Request for Comment on Product Security Bad Practices Guidance, 83508-83509 [2024-23869]
Download as PDF
83508
Federal Register / Vol. 89, No. 200 / Wednesday, October 16, 2024 / Notices
of which would constitute a clearly
unwarranted invasion of personal
privacy.
Name of Committee: Division of Intramural
Research Board of Scientific Counselors,
NIAID.
Date: December 9–11, 2024.
Time: 8:00 a.m. to 10:15 a.m.
Agenda: To review and evaluate personnel
qualifications and performance, and
competence of individual investigators.
Address: National Institute of Allergy and
Infectious Diseases, National Institutes of
Health, Building 50, Conference Room 1227/
1233, 50 Center Drive, Bethesda, MD 20892.
Contact Person: Laurie Lewallen,
Committee Manager, Division of Intramural
Research, National Institute of Allergy and
Infectious Diseases, National Institutes of
Health, Building 33, Room 1N24, 33 North
Drive, Bethesda, MD 20892, 301–761–6362,
Laurie.Lewallen@nih.gov.
(Catalogue of Federal Domestic Assistance
Program Nos. 93.855, Allergy, Immunology,
and Transplantation Research; 93.856,
Microbiology and Infectious Diseases
Research, National Institutes of Health, HHS)
Dated: October 10, 2024.
Lauren A. Fleck,
Program Analyst, Office of Federal Advisory
Committee Policy.
[FR Doc. 2024–23836 Filed 10–15–24; 8:45 am]
BILLING CODE 4140–01–P
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
National Institutes of Health
National Institute on Drug Abuse;
Notice of Closed Meetings
lotter on DSK11XQN23PROD with NOTICES1
Pursuant to section 1009 of the
Federal Advisory Committee Act, as
amended, notice is hereby given of the
following meetings.
The meetings will be closed to the
public in accordance with the
provisions set forth in sections
552b(c)(4) and 552b(c)(6), title 5 U.S.C.,
as amended. The grant applications and
the discussions could disclose
confidential trade secrets or commercial
property such as patentable material,
and personal information concerning
individuals associated with the grant
applications, the disclosure of which
would constitute a clearly unwarranted
invasion of personal privacy.
Name of Committee: National Institute on
Drug Abuse Special Emphasis Panel;
Microglial Pathophysiology in Comorbid
Substance Use Disorder (SUD) and HIV.
Date: November 5, 2024.
Time: 2:00 p.m. to 3:00 p.m.
Agenda: To review and evaluate grant
applications.
Address: National Institute of Health,
National Institute on Drug Abuse, 301 North
Stonestreet Avenue, Bethesda, MD 20892.
Meeting Format: Virtual Meeting.
VerDate Sep<11>2014
16:43 Oct 15, 2024
Jkt 265001
Contact Person: Meysam Yazdankhah,
Ph.D., Scientific Review Officer, Scientific
Review Branch, Office of Extramural Policy,
National Institute on Drug Abuse, NIH, 301
North Stonestreet Avenue, MSC 6021,
Bethesda, MD 20892, (301) 402–6965,
meysam.yazdankhah@nih.gov.
Name of Committee: National Institute on
Drug Abuse Special Emphasis Panel;
Mechanistic Studies on Social Behavior in
Substance Use Disorder.
Date: November 19, 2024.
Time: 11:00 a.m. to 4:00 p.m.
Agenda: To review and evaluate grant
applications.
Address: National Institute of Health,
National Institute on Drug Abuse, 301 North
Stonestreet Avenue, Bethesda, MD 20892.
Meeting Format: Virtual Meeting.
Contact Person: Caitlin Elizabeth Angela
Moyer, Ph.D., Scientific Review Officer,
Scientific Review Branch, Office of
Extramural Policy, National Institute on Drug
Abuse, NIH, 301 North Stonestreet Avenue,
MSC 6021, Bethesda, MD 20892, (301) 443–
4577, caitlin.moyer@nih.gov.
Name of Committee: National Institute on
Drug Abuse Special Emphasis Panel; High
Priority HIV and Substance Use Research.
Date: November 20, 2024.
Time: 11:00 a.m. to 5:00 p.m.
Agenda: To review and evaluate grant
applications.
Address: National Institute of Health,
National Institute on Drug Abuse, 301 North
Stonestreet Avenue, Bethesda, MD 20892.
Meeting Format: Virtual Meeting.
Contact Person: Trinh T. Tran, Ph.D.,
Scientific Review Officer, Scientific Review
Branch, Office of Extramural Policy, National
Institute on Drug Abuse, NIH, 301 North
Stonestreet Avenue, MSC 6021, Bethesda,
MD 20892, (301) 827–5843, trinh.tran@
nih.gov.
