Request for Comment on Software Identification Ecosystem Option Analysis, 73605-73607 [2023-23668]

Download as PDF ddrumheller on DSK120RN23PROD with NOTICES1 Federal Register / Vol. 88, No. 206 / Thursday, October 26, 2023 / Notices a currently approved information collection. In accordance with the requirements of the Paperwork Reduction Act of 1995, this notice seeks comments concerning information required by FEMA to revise National Flood Insurance Program Maps. DATES: Comments must be submitted on or before December 26, 2023. ADDRESSES: To avoid duplicate submissions to the docket, please submit comments at www.regulations.gov under Docket ID FEMA–2023–0029. Follow the instructions for submitting comments. All submissions received must include the agency name and Docket ID. Regardless of the method used to submitting comments or material, all submissions will be posted, without change, to the Federal eRulemaking Portal at https://www.regulations.gov, and will include any personal information you provide. Therefore, submitting this information makes it public. You may wish to read the Privacy and Security Notice that is available via a link on the homepage of www.regulations.gov. FOR FURTHER INFORMATION CONTACT: Brian Koper, Emergency Management Specialist, Engineering Services Branch, Risk Management Directorate, DHS/ FEMA, at Brian.Koper@fema.dhs.gov or 202–733–7859. You may contact the Information Management Division for copies of the proposed collection of information at email address: FEMAInformation-Collections-Management@ fema.dhs.gov. SUPPLEMENTARY INFORMATION: The National Flood Insurance Program (NFIP) is authorized by the National Flood Insurance Act of 1968, as amended, 42 U.S.C. 4001 et seq. The Federal Emergency Management Agency (FEMA) administers the NFIP and maintains the maps that depict flood hazard information. Communities are required to submit technical information concerning flood hazards and plans to avoid potential flood hazards when physical changes occur (see 44 CFR 65.3). Communities are provided the right to submit technical information when inconsistencies on maps are identified (see 44 CFR 65.4). In order to revise the Base (one-percent annual chance) Flood Elevations (BFEs), Special Flood Hazard Areas (SFHAs), and floodways presented on the NFIP maps, a community must submit scientific or technical data demonstrating the need for a revision. The NFIP regulations outline the data that must be submitted for these requests (see 44 CFR part 65). This collection serves to provide a standard VerDate Sep<11>2014 17:23 Oct 25, 2023 Jkt 262001 format for the general information requirements outlined in the NFIP regulations and helps establish an organized package of the data needed to revise NFIP maps. Collection of Information Title: Revision to National Flood Insurance Program Maps: Application Forms for LOMRs and CLOMRs. Type of Information Collection: Renewal of a currently approved information collection. OMB Number: 1660–0016. FEMA Forms: FEMA Form FF–206– FY–21–100 (formerly 086–0–27), Overview & Concurrence (Form 1); FEMA Form FF–206–FY–21–101 (formerly 086–0–27A), Riverine Hydrology & Hydraulics (Form 2); FEMA Form FF–206–FY–21–102 (formerly 086–0–27B), Riverine Structures (Form 3); FEMA Form FF– 206–FY–21–103 (formerly 086–0–27C), Coastal Analysis (Form 4); FEMA Form FF–206–FY–21–104 (formerly 086–0– 27D), Coastal Structures (Form 5); and FEMA Form FF–206–FY–21–105 (formerly 086–0–27E), Alluvial Fan Flooding (Form 6). Abstract: The forms in this information collection are used to determine if the collected data will result in the modification of Base Flood Elevations (BFEs), Special Flood Hazard Area (SFHA), or floodway. Once the information is collected, it is submitted to FEMA for review and is subsequently included on the National Flood Insurance Program (NFIP) maps. These maps will be used for flood insurance determinations and for floodplain management purposes. Affected Public: State, Local and Tribal Government, Business or Other For-Profit, Individuals or Households. Estimated Number of Respondents: 5,589. Estimated Number of Responses: 5,589. Estimated Total Annual Burden Hours: 14,633. Estimated Total Annual Respondent Cost: $1,082,824. Estimated Respondents’ Operation and Maintenance Costs: $26,430,000. Estimated Respondents’ Capital and Start-Up Costs: $0. Estimated Total Annual Cost to the Federal Government: $26,240. Comments Comments may be submitted as indicated in the ADDRESSES caption above. Comments are solicited to (a) evaluate whether the proposed data collection is necessary for the proper performance of the Agency, including whether the information shall have PO 00000 Frm 00023 