Software Security
DETAIL

U.S. CISA Secure Software Development Attestation Form (SSDAF) — Secure Software Self-Attestation Requirements

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting.
Framework text may require a separate license unless explicitly provided.

Overview

The U.S. CISASecure Software Development Attestation Form (SSDAF) — SecureSoftware Self-Attestation Requirements is a federal cybersecuritycompliance requirement that enables organizations to formally attestto the use of secure software development practices when supplyingsoftware to the U.S. government. This form supports the government’sinitiative to reduce software supply chain risks and strengthennational cybersecurity posture.

Published by theCybersecurity and Infrastructure Security Agency (CISA), the SSDAFapplies to federal contractors, software vendors, and suppliersaiming to provide software or software services to governmentagencies. It covers secure software development controls, riskmanagement practices, and compliance with guidance such as ExecutiveOrder 14028 and related NIST standards.

Organizationscomplete the SSDAF by documenting and attesting to theirimplementation of secure software development controls, aligningtheir practices with CISA and NIST guidance. Integrating SSDAFrequirements into software development lifecycles, securitydocumentation, and vendor risk management programs supportsregulatory compliance and provides assurance to federal buyers.

Why it Matters

The U.S. CISASecure Software Development Attestation Form (SSDAF) strengthenstrust by ensuring organizations follow secure software developmentpractices and regulatory requirements.

Key benefitsinclude:

•  Support stronger supply chain security

Require softwareproviders to attest to secure development, limiting risks fromthird-party software procurement and integration.

•  Enhance regulatory compliance

Enableorganizations to demonstrate alignment with federal cybersecuritystandards, improving their ability to meet compliance obligationsduring audits.

•  Increase software transparency

Promote greatervisibility into suppliers' development practices, enabling informedrisk management and procurement decisions.

•  Improve incident response readiness

Mandate securedevelopment controls that reduce exploitable vulnerabilities andsupport more effective detection and remediation of software-basedthreats.

•  Strengthen organizational reputation

Provideassurance to customers and stakeholders regarding the securityintegrity of deployed software products and internal developmentprocesses.

How it Works

The U.S. CISASecure Software Development Attestation Form (SSDAF) structuressecure software development requirements around a set of securitycontrols, process safeguards, and regulatory criteria aligned withexecutive orders and federal guidelines. The framework establishes aformal lifecycle for assessing software supply chain risks andcodifies key security practices into defined domains such as sourcecode integrity, vulnerability management, and secure developmentmethods. Organizations are required to self-attest to theimplementation of these controls as part of compliance with federalprocurement requirements.

In practice,organizations apply the SSDAF by integrating its control requirementsinto their secure development lifecycle (SDLC), mapping theframework’s standards to internal governance policies, andconducting regular compliance assessments. Security teams implementcontrols such as code review processes, automated vulnerabilityscanning, and developer training to address compliance gaps. Ongoingmonitoring and document collection support continuous alignment withSSDAF expectations and facilitate timely incident response andremediation.

ThroughSmartSuite, organizations streamline SSDAF operationalization byleveraging pre-built control libraries tailored to secure softwaredevelopment, managing risks within configurable registers, andenforcing policy governance workflows. The platform’s evidencecollection features support audit readiness, while compliancetracking modules and reporting dashboards enable ongoing monitoringof software supply chain security practices and regulatory adherence.

Key Elements

•  Secure Software Development Practices

Specifiesrequired processes for building software that address securityconsiderations throughout the development lifecycle.

•  Supplier Risk Management Controls

Outlinesmechanisms for evaluating and managing third-party and supply chainsoftware risks.

•  Secure Software Design Standards

Establishesminimum standards for secure architecture and coding within developedapplications.

•  Vulnerability Management Requirements

Describesprocedures for identifying, disclosing, and remediatingvulnerabilities in delivered software.

•  Continuous Monitoring Activities

Provides forongoing oversight and review of software to ensure continuedcompliance with security requirements.

•  Attestation and Documentation Processes

Definesnecessary evidence and documentation to support self-attestation ofsecure software development.

Framework Scope

The U.S. CISASecure Software Development Attestation Form (SSDAF) is adopted bysoftware producers contracting with U.S. federal agencies, addressingthe development and delivery of secure software running on federalinformation systems and cloud services. Organizations typicallycomplete the SSDAF when demonstrating control effectiveness andmeeting federal supply chain security requirements.

Framework Objectives

The U.S. CISASecure Software Development Attestation Form (SSDAF) defines keyoutcomes for secure software practices and organizational compliance.

