequate. DATES: Comments must be submitted on or before September 11, 2023. ADDRESSES: The Proposed Agreement and additional background information relating to the agreement will be available upon request. Any comments or requests or for a copy of the Proposed Agreement should be addressed to Julie Nicholson, Enforcement Specialist, Superfund and Emergency Management Division, Environmental Protection Agency—Region 8, Mail Code 8SEM– PAC, 1595 Wynkoop Street, Denver, Colorado 80202, telephone number: (401) 714–6143, email address: nicholson.julie@epa.gov, and should reference the Colorado Smelter Superfund Site. You may also send comments, identified by Docket ID No. EPA–R08– SFUND–2023–0366, to https:// www.regulations.gov. Follow the online instructions for submitting comments. FOR FURTHER INFORMATION CONTACT: Sarah Rae, Senior Assistant Regional Counsel, Office of Regional Counsel, Environmental Protection Agency, Region 8, Mail Code 8ORC–LEC, 1595 Wynkoop, Denver, Colorado 80202, telephone number: (303) 312–6839, email address: rae.sarah@epa.gov. SUPPLEMENTARY INFORMATION: The Proposed Agreement would resolve potential EPA claims under section 107(a) of CERCLA, against 1000 South Santa Fe LLC and 1100 South Santa Fe LLC(‘‘Settling Parties’’) for EPA response costs at or in connection with the property located at 1101–1109 Santa Fe Avenue and 1045–1049 South Santa Fe Avenue, in Pueblo, Colorado (the ‘‘Property’’), which is part of the Colorado Smelter Superfund Site. The settlement is estimated to be $646,100, plus an additional sum for interest on that amount calculated from the ddrumheller on DSK120RN23PROD with NOTICES1 SUMMARY: VerDate Sep<11>2014 17:28 Aug 09, 2023 Jkt 259001 effective date through the date of payment (‘‘Payment Amount’’). Settling Parties will remit the Payment Amount to EPA upon the transfer of the Property or within three years of the effective date, whichever occurs earlier. The Proposed Settlement Agreement also provides a covenant not to sue or to take administrative action from the United States to the Settling Parties pursuant to sections 106 and 107(a) of CERCLA, 42 U.S.C. 9606 and 9607(a) with regard to Operable Unit 02 (OU2). For thirty (30) days following the date of publication of this document, EPA will receive electronic comments relating to the Proposed Agreement. EPA’s response to any comments received will be available for public inspection by request. Please see the ADDRESSES section of this document for instructions. Ben Bielenberg, Acting Division Director, Superfund and Emergency Management Division, Region 8. [FR Doc. 2023–17174 Filed 8–9–23; 8:45 am] BILLING CODE 6560–50–P EXECUTIVE OFFICE OF THE PRESIDENT Office of the National Cyber Director [Docket ID: ONCD–2023–0002] RIN 0301–AA01 Request for Information on OpenSource Software Security: Areas of Long-Term Focus and Prioritization Office of the National Cyber Director, Executive Office of the President, Cybersecurity and Infrastructure Security Agency, DHS, National Science Foundation, Defense Advanced Research Projects Agency, and Office of Management and Budget, Executive Office of the President. ACTION: Request for information (RFI). AGENCY: The Office of the National Cyber Director (ONCD), the Cybersecurity Infrastructure Security Agency (CISA), the National Science Foundation (NSF), the Defense Advanced Research Projects Agency (DARPA), and the Office of Management and Budget (OMB) invite public comments on areas of long-term focus and prioritization on open-source software security. DATES: Comments must be received in writing by 5 p.m. ET October 9, 2023. ADDRESSES: Interested parties may submit comments through www.regulations.gov. For detailed instructions on submitting comments SUMMARY: PO 00000 Frm 00027 Fmt 4703 Sfmt 4703 54315 and additional information on this process, see the SUPPLEMENTARY INFORMATION section of this document. FOR FURTHER INFORMATION CONTACT: Requests for additional information may be sent to: OS3IRFI@ncd.eop.gov, Nasreen Djouini, telephone: 202–881– 4697. SUPPLEMENTARY INFORMATION: As highlighted in the National Cybersecurity Strategy (https:// www.whitehouse.gov/wp-content/ uploads/2023/03/NationalCybersecurity-Strategy-2023.pdf), and its Implementation Plan Initiative 4.2.1, the ONCD has established an OpenSource Software Security Initiative (OS3I) to champion the adoption of memory safe programming languages and open-source software security. The security and resiliency of open-source software is a national security, economic, and a technology innovation imperative. Because open-source software plays a vital and ubiquitous role across the Federal Government and critical infrastructure,1 vulnerabilities in open-source software components may cause widespread downstream detrimental effects. The Federal Government recognizes the immense benefits of open-source software, which enables software