Fmt 4703 Sfmt 4703 73605 practical utility; evaluate the accuracy of the Agency’s estimate of the burden of the proposed collection of information, including the validity of the methodology and assumptions used; (c) enhance the quality, utility, and clarity of the information to be collected; and (d) minimize the burden of the collection of information on those who are to respond, including through the use of appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology, e.g., permitting electronic submission of responses. Millicent Brown Wilson, Records Management Branch Chief, Office of the Chief Administrative Officer, Mission Support, Federal Emergency Management Agency, Department of Homeland Security. [FR Doc. 2023–23667 Filed 10–25–23; 8:45 am] BILLING CODE 9110–12–P DEPARTMENT OF HOMELAND SECURITY [CISA–2023–0026] Request for Comment on Software Identification Ecosystem Option Analysis Cybersecurity and Infrastructure Security Agency, Department of Homeland Security. ACTION: Notice; request for information. AGENCY: The Cybersecurity and Infrastructure Security Agency (CISA) announces the publication of ‘‘Software Identification Ecosystem Option Analysis,’’ which is a white paper on software identification ecosystems and requests public comment on the paths forward identified by the paper and on the analysis of the merits and challenges of the software identifier ecosystems discussed. Additionally, CISA requests input on analysis or approaches currently absent from the paper. DATES: Written comments are requested on or before December 11, 2023. Submissions received after that date may not be considered. ADDRESSES: You may send comments, identified by CISA–2023–0026, by any of the following methods: • Federal eRulemaking Portal: https:// www.regulations.gov. Follow the instructions for sending comments. Instructions: All submissions received must include the words ‘‘Cybersecurity and Infrastructure Security Agency’’ and the docket number for this action. Comments received will be posted without alteration at https:// SUMMARY: E:\FR\FM\26OCN1.SGM 26OCN1 73606 Federal Register / Vol. 88, No. 206 / Thursday, October 26, 2023 / Notices www.regulations.gov, including any personal information provided. Docket: For access to the docket and comments received, please go to www.regulations.gov and enter docket number CISA–2023–0026. To submit comments electronically: 1. Go to www.regulations.gov, and enter CISA–2023–0026 in the search field, 2. Click the ‘‘Comment Now!’’ icon, complete the required fields, and 3. Enter or attach your comments. All submissions, including attachments and other supporting materials, will become part of the public record and may be subject to public disclosure. CISA reserves the right to publish relevant comments publicly, unedited and in their entirety. Do not include personal information, such as account numbers or Social Security numbers, or names of other individuals. Do not submit confidential business information or otherwise sensitive or protected information. All comments received will be posted to https:// www.regulations.gov. Commenters are encouraged to identify the number of the specific topic or topics that they are addressing. Commenters may access the ‘‘Software Identification Ecosystem Option Analysis’’ white paper on CISA’s website at: https://www.cisa.gov/ resources-tools/resources/softwareidentification-ecosystem-optionanalysis. FOR FURTHER INFORMATION CONTACT: Allan Friedman, 202–961–4349, sbom@ cisa.dhs.gov. SUPPLEMENTARY INFORMATION: I. Public Participation Interested persons are invited to comment on this notice by submitting written data, views, or arguments using the method identified in the ADDRESSES section. All members of the public, including, but not limited to, specialists in the field, academic experts, industry, public interest groups, and those with relevant economic expertise, are invited to comment. ddrumheller on DSK120RN23PROD with NOTICES1 II. Background Software identification is a key facilitator of effective vulnerability management. Software identifiers are labels for specific versions of software that conform to a defined format. An identifier enables users to track software in relation to other information, such as known vulnerabilities, mitigations for vulnerabilities, lists of approved or disallowed software, and adversary activities. An effective, harmonized software identification ecosystem will VerDate Sep<11>2014 17:23 Oct 25, 2023 Jkt 262001 facilitate greater automation, inventory visibility, and broader, more effective use of software bills of materials (SBOMs). The two key requirements for an effective software identification ecosystem are: 1. Timely