(Catalogue of Federal Domestic Assistance
Program Nos. 93.277, Drug Abuse Scientist
Development Award for Clinicians, Scientist
Development Awards, and Research Scientist
Awards; 93.278, Drug Abuse National
Research Service Awards for Research
Training; 93.279, Drug Abuse and Addiction
Research Programs, National Institutes of
Health, HHS)
ACTION:
Dated: October 10, 2024.
Lauren A. Fleck,
Program Analyst, Office of Federal Advisory
Committee Policy.
I. Public Participation
Interested persons are invited to
comment on this notice by submitting
written data, views, or arguments using
the method identified in the
aforementioned ADDRESSES section. All
members of the public including, but
not limited to, specialists in the field,
academic experts, members of industry,
public interest groups, and those with
relevant economic expertise are invited
to comment.
[FR Doc. 2024–23837 Filed 10–15–24; 8:45 am]
BILLING CODE 4140–01–P
DEPARTMENT OF HOMELAND
SECURITY
[Docket No. CISA–2024–0028]
Request for Comment on Product
Security Bad Practices Guidance
Cybersecurity and
Infrastructure Security Agency (CISA),
Department of Homeland Security
(DHS).
AGENCY:
PO 00000
Frm 00063
Fmt 4703
Sfmt 4703
Notice of availability; request
for comment.
The Cybersecurity Division
(CSD) within the Cybersecurity and
Infrastructure Security Agency (CISA)
requests feedback on draft Product
Security Bad Practices guidance.
Additionally, CISA requests input on
analysis or approaches currently absent
from the guidance.
DATES: Written comments are requested
on or before December 2, 2024.
Submissions received after the deadline
for receiving comments may not be
considered.
ADDRESSES: You may submit comments,
identified by docket number CISA–
2024–0028, by following the
instructions below for submitting
comments via the Federal eRulemaking
Portal at https://www.regulations.gov.
Instructions: All comments received
must include the agency name and
docket number Docket Number CISA–
2024–0028. All comments received will
be posted without change to https://
www.regulations.gov, including any
personal information provided. CISA
reserves the right to publicly republish
relevant and unedited comments in
their entirety that are submitted to the
docket. Do not include personal
information such as account numbers,
social security numbers, or the names of
other individuals. Do not submit
confidential business information or
otherwise sensitive or protected
information.
Docket: For access to the docket to
read the draft Product Security Bad
Practices Guidance or comments
received, go to https://
www.regulations.gov.
FOR FURTHER INFORMATION CONTACT: Kirk
Lawrence; 202–617–0036;
SecureByDesign@cisa.dhs.gov.
SUPPLEMENTARY INFORMATION:
SUMMARY:
II. Background
In line with CISA’s Secure by Design
initiative, software manufacturers
should ensure security is a core
consideration from the onset of software
development. CISA’s draft, voluntary
E:\FR\FM\16OCN1.SGM
16OCN1
lotter on DSK11XQN23PROD with NOTICES1
Federal Register / Vol. 89, No. 200 / Wednesday, October 16, 2024 / Notices
Product Security Bad Practices guidance
provides an overview of product
security practices that are deemed
exceptionally risky, particularly for
organizations supporting critical
infrastructure or national critical
functions (NCFs), and it provides
recommendations for software
manufacturers to voluntarily mitigate
these risks. The guidance contained in
the document is non-binding, and while
CISA encourages organizations to avoid
these bad practices, the document
imposes no requirement on them to do
so.
The draft guidance is scoped to
software manufacturers who develop
software products and services,
including on-premises software, cloud
services, and software as a service
(SaaS), used in support of critical
infrastructure or NCFs.
By choosing to follow the
recommendations in the draft guidance,
manufacturers will signal to customers
that they are taking ownership of
customer security outcomes, a key
secure by design principle.
CISA strongly encourage all software
manufacturers to avoid the product
security bad practices included in the
Product Security Bad Practices
guidance. The Product Security Bad
Practices guidance is co-sealed with the
Federal Bureau of Investigation.
f. The product uses open-source
software components that have critical
known exploitable vulnerabilities.1
2. Security features, which describe
the security functionalities that a
product supports. Listed bad practices
are:
a. The baseline version of the product
does not support multi-factor
authentication.
b. The baseline version of the product
does not make audit logs available.
3. Organizational processes and
policies, which describe actions taken
by a software manufacturer to ensure
strong transparency in its approach to
security. Listed bad practices are:
a. The organization fails to publish
Common Vulnerabilities and Exposures
(CVEs) with Common Weakness
Enumerations (CWEs) in a timely
manner (or at all).
b. The organization fails to publish a
vulnerability disclosure policy.
CISA also welcomes comments on
other areas or approaches currently
absent from the guidance.
This notice is issued under the
authority of 6 U.S.C. 652 and 659.