development at an incredible pace and fosters significant innovation and collaboration. In light of these factors, as well as the status of open-source software as a free public good, it may be appropriate to make open-source software a national public priority to help ensure the security, sustainability, and health of the opensource software ecosystem. In 2021, following the aftermath of the Log4Shell vulnerability, ONCD in collaboration with the Office of Management and Budget’s (OMB) Office of the Federal Chief Information Officer (OFCIO), established the Open-Source Software Security Initiative (OS3I) interagency working group with the goal of channeling government resources to foster greater open-source software security. Since then, OS3I has welcomed many other interagency partners, including the Cybersecurity Infrastructure Security Agency (CISA), the National Science Foundation (NSF), Defense Advanced Research Projects Agency (DARPA), National Institute of Standards and Technology (NIST), 1 ‘‘2023 Open-Source Security and Risk Analysis Report,’’ Synopsys, February 22, 2023, (https:// www.synopsys.com/software-integrity/resources/ analyst-reports/open-source-security-riskanalysis.html?utm_source=bing&utm_ medium=cpc&utm_term=&utm_campaign=B_S_ OSSRA_BMM&cmp=ps-SIG-B_S_OSSRA_ BMM&msclkid=15e8216ad16511c8b 01945c7b683c395). E:\FR\FM\10AUN1.SGM 10AUN1 54316 Federal Register / Vol. 88, No. 153 / Thursday, August 10, 2023 / Notices ddrumheller on DSK120RN23PROD with NOTICES1 Center for Medicare & Medicaid Services (CMS), and Lawrence Livermore National Laboratory (LLNL) in order to identify open-source software security priorities and implement policy solutions. Over the past year, OS3I identified several focus areas, including: (1) reducing the proliferation of memory unsafe programming languages; (2) designing implementation requirements for secure and privacy-preserving security attestations; and (3) identifying new focus areas for prioritization. This Request for Information (RFI) aims to further the work of OS3I by identifying areas most appropriate to focus government priorities, and addressing critical questions such as: • How should the Federal Government contribute to driving down the most important systemic risks in open-source software? • How can the Federal Government help foster the long-term sustainability of open-source software communities? • How should open-source software security solutions be implemented from a technical and resourcing perspective? This RFI represents a continuation of OS3I’s efforts to gather input from a broad array of stakeholders. Three-Phase RFI Approach For this RFI, the Government intends to engage with interested parties in three phases: Phase I—Addressing Respondent Questions About this RFI • If you have any questions about the context of the Government’s RFI, the processes described, or the numbered topics below, you may send them to OS3IRFI@ncd.eop.gov by August 18, 2023. • By August 28, 2023, the Government will post responses to select questions on www.regulations.gov, as appropriate. Phase II—Submittal of Responses to the RFI by Interested Respondents • By October 9, 2023, all interested respondents should submit a written RFI response, in MS Word or PDF format, focusing on questions for which they have expertise and insights for the Government (no longer than 10 pages typed, size eleven font) to OS3IRFI@ ncd.eop.gov with the email subject header ‘‘Open-Source Software Security RFI Response’’ and your organization’s name. • Title page, cover letter, table of contents, and appendix are not included within the 10-page limit. In the body of the email, also include contact information for your organization (POC Name, Title, Phone, Email, Organization Name, and Organization Address). VerDate Sep<11>2014 17:28 Aug 09, 2023 Jkt 259001 Phase III—Government Review • The Government reviews and publishes the RFI responses submitted during Phase II. The Government may select respondents to engage with the RFI project team to elaborate on their response to the RFI. Participation, or lack thereof, in this RFI process has no bearing on a party’s ability or option to choose to participate in or receive an award for any future solicitation or procurement resulting from this or any other activity. Questions for Respondents We are seeking insights and recommendations as to how the Federal Government can lead, assist, or encourage other key stakeholders to advance progress in the potential areas of focus described below. Please consider providing input on these areas by addressing the questions below: • Which of the potential areas and sub-areas of focus described below should be prioritized for any potential action? Please describe specific policy solutions and estimated budget and timeline required for implementation. • What areas of focus are the most time-sensitive or should be developed