availability of software identifiers across all software items; and 2. Software identifiers that support both precise identification and grouping of software items. Key challenges for an effective software identification ecosystem are: (1) uniformly and deterministically generating or locating the identifier for an unknown piece of software (discoverability); (2) distributing unique identifiers for software such that one identifier is not associated with multiple software or versions (precision); and (3) developing a mechanism by which software versions are associated with each other (grouping). The white paper evaluates the following key criteria for a successful software identifier format: 1. Identifiers all refer to a single variant of a given piece of software and support grouping expressions. 2. Identifiers are built to express a fine level of granularity with support for complete identifier enumeration. Three software identifier formats are starting points, based on their current use and future potential: Common Platform Enumeration (CPE): In a system based on CPE, a set of parties generate the software identifiers for the community. Each identifier is generated at a point in time and then distributed to the community. Package URLs (purl): In a system based on purl, any number of parties may generate software identifiers for the community. purl’s existing mechanisms for distributed identification generation also make it feasible as the foundation for a system with a searchable database, however its lack of uniformity presents challenges. OmniBOR: In a system built on OmniBOR, any party is able to derive a software’s identifier from an instance of a piece of software. These identifiers are mechanically generated based on inherent properties of a piece of software, which are available to anyone who has that piece of software. In some cases, these identifiers also contain information about the composition of the software, enabling further identification of its components. The white paper identifies six paths forward for a software identification ecosystem. Although the paths are individually evaluated, they are not mutually exclusive as a solution. PO 00000 Frm 00024 Fmt 4703 Sfmt 4703 1. Any party can generate a software’s identifier. Inherent identifiers are used. 2. Many parties generate software identifiers. The generators then push the software identifiers to the community through the distribution of the software. Defined software identifiers are used. 3. A central authority oversees and supports the many parties who generate and distribute software identifiers. Defined software identifiers are used. 4. An active management system other than a central authority oversees and supports the many parties that generate inherent identifiers. Defined identifiers are used. 5. In addition to a defined identifier scheme (Paths 2, 3, and 4) there is a standardized structure to characterize unknown software. Correlation is done using fuzzy-matching over the set of provided characteristics. 6. Many parties use multiple defined identifier formats to generate software identifiers. The ‘‘Software Identification Ecosystem Option Analysis’’ white paper identifies paths forward in solving the problem of software identification and explores the benefits and challenges of the various approaches, as well as the community or authority structure that would be needed to develop and sustain the identifier format ecosystem. In doing so, the white paper outlines the requirements and activities necessary to establish a harmonized software identification ecosystem to facilitate greater automation, inventory visibility, and the multi-faceted value proposition of broad adoption of Software Bill of Materials (SBOM). III. List of Topics for Commenters Commenters may access the ‘‘Software Identification Ecosystem Option Analysis’’ white paper on CISA’s website at: https://www.cisa.gov/ resources-tools/resources/softwareidentification-ecosystem-optionanalysis. CISA seeks comments on the following topics: (1) Key requirements for an effective software identification ecosystem (2) Merits and challenges of available software identifier formats (3) The viability of a system reliant on inherent identifiers or defined identifiers (4) The necessity of a central authority or other active managing body for a software identifier ecosystem (5) Methodology for division of software identification responsibilities in an ecosystem where multiple software identifier formats are used (6) Preferred paths forward E:\FR\FM\26OCN1.SGM 26OCN1 Federal Register / Vol. 88, No. 206 / Thursday, October 26, 2023 / Notices (7) Issues, challenges, or use cases not considered or addressed in the