III. List of Topics for Commenters
BILLING CODE 9111–LF–P
CISA seeks comments on the draft
Product Security Bad Practices
guidance, in the following three
categories. Note: the categories are
explained in detail in the draft guidance
itself, available at https://www.cisa.gov/
resources-tools/resources/productsecurity-bad-practices.
1. Product properties, which describe
the observable security-related qualities
of a software product itself. Listed bad
practices are:
a. A new product line is developed
using a memory unsafe language or the
manufacturer does not publish a
memory safety roadmap by January 1,
2026.
b. The product includes userprovided input directly in the raw
contents of a SQL database query string.
c. The product includes user-provided
input directly in the raw contents of an
operating system command string.
d. The product includes default
passwords.
e. The product contains, at the time of
release, a component with an
exploitable vulnerability present on
CISA’s Known Exploited Vulnerabilities
(KEV) Catalog.
VerDate Sep<11>2014
16:43 Oct 15, 2024
Jkt 265001
Jeffrey E. Greene,
Executive Assistant Director for
Cybersecurity, Cybersecurity and
Infrastructure Security Agency, Department
of Homeland Security.
[FR Doc. 2024–23869 Filed 10–15–24; 8:45 am]
DEPARTMENT OF HOMELAND
SECURITY
[Docket Number DHS–2024–0028]
Agency Information Collection
Activities: Office of the Immigration
Detention Ombudsman (OIDO) Intake
Form, DHS Form 405, OMB Control No.
1601–0030
Department of Homeland
Security (DHS).
ACTION: 60-Day notice and request for
comments.
AGENCY:
The Department of Homeland
Security will submit the following
Information Collection Request (ICR) to
the Office of Management and Budget
(OMB) for review and clearance in
accordance with the Paperwork
Reduction Act of 1995.
DATES: Comments are encouraged and
will be accepted until December 16,
SUMMARY:
1 A critical vulnerability is one that has an Attack
Vector of ‘‘network,’’ Privileges Required of
‘‘None,’’ does not require user interaction, and has
a ‘‘high’’ impact on at least two of the
Confidentiality, Integrity, and Availability loss
vectors.
PO 00000
Frm 00064
Fmt 4703
Sfmt 4703
83509
2024. This process is conducted in
accordance with 5 CFR 1320.1
ADDRESSES: You may submit comments,
identified by docket number Docket #
DHS–2024–0028, at:
Æ Federal eRulemaking Portal: https://
www.regulations.gov. Please follow the
instructions for submitting comments.
Instructions: All submissions received
must include the agency name and
docket number Docket # DHS–2024–
0028. All comments received will be
posted without change to https://
www.regulations.gov, including any
personal information provided.
Docket: For access to the docket to
read background documents or
comments received, go to https://
www.regulations.gov.
The
Department of Homeland Security’s
(DHS) Office of the Immigration
Detention Ombudsman (OIDO) is an
independent office tasked with
resolving individual complaints from or
about individuals in immigration
detention regarding the potential
violation of immigration detention
standards or other potential misconduct.
OIDO was established by Congress (sec.
106 of the Consolidated Appropriations
Act, 2020, Pub. L. 116–93).
DHS Form 405—‘‘Case Intake Form’’
is intended for use by individuals
wishing to submit a complaint to OIDO.
Information collected will provide the
office with details about the allegations
the submitter seeks to have OIDO
address. DHS is revising the information
collection to refine several questions in
Form 405 and to include an additional
form, ‘‘Privacy Waiver Authorizing
Disclosure to a Third Party’’.
Information collected on the ‘‘Privacy
Waiver Authorizing Disclosure to a
Third Party’’ will allow OIDO to
disclose permitted information to a
third party, such as the detained
individual’s relatives and/or
representatives.
The information collected on Form
405—‘‘Case Intake Form’’ allows OIDO
to identify: (1) the individual submitting
the complaint and their contact
information; (2) the detained individual
who is the subject of the complaint; (3)
the government-owned or contracted
facility where the individual is or was
detained and for how long; and (4)
relevant details about the complaint. All
of this information will be used by
OIDO to investigate, resolve, and if
appropriate, provide redress.
Based on usability testing
recommendations, DHS is revising Form
405. The form will be shortened by
reducing extraneous sections, such as
Question 12a (Category), Question 12b
SUPPLEMENTARY INFORMATION:
E:\FR\FM\16OCN1.SGM
16OCN1
Agencies
[Federal Register Volume 89, Number 200 (Wednesday, October 16, 2024)]
[Notices]
[Pages 83508-83509]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-23869]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
[Docket No. CISA-2024-0028]
Request for Comment on Product Security Bad Practices Guidance
AGENCY: Cybersecurity and Infrastructure Security Agency (CISA),
Department of Homeland Security (DHS).
ACTION: Notice of availability; request for comment.