first? • What technical, policy or economic challenges must the Government consider when implementing these solutions? • Which of the potential areas and sub-areas of focus described below should be applied to other domains? How might your policy solutions differ? Respondents are not required to respond to every topic and are encouraged to focus on specific areas that meet their specialized expertise. Potential Areas of Focus • Area: Secure Open-Source Software Foundations Æ Sub-area: Fostering the adoption of memory safe programming languages • Supporting rewrites of critical open-source software components in memory safe languages • Addressing software, hardware, and database interdependencies when refactoring open-source software to memory safe languages • Developing tools to automate and accelerate the refactoring of opensource software components to memory safe languages, including code verification techniques • Other solutions to support this subarea Æ Sub-Area: Reducing entire classes of vulnerabilities at scale • Increasing secure by default configurations for open-source PO 00000 Frm 00028 Fmt 4703 Sfmt 4703 Æ Æ • Æ Æ • Æ Æ Æ software development • Fostering open-source software development best practices, including but not limited to input validation practices • Identifying methods to incentivize scalable monitoring and verification efforts of open-source software by voluntary communities and/or public-private partnerships • Other solutions to support this subarea Sub-Area: Strengthening the software supply chain • Designing tools to enable secure, privacy-preserving security attestations from software vendors, including their suppliers and opensource software maintainers • Detection and mitigation of vulnerable and malicious software development operations and behaviors • Incorporating automated tracking and updates of complex code dependencies • Incorporating zero trust architecture into the open-source software ecosystem • Other solutions to support this subarea Sub-Area: Developer education • Integrating security and opensource software education into computer science and software development curricula • Training software developers on security best practices • Training software developers on memory safe programming languages • Other solutions to support this subarea Area: Sustaining Open-Source Software Communities and Governance Sustaining the open-source software ecosystem (including developer communities, non-profit investors, and academia) to ensure that critical open-source software components have robust maintenance plans and governance structures Other solutions to support this subarea Area: Behavioral and Economic Incentives to Secure the Open-Source Software cosystem Frameworks and models for software developer compensation that incentivize secure software development practices Applications of cybersecurity insurance and appropriately-tailored software liability as mechanisms to incentivize secure software development and operational environment practices Other solutions to support this subarea E:\FR\FM\10AUN1.SGM 10AUN1 ddrumheller on DSK120RN23PROD with NOTICES1 Federal Register / Vol. 88, No. 153 / Thursday, August 10, 2023 / Notices • Area: R&D/Innovation Æ Application of artificial intelligence and machine learning techniques to enhance and accelerate cybersecurity best practices with respect to secure software development Æ Other solutions to support this subarea • Area: International Collaboration Æ Methods for identifying and harmonizing shared international priorities and dependencies Æ Structures for intergovernmental collaboration and collaboration with various open-source software communities Æ Other solutions to support this subarea This RFI seeks public input as the Federal Government develops its strategy and action plan to strengthen the open-source software ecosystem. We hope that potential respondents will view this RFI as a civic opportunity to help shape the government’s thinking about open-source software security. Comments must be received no later than 5:00 p.m. ET October 9, 2023. By October 9, 2023, all interested respondents should submit a written RFI response, in MS Word or PDF format, with their answers to questions on which they have expertise and insights for the Government through www.regulations.gov. The written RFI response should address ONLY the topics for which the respondent has expertise. Inputs that meet most of the following criteria will be considered most valuable: • Easy for executives to review and understand: Content that is modularly organized and presented in such a fashion that it can be readily lifted (by topic area) and shared with relevant executive stakeholders in an easily consumable format. • Expert: The Government, through this effort, is seeking insights to understand current best practices and approaches applicable to the above topics, as well as new