paper (8) Stakeholders that should be included in deliberation This notice is issued under the authority of 6 U.S.C. 652 and 659. performance-based pay adjustments or performance awards for career appointees. Composition of the specific PRBs will be determined on an ad hoc basis from among the individuals listed below: Eric Goldstein, Executive Assistant Director, Cybersecurity and Infrastructure Security Agency, Department of Homeland Security. Abdelall, Brenda Acosta, Juan L Adamcik, Carol A Aguilar, Max Anguilar, Raul Alfonso-Royals, Angelica Alles, Randolph D Almeida, Corina Anderson, Sandra D Antalis, Casie Antognoli, Anthony Armstrong, Gloria R Arratia, Juan Arvelo, Ivan J Baidwan, Hemant S Baker, Jeremy D Baker, Paul E Barksdale-Perry, Nicole C Baroukh, Nader Barrera, Staci A Basham, Craig Beattie, Brien Belcher, Brian C Berg, Peter B Berger, Katrina W Bhagowalia, Sanjeev Bible, Daniel A Bible, Kenneth Blackwell, Juliana J Bobich, Jeffrey M Borka, Robert Boulden, Laurie Boyd, John Brane, Michelle Braun, Jacob H Breitzke, Erik P Brewer, Julie S Bright, Andrea J Brito, Roberto Brown, Allen S Brown, Roger Browne, Rene E Brundage, Christopher Brundage, William Bryson, Tony Bucholtz, Kathleen L Buetow, Zephranie Bullock, Edna Burgess, Kenneth Burks, Atisha Burriesci, Kelli A Burrola, Francisco Bush, William B Cagen, Steven W Caine, Jeffrey Callahan, Mary Ellen Cameron, Michael K Canevari, Holly E Cantu, John Canty, Rachel E Cappello, Elizabeth A Carabin, David Carnes, Alexandra Carpio, Philip F Carraway, Melvin J Chaleki, Thomas D Charles, Marcos [FR Doc. 2023–23668 Filed 10–25–23; 8:45 am] BILLING CODE 9110–9P–P DEPARTMENT OF HOMELAND SECURITY FY 2023 Senior Executive Service Performance Review Boards Department of Homeland Security. ACTION: Notice. AGENCY: This notice announces the appointment of members of the FY 2023 Senior Executive Service (SES) Performance Review Boards (PRBs) for the Department of Homeland Security (DHS). The purpose of the PRBs is to make recommendations to the appointing authority (i.e., Component Head) on the performance of senior executives (career, noncareer, and limited appointees), including recommendation on performance ratings, performance-based pay adjustments, and performance awards. The PRBs will also make recommendations on the performance of Transportation Security Executive Service, Senior Level, and Scientific and Professional employees. To make its recommendations, the PRBs will review performance appraisals, initial summary ratings, any response by the employee, and any higher-level official’s recommendation. DATES: This Notice is applicable as of October 26, 2023. FOR FURTHER INFORMATION CONTACT: Christian Fajardo, Human Resources Specialist, Office of the Chief Human Capital Officer, christian.fajardo@ hq.dhs.gov, 771–200–0392. SUPPLEMENTARY INFORMATION: In accordance with 5 U.S.C. 4314(c) and 5 CFR 430.311, each agency must establish one or more PRBs to make recommendations to the appointing authority (i.e., Component Head) on the performance of its senior executives. Each PRB must consist of three or more members. More than one-half of the membership of a PRB must be SES career appointees when reviewing appraisals and recommending ddrumheller on DSK120RN23PROD with NOTICES1 SUMMARY: VerDate Sep<11>2014 17:23 Oct 25, 2023 Jkt 262001 List of Names (Alphabetical Order) PO 00000 Frm 00025 Fmt 4703 Sfmt 4703 Cheatle, Kimberly A Cheng, Wen-Ting Clark, Alaina Clark, Kenneth N Cleary, Jennifer S Cline, Richard K Cloe, David Clutter, Mason Cofield, Valerie Companion, Tod T Condon, John Cook, Charles Cooper, Ntina K Corle, Ryan Corrado, Janene M Cotter, Daniel Courey, Marc B Courtney, Paul Cox, Adam Cox, Debra S Cross, Catherine C Crumpacker, Jim H Cullen-Dunbar, Susan Cummings, Melanie Cunningham, John D Dainton, Albert J Dargan, John L Das, Sharmistha Davidson, Andrew Davidson, Johnathan Davidson, Michael J Dawson, Inga I Dawson, Mark De La O, Jennifer B Deloatch, Reshea Dembling, Ross W DeMella, Jill DeNayer, Larry C DiFalco, Frank J Dobitsch, Stephanie M Doherty, Stephanie Donahue, James L Doran, Thomas J Dorr, Robert Doyle, Kerry Dragani, Nancy J Dunlap, James Durst, Casey O Ederheimer, Joshua A Edwards, B. Roland Ellison, Jennifer Emrich, Matthew D Enriquez Mcdivitt, Myriam Escobar Carrillo, Felicia A Espinosa, Marsha Evetts, Mark V Feder, Steven Fenton, Jennifer M Ferraro, Nina M Fitzmaurice, Stacey D Fitzpatrick, Ronnyka Fluty, Larry D Fong, Heather Franklin, Tami K Fujimura, Paul Gabbrielli, Tina Gaches, Michael Gantt, Kenneth D Garcia, Bobby Gersten, David Giles, Thomas Gladwell, Angela R Glass, Veronica M Gorman, Chad M Gountanis, John Granger, Christopher E:\FR\FM\26OCN1.SGM 26OCN1 73607