•  Strengthen cybersecurity governance through formalized securesoftware development processes

•  Enhance risk management by addressing vulnerabilities insoftware supply chains

•  Promote regulatory compliance with federal security and privacyrequirements

•  Improve data protection through implementation of robustsecurity controls

•  Support operational resilience by ensuring software integrityand trustworthiness

•  Demonstrate audit readiness and transparency in softwaredevelopment practices The U.S. CISA Secure Software DevelopmentAttestation Form (SSDAF) aligns with secure development practicesfound in NIST SP 800-218, NIST SP 800-53, and the OWASP SoftwareAssurance Maturity Model. Organizations typically implement SSDAF tofulfill federal procurement requirements, regulatory compliance, orto demonstrate secure software development practices to governmentcustomers.

Common Framework Mappings

The U.S. CISASecure Software Development Attestation Form is often mapped torecognized software security and risk management frameworks todemonstrate comprehensive security practices, ensure regulatoryalignment, and streamline compliance reporting.

Mappedframeworks include:

CIS CriticalSecurity Controls

FedRAMP

ISO/IEC 27001

ISO/IEC 27002

NISTCybersecurity Framework

NIST SP 800-161

NIST SP 800-218Secure Software Development Framework (SSDF)

NIST SP 800-53

PCI DSS

SOC 2

At a Glance
CISA Secure Software Development Attestation Form (SSDAF)
  • checklist
    Classicifation
    Category
    info
    Software Security
    Domain
    info
    Software Security
    Framework Family
    info
    Other
  • info
    Regulatory Context
    Type
    info
    Guidance
    Legal Instrument
    info
    Program
    Sector
    info
    Cross-Sector
    Industry
    info
    Cross-Industry
  • arrow_upload_ready
    Region / Publisher
    Region
    info
    North America
    Region Detail
    info
    United States
    Publisher
    info
    Cybersecurity and Infrastructure Security Agency (CISA)
  • published_with_changes
    Versioning
    Version
    info
    2024
    Effective Date
    info
    March 11, 2024
    Issue Date
    info
    March 11, 2024
  • graph_3
    Adoption
    Adoption Model
    info
    Regulatory Compliance
    Implementation Complexity
    info
    Moderate
  • captive_portal
    Official Reference
License Information

License included / downloadable: Yes

CISA publishes the SSDAF on its website and is publicly available for free download from the U.S. CISA. License included with platform

Official Resources
CISA Secure Software Development Attestation Form
Defines self-attestation requirements for secure software development under U.S. CISA guidance.
chevron_forward
CISA Secure Software Development Framework
Provides guidelines for employing secure software development practices to enhance security resilience.
chevron_forward
CISA Cybersecurity and Infrastructure Security Guidance
Outlines implementation guidance focused on cybersecurity best practices for infrastructure security.
chevron_forward
SMARTSUITE

How SmartSuite Supports CISA SSDAF

Manage secure software development attestations required by U.S. federal agencies by organizing SSDAF requirements, tracking development practices, and maintaining evidence supporting secure software supply chain assurances.

Secure Development Requirement Library

Structure SSDAF secure software development requirements with mapped controls and responsible owners.

Secure Software Development Lifecycle Governance

Track security activities across design, coding, testing, and deployment stages of software development.

Vulnerability and Dependency Management

Monitor software vulnerabilities, open-source dependencies, and remediation workflows across development pipelines.

Build Integrity and Release Governance

Document build processes, code signing, artifact integrity checks, and release approvals.

Third-Party Software and SBOM Tracking

Track third-party software components, vendor security attestations, and SBOM documentation.

SSDAF Federal Software Security Attestation Readiness

Provide dashboards showing SSDAF requirement coverage, evidence status, and readiness for federal software security attestations.

Related frameworks

CIS Controls v8.1

CIS Controls v8.1 provides prioritized, practical security actions to help organizations mitigate common cyber threats and strengthen defenses.

Learn More
arrow_forward
FedRAMP Rev. 5

FedRAMP standardizes security requirements to assess, authorize, and continuously monitor cloud services that handle U.S. federal data.

Learn More
arrow_forward
ISO 27001:2022

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

Learn More
arrow_forward
ISO 27002:2022

ISO/IEC 27002:2022 provides best-practice information security controls to help organizations select, implement, and manage protections for information assets.

Learn More
arrow_forward
NIST 800-171 Rev.2

NIST SP 800-171 defines security requirements for protecting Controlled Unclassified Information (CUI) in nonfederal systems and organizations.

Learn More
arrow_forward
NIST 800-53 Rev.5

NIST SP 800-53 Rev. 5 provides a catalog of security and privacy controls to manage risks to information systems.

Learn More
arrow_forward
NIST CSF 2.0

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.

Learn More
arrow_forward
SOC 2

SOC 2 assesses and reports on a service organization's controls for security, availability, processing integrity, confidentiality, and privacy