and emerging solutions. The written RFI response should address ONLY the topics for which the respondent has knowledge or expertise. • Clearly worded/not vague: Clear, descriptive, and concise language is appreciated. Please avoid generalities and vague statements. • Actionable: Please provide enough high-level detail so that we can understand how to apply the information you provide. Wherever possible, please provide credible data and specific examples to support your views. If you cite academic or other studies, they should be publicly available to be considered. VerDate Sep<11>2014 17:28 Aug 09, 2023 Jkt 259001 • Cost effective & impactful: Respondents should consider whether their suggestions have a clear return on investment that can be articulated to secure funding and support. • ‘‘Gordian Knot’’ solutions and ideas: Occasionally, challenges that seem to be intractable and overwhelmingly complex can be resolved with a change in perspective that unlocks hidden opportunities and aligns stakeholder interests. We welcome these ideas as well. • All submissions are public records and may be published on www.regulations.gov. Do NOT submit sensitive, confidential, or personally identifiable information. An additional appendix of no more than 5 pages long may also be included. This section should only include additional context about you or your organization. Privacy Act Statement Submission of comments is voluntary. The information will be used to determine focus and priority areas for open-source software security and memory-safety. Please note that all comments received in response to this notice will be posted in their entirety to https://www.regulations.gov, including any personal and business confidential information provided. Do not include any information you would not like to be made publicly available. Kemba E. Walden, Acting National Cyber Director. [FR Doc. 2023–17239 Filed 8–9–23; 8:45 am] BILLING CODE 3340–D3–P EXPORT-IMPORT BANK [Public Notice: 2023–6040] Agency Information Collection Activities; Submission to the Office of Management and Budget for Review and Approval; Comment Request; Annual Competitiveness Report Survey of Exporters and Lenders Export-Import Bank of the United States. ACTION: Notice of information collection; request for comment. AGENCY: The Export-Import Bank of the United States (EXIM), invites the general public and other Federal Agencies to comment on the proposed information collection, as required by the Paperwork Reduction Act of 1995. As required by Export-Import Bank Act of 1945 (see section 8A(a)(1) of EXIM’s charter), EXIM will survey U.S. exporters and commercial lending SUMMARY: PO 00000 Frm 00029 Fmt 4703 Sfmt 9990 54317 institutions to understand their experience with EXIM ‘‘meeting financial competition from other countries whose exporters compete with United States exporters.’’ EXIM plans to survey exporters and lenders that have engaged with EXIM on medium- and long-term support over the previous calendar year or responded to at least one of EXIM’s last two surveys. The potential respondents will be sent an electronic invitation to participate in the online survey. DATES: Comments should be received on or before October 10, 2023 to be assured of consideration. ADDRESSES: Comments may be submitted electronically on WWW.REGULATIONS.GOV (EIB 00–02) or by email Jessica.Ernst@exim.gov or by mail to Jessica Ernst, Export-Import Bank of the United States, 811 Vermont Ave. NW, Washington, DC 20571 Attn: OMB 3048–14–01. FOR FURTHER INFORMATION CONTACT: For specific questions related to collection activities, please contact Jessica Ernst, Jessica.Ernst@exim.gov, 202–565–3711. SUPPLEMENTARY INFORMATION: The proposed survey will ask participants about their potential or completed deals involving EXIM, their opinion of EXIM’s policies and procedures, their interaction and perceptions of other export credit agencies, and impacts of overall market conditions on their businesses. The survey can be reviewed at: https://img.exim.gov/s3fs-public/ EXIM+Competitiveness+ Report+Exporter+and+Lender+ Survey+2023.pdf. Titles and Form Number: EIB 00–02 Annual Competitiveness Report Survey of Exporters and Lenders. OMB Number: 3048–0004. Type of Review: Renewal. Need and Use: The information requested is required by the ExportImport Bank Act of 1945, as amended, 12 U.S.C. 635g–1 (see section 8A(a)(1) of EXIM’s charter) and enables EXIM to evaluate and assess its competitiveness with the programs and activities of official export credit agencies and to report on the Bank’s status in this regard. Affected Public: The number of respondents: 100. Estimated time per respondent: 15 minutes. The frequency of response: Annually. Annual hour burden: 25 total hours. Dated: August 4, 2023. Kalesha Malloy, IT Specialist. [FR Doc. 2023–17115 Filed 8–9–23; 8:45 am] BILLING CODE 6690–01–P E:\FR\FM\10AUN1.SGM 10AUN1