Agencies

[Federal Register Volume 88, Number 206 (Thursday, October 26, 2023)]
[Notices]
[Pages 73605-73607]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-23668]


-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

[CISA-2023-0026]


Request for Comment on Software Identification Ecosystem Option 
Analysis

AGENCY: Cybersecurity and Infrastructure Security Agency, Department of 
Homeland Security.

ACTION: Notice; request for information.

-----------------------------------------------------------------------

SUMMARY: The Cybersecurity and Infrastructure Security Agency (CISA) 
announces the publication of ``Software Identification Ecosystem Option 
Analysis,'' which is a white paper on software identification 
ecosystems and requests public comment on the paths forward identified 
by the paper and on the analysis of the merits and challenges of the 
software identifier ecosystems discussed. Additionally, CISA requests 
input on analysis or approaches currently absent from the paper.

DATES: Written comments are requested on or before December 11, 2023. 
Submissions received after that date may not be considered.

ADDRESSES: You may send comments, identified by CISA-2023-0026, by any 
of the following methods:
     Federal eRulemaking Portal: https://www.regulations.gov. 
Follow the instructions for sending comments.
    Instructions: All submissions received must include the words 
``Cybersecurity and Infrastructure Security Agency'' and the docket 
number for this action. Comments received will be posted without 
alteration at https://

[[Page 73606]]

www.regulations.gov, including any personal information provided.
    Docket: For access to the docket and comments received, please go 
to www.regulations.gov and enter docket number CISA-2023-0026.
    To submit comments electronically:
    1. Go to www.regulations.gov, and enter CISA-2023-0026 in the 
search field,
    2. Click the ``Comment Now!'' icon, complete the required fields, 
and
    3. Enter or attach your comments.
    All submissions, including attachments and other supporting 
materials, will become part of the public record and may be subject to 
public disclosure. CISA reserves the right to publish relevant comments 
publicly, unedited and in their entirety. Do not include personal 
information, such as account numbers or Social Security numbers, or 
names of other individuals. Do not submit confidential business 
information or otherwise sensitive or protected information. All 
comments received will be posted to https://www.regulations.gov. 
Commenters are encouraged to identify the number of the specific topic 
or topics that they are addressing.
    Commenters may access the ``Software Identification Ecosystem 
Option Analysis'' white paper on CISA's website at: https://www.cisa.gov/resources-tools/resources/software-identification-ecosystem-option-analysis.

FOR FURTHER INFORMATION CONTACT: Allan Friedman, 202-961-4349, 
[email protected].

SUPPLEMENTARY INFORMATION: 

I. Public Participation

    Interested persons are invited to comment on this notice by 
submitting written data, views, or arguments using the method 
identified in the ADDRESSES section. All members of the public, 
including, but not limited to, specialists in the field, academic 
experts, industry, public interest groups, and those with relevant 
economic expertise, are invited to comment.