-----------------------------------------------------------------------
SUMMARY: The Cybersecurity Division (CSD) within the Cybersecurity and
Infrastructure Security Agency (CISA) requests feedback on draft
Product Security Bad Practices guidance. Additionally, CISA requests
input on analysis or approaches currently absent from the guidance.
DATES: Written comments are requested on or before December 2, 2024.
Submissions received after the deadline for receiving comments may not
be considered.
ADDRESSES: You may submit comments, identified by docket number CISA-
2024-0028, by following the instructions below for submitting comments
via the Federal eRulemaking Portal at https://www.regulations.gov.
Instructions: All comments received must include the agency name
and docket number Docket Number CISA-2024-0028. All comments received
will be posted without change to https://www.regulations.gov, including
any personal information provided. CISA reserves the right to publicly
republish relevant and unedited comments in their entirety that are
submitted to the docket. Do not include personal information such as
account numbers, social security numbers, or the names of other
individuals. Do not submit confidential business information or
otherwise sensitive or protected information.
Docket: For access to the docket to read the draft Product Security
Bad Practices Guidance or comments received, go to https://www.regulations.gov.
FOR FURTHER INFORMATION CONTACT: Kirk Lawrence; 202-617-0036;
[email protected].
SUPPLEMENTARY INFORMATION:
I. Public Participation
Interested persons are invited to comment on this notice by
submitting written data, views, or arguments using the method
identified in the aforementioned ADDRESSES section. All members of the
public including, but not limited to, specialists in the field,
academic experts, members of industry, public interest groups, and
those with relevant economic expertise are invited to comment.
II. Background
In line with CISA's Secure by Design initiative, software
manufacturers should ensure security is a core consideration from the
onset of software development. CISA's draft, voluntary
[[Page 83509]]
Product Security Bad Practices guidance provides an overview of product
security practices that are deemed exceptionally risky, particularly
for organizations supporting critical infrastructure or national
critical functions (NCFs), and it provides recommendations for software
manufacturers to voluntarily mitigate these risks. The guidance
contained in the document is non-binding, and while CISA encourages
organizations to avoid these bad practices, the document imposes no
requirement on them to do so.
The draft guidance is scoped to software manufacturers who develop
software products and services, including on-premises software, cloud
services, and software as a service (SaaS), used in support of critical
infrastructure or NCFs.
By choosing to follow the recommendations in the draft guidance,
manufacturers will signal to customers that they are taking ownership
of customer security outcomes, a key secure by design principle.
CISA strongly encourage all software manufacturers to avoid the
product security bad practices included in the Product Security Bad
Practices guidance. The Product Security Bad Practices guidance is co-
sealed with the Federal Bureau of Investigation.
III. List of Topics for Commenters
CISA seeks comments on the draft Product Security Bad Practices
guidance, in the following three categories. Note: the categories are
explained in detail in the draft guidance itself, available at https://www.cisa.gov/resources-tools/resources/product-security-bad-practices.
1. Product properties, which describe the observable security-
related qualities of a software product itself. Listed bad practices
are:
a. A new product line is developed using a memory unsafe language
or the manufacturer does not publish a memory safety roadmap by January
1, 2026.
b. The product includes user-provided input directly in the raw
contents of a SQL database query string.
c. The product includes user-provided input directly in the raw
contents of an operating system command string.
d. The product includes default passwords.
e. The product contains, at the time of release, a component with
an exploitable vulnerability present on CISA's Known Exploited
Vulnerabilities (KEV) Catalog.
f. The product uses open-source software components that have
critical known exploitable vulnerabilities.\1\
---------------------------------------------------------------------------
\1\ A critical vulnerability is one that has an Attack Vector of
``network,'' Privileges Required of ``None,'' does not require user
interaction, and has a ``high'' impact on at least two of the
Confidentiality, Integrity, and Availability loss vectors.
---------------------------------------------------------------------------
2. Security features, which describe the security functionalities
that a product supports. Listed bad practices are:
a. The baseline version of the product does not support multi-
factor authentication.
b. The baseline version of the product does not make audit logs
available.
3. Organizational processes and policies, which describe actions
taken by a software manufacturer to ensure strong transparency in its
approach to security. Listed bad practices are:
a. The organization fails to publish Common Vulnerabilities and
Exposures (CVEs) with Common Weakness Enumerations (CWEs) in a timely
manner (or at all).
b. The organization fails to publish a vulnerability disclosure
policy.
CISA also welcomes comments on other areas or approaches currently
absent from the guidance.
This notice is issued under the authority of 6 U.S.C. 652 and 659.
Jeffrey E. Greene,
Executive Assistant Director for Cybersecurity, Cybersecurity and
Infrastructure Security Agency, Department of Homeland Security.
[FR Doc. 2024-23869 Filed 10-15-24; 8:45 am]
BILLING CODE 9111-LF-P