Agencies

[Federal Register Volume 88, Number 153 (Thursday, August 10, 2023)]
[Notices]
[Pages 54315-54317]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-17239]


=======================================================================
-----------------------------------------------------------------------

EXECUTIVE OFFICE OF THE PRESIDENT

Office of the National Cyber Director

[Docket ID: ONCD-2023-0002]
RIN 0301-AA01


Request for Information on Open-Source Software Security: Areas 
of Long-Term Focus and Prioritization

AGENCY: Office of the National Cyber Director, Executive Office of the 
President, Cybersecurity and Infrastructure Security Agency, DHS, 
National Science Foundation, Defense Advanced Research Projects Agency, 
and Office of Management and Budget, Executive Office of the President.

ACTION: Request for information (RFI).

-----------------------------------------------------------------------

SUMMARY: The Office of the National Cyber Director (ONCD), the 
Cybersecurity Infrastructure Security Agency (CISA), the National 
Science Foundation (NSF), the Defense Advanced Research Projects Agency 
(DARPA), and the Office of Management and Budget (OMB) invite public 
comments on areas of long-term focus and prioritization on open-source 
software security.

DATES: Comments must be received in writing by 5 p.m. ET October 9, 
2023.

ADDRESSES: Interested parties may submit comments through 
www.regulations.gov. For detailed instructions on submitting comments 
and additional information on this process, see the SUPPLEMENTARY 
INFORMATION section of this document.

FOR FURTHER INFORMATION CONTACT: Requests for additional information 
may be sent to: [email protected], Nasreen Djouini, telephone: 202-
881-4697.

SUPPLEMENTARY INFORMATION: As highlighted in the National Cybersecurity 
Strategy (https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf), and its Implementation Plan 
Initiative 4.2.1, the ONCD has established an Open-Source Software 
Security Initiative (OS3I) to champion the adoption of memory safe 
programming languages and open-source software security. The security 
and resiliency of open-source software is a national security, 
economic, and a technology innovation imperative. Because open-source 
software plays a vital and ubiquitous role across the Federal 
Government and critical infrastructure,\1\ vulnerabilities in open-
source software components may cause widespread downstream detrimental 
effects. The Federal Government recognizes the immense benefits of 
open-source software, which enables software development at an 
incredible pace and fosters significant innovation and collaboration. 
In light of these factors, as well as the status of open-source 
software as a free public good, it may be appropriate to make open-
source software a national public priority to help ensure the security, 
sustainability, and health of the open-source software ecosystem.
---------------------------------------------------------------------------

    \1\ ``2023 Open-Source Security and Risk Analysis Report,'' 
Synopsys, February 22, 2023, (https://www.synopsys.com/software-integrity/resources/analyst-reports/open-source-security-risk-analysis.html?utm_source=bing&utm_medium=cpc&utm_term=&utm_campaign=B_S_OSSRA_BMM&cmp=ps-SIG-B_S_OSSRA_BMM&msclkid=15e8216ad16511c8b01945c7b683c395).
---------------------------------------------------------------------------

    In 2021, following the aftermath of the Log4Shell vulnerability, 
ONCD in collaboration with the Office of Management and Budget's (OMB) 
Office of the Federal Chief Information Officer (OFCIO), established 
the Open-Source Software Security Initiative (OS3I) interagency working 
group with the goal of channeling government resources to foster 
greater open-source software security. Since then, OS3I has welcomed 
many other interagency partners, including the Cybersecurity 
Infrastructure Security Agency (CISA), the National Science Foundation 
(NSF), Defense Advanced Research Projects Agency (DARPA), National 
Institute of Standards and Technology (NIST),