II. Background

    Software identification is a key facilitator of effective 
vulnerability management. Software identifiers are labels for specific 
versions of software that conform to a defined format. An identifier 
enables users to track software in relation to other information, such 
as known vulnerabilities, mitigations for vulnerabilities, lists of 
approved or disallowed software, and adversary activities. An 
effective, harmonized software identification ecosystem will facilitate 
greater automation, inventory visibility, and broader, more effective 
use of software bills of materials (SBOMs).
    The two key requirements for an effective software identification 
ecosystem are:
    1. Timely availability of software identifiers across all software 
items; and
    2. Software identifiers that support both precise identification 
and grouping of software items.
    Key challenges for an effective software identification ecosystem 
are: (1) uniformly and deterministically generating or locating the 
identifier for an unknown piece of software (discoverability); (2) 
distributing unique identifiers for software such that one identifier 
is not associated with multiple software or versions (precision); and 
(3) developing a mechanism by which software versions are associated 
with each other (grouping).
    The white paper evaluates the following key criteria for a 
successful software identifier format:
    1. Identifiers all refer to a single variant of a given piece of 
software and support grouping expressions.
    2. Identifiers are built to express a fine level of granularity 
with support for complete identifier enumeration.
    Three software identifier formats are starting points, based on 
their current use and future potential:
    Common Platform Enumeration (CPE): In a system based on CPE, a set 
of parties generate the software identifiers for the community. Each 
identifier is generated at a point in time and then distributed to the 
community.
    Package URLs (purl): In a system based on purl, any number of 
parties may generate software identifiers for the community. purl's 
existing mechanisms for distributed identification generation also make 
it feasible as the foundation for a system with a searchable database, 
however its lack of uniformity presents challenges.
    OmniBOR: In a system built on OmniBOR, any party is able to derive 
a software's identifier from an instance of a piece of software. These 
identifiers are mechanically generated based on inherent properties of 
a piece of software, which are available to anyone who has that piece 
of software. In some cases, these identifiers also contain information 
about the composition of the software, enabling further identification 
of its components.
    The white paper identifies six paths forward for a software 
identification ecosystem. Although the paths are individually 
evaluated, they are not mutually exclusive as a solution.
    1. Any party can generate a software's identifier. Inherent 
identifiers are used.
    2. Many parties generate software identifiers. The generators then 
push the software identifiers to the community through the distribution 
of the software. Defined software identifiers are used.
    3. A central authority oversees and supports the many parties who 
generate and distribute software identifiers. Defined software 
identifiers are used.
    4. An active management system other than a central authority 
oversees and supports the many parties that generate inherent 
identifiers. Defined identifiers are used.
    5. In addition to a defined identifier scheme (Paths 2, 3, and 4) 
there is a standardized structure to characterize unknown software. 
Correlation is done using fuzzy-matching over the set of provided 
characteristics.
    6. Many parties use multiple defined identifier formats to generate 
software identifiers.
    The ``Software Identification Ecosystem Option Analysis'' white 
paper identifies paths forward in solving the problem of software 
identification and explores the benefits and challenges of the various 
approaches, as well as the community or authority structure that would 
be needed to develop and sustain the identifier format ecosystem. In 
doing so, the white paper outlines the requirements and activities 
necessary to establish a harmonized software identification ecosystem 
to facilitate greater automation, inventory visibility, and the multi-
faceted value proposition of broad adoption of Software Bill of 
Materials (SBOM).

III. List of Topics for Commenters

    Commenters may access the ``Software Identification Ecosystem 
Option Analysis'' white paper on CISA's website at: https://www.cisa.gov/resources-tools/resources/software-identification-ecosystem-option-analysis. CISA seeks comments on the following topics:

(1) Key requirements for an effective software identification ecosystem
(2) Merits and challenges of available software identifier formats
(3) The viability of a system reliant on inherent identifiers or 
defined identifiers
(4) The necessity of a central authority or other active managing body 
for a software identifier ecosystem
(5) Methodology for division of software identification 
responsibilities in an ecosystem where multiple software identifier 
formats are used
(6) Preferred paths forward

[[Page 73607]]

(7) Issues, challenges, or use cases not considered or addressed in the 
paper
(8) Stakeholders that should be included in deliberation

    This notice is issued under the authority of 6 U.S.C. 652 and 659.

Eric Goldstein,
Executive Assistant Director, Cybersecurity and Infrastructure Security 
Agency, Department of Homeland Security.
[FR Doc. 2023-23668 Filed 10-25-23; 8:45 am]
BILLING CODE 9110-9P-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.