[[Page 54316]]

Center for Medicare & Medicaid Services (CMS), and Lawrence Livermore 
National Laboratory (LLNL) in order to identify open-source software 
security priorities and implement policy solutions.
    Over the past year, OS3I identified several focus areas, including: 
(1) reducing the proliferation of memory unsafe programming languages; 
(2) designing implementation requirements for secure and privacy-
preserving security attestations; and (3) identifying new focus areas 
for prioritization.
    This Request for Information (RFI) aims to further the work of OS3I 
by identifying areas most appropriate to focus government priorities, 
and addressing critical questions such as:
     How should the Federal Government contribute to driving 
down the most important systemic risks in open-source software?
     How can the Federal Government help foster the long-term 
sustainability of open-source software communities?
     How should open-source software security solutions be 
implemented from a technical and resourcing perspective?
    This RFI represents a continuation of OS3I's efforts to gather 
input from a broad array of stakeholders.

Three-Phase RFI Approach

    For this RFI, the Government intends to engage with interested 
parties in three phases:

Phase I--Addressing Respondent Questions About this RFI

     If you have any questions about the context of the 
Government's RFI, the processes described, or the numbered topics 
below, you may send them to [email protected] by August 18, 2023.
     By August 28, 2023, the Government will post responses to 
select questions on www.regulations.gov, as appropriate.

Phase II--Submittal of Responses to the RFI by Interested Respondents

     By October 9, 2023, all interested respondents should 
submit a written RFI response, in MS Word or PDF format, focusing on 
questions for which they have expertise and insights for the Government 
(no longer than 10 pages typed, size eleven font) to 
[email protected] with the email subject header ``Open-Source 
Software Security RFI Response'' and your organization's name.
     Title page, cover letter, table of contents, and appendix 
are not included within the 10-page limit. In the body of the email, 
also include contact information for your organization (POC Name, 
Title, Phone, Email, Organization Name, and Organization Address).

Phase III--Government Review

     The Government reviews and publishes the RFI responses 
submitted during Phase II. The Government may select respondents to 
engage with the RFI project team to elaborate on their response to the 
RFI.
    Participation, or lack thereof, in this RFI process has no bearing 
on a party's ability or option to choose to participate in or receive 
an award for any future solicitation or procurement resulting from this 
or any other activity.

Questions for Respondents

    We are seeking insights and recommendations as to how the Federal 
Government can lead, assist, or encourage other key stakeholders to 
advance progress in the potential areas of focus described below.
    Please consider providing input on these areas by addressing the 
questions below:
     Which of the potential areas and sub-areas of focus 
described below should be prioritized for any potential action? Please 
describe specific policy solutions and estimated budget and timeline 
required for implementation.
     What areas of focus are the most time-sensitive or should 
be developed first?
     What technical, policy or economic challenges must the 
Government consider when implementing these solutions?
     Which of the potential areas and sub-areas of focus 
described below should be applied to other domains? How might your 
policy solutions differ?
    Respondents are not required to respond to every topic and are 
encouraged to focus on specific areas that meet their specialized 
expertise.

Potential Areas of Focus

 Area: Secure Open-Source Software Foundations
[cir] Sub-area: Fostering the adoption of memory safe programming 
languages
     Supporting rewrites of critical open-source software 
components in memory safe languages
     Addressing software, hardware, and database 
interdependencies when refactoring open-source software to memory safe 
languages
     Developing tools to automate and accelerate the 
refactoring of open-source software components to memory safe 
languages, including code verification techniques
     Other solutions to support this sub-area
[cir] Sub-Area: Reducing entire classes of vulnerabilities at scale
     Increasing secure by default configurations for open-
source software development
     Fostering open-source software development best practices, 
including but not limited to input validation practices
     Identifying methods to incentivize scalable monitoring and 
verification efforts of open-source software by voluntary communities 
and/or public-private partnerships
     Other solutions to support this sub-area
[cir] Sub-Area: Strengthening the software supply chain
     Designing tools to enable secure, privacy-preserving 
security attestations from software vendors, including their suppliers 
and open-source software maintainers
     Detection and mitigation of vulnerable and malicious 
software development operations and behaviors
     Incorporating automated tracking and updates of complex 
code dependencies
     Incorporating zero trust architecture into the open-source 
software ecosystem
     Other solutions to support this sub-area
[cir] Sub-Area: Developer education
     Integrating security and open-source software education 
into computer science and software development curricula
     Training software developers on security best practices
     Training software developers on memory safe programming 
languages
     Other solutions to support this sub-area
 Area: Sustaining Open-Source Software Communities and 
Governance
[cir] Sustaining the open-source software ecosystem (including 
developer communities, non-profit investors, and academia) to ensure 
that critical open-source software components have robust maintenance 
plans and governance structures
[cir] Other solutions to support this sub-area
 Area: Behavioral and Economic Incentives to Secure the Open-
Source Software cosystem
[cir] Frameworks and models for software developer compensation that 
incentivize secure software development practices
[cir] Applications of cybersecurity insurance and appropriately-
tailored software liability as mechanisms to incentivize secure 
software development and operational environment practices
[cir] Other solutions to support this sub-area

[[Page 54317]]

 Area: R&D/Innovation
[cir] Application of artificial intelligence and machine learning 
techniques to enhance and accelerate cybersecurity best practices with 
respect to secure software development
[cir] Other solutions to support this sub-area
 Area: International Collaboration
[cir] Methods for identifying and harmonizing shared international 
priorities and dependencies
[cir] Structures for intergovernmental collaboration and collaboration 
with various open-source software communities
[cir] Other solutions to support this sub-area

    This RFI seeks public input as the Federal Government develops its 
strategy and action plan to strengthen the open-source software 
ecosystem. We hope that potential respondents will view this RFI as a 
civic opportunity to help shape the government's thinking about open-
source software security.
    Comments must be received no later than 5:00 p.m. ET October 9, 
2023.
    By October 9, 2023, all interested respondents should submit a 
written RFI response, in MS Word or PDF format, with their answers to 
questions on which they have expertise and insights for the Government 
through www.regulations.gov.
    The written RFI response should address ONLY the topics for which 
the respondent has expertise. Inputs that meet most of the following 
criteria will be considered most valuable:
     Easy for executives to review and understand: Content that 
is modularly organized and presented in such a fashion that it can be 
readily lifted (by topic area) and shared with relevant executive 
stakeholders in an easily consumable format.
     Expert: The Government, through this effort, is seeking 
insights to understand current best practices and approaches applicable 
to the above topics, as well as new and emerging solutions. The written 
RFI response should address ONLY the topics for which the respondent 
has knowledge or expertise.
     Clearly worded/not vague: Clear, descriptive, and concise 
language is appreciated. Please avoid generalities and vague 
statements.
     Actionable: Please provide enough high-level detail so 
that we can understand how to apply the information you provide. 
Wherever possible, please provide credible data and specific examples 
to support your views. If you cite academic or other studies, they 
should be publicly available to be considered.
     Cost effective & impactful: Respondents should consider 
whether their suggestions have a clear return on investment that can be 
articulated to secure funding and support.
     ``Gordian Knot'' solutions and ideas: Occasionally, 
challenges that seem to be intractable and overwhelmingly complex can 
be resolved with a change in perspective that unlocks hidden 
opportunities and aligns stakeholder interests. We welcome these ideas 
as well.
     All submissions are public records and may be published on 
www.regulations.gov. Do NOT submit sensitive, confidential, or 
personally identifiable information.
    An additional appendix of no more than 5 pages long may also be 
included. This section should only include additional context about you 
or your organization.

Privacy Act Statement

    Submission of comments is voluntary. The information will be used 
to determine focus and priority areas for open-source software security 
and memory-safety. Please note that all comments received in response 
to this notice will be posted in their entirety to https://www.regulations.gov, including any personal and business confidential 
information provided. Do not include any information you would not like 
to be made publicly available.

Kemba E. Walden,
Acting National Cyber Director.
[FR Doc. 2023-17239 Filed 8-9-23; 8:45 am]
BILLING CODE 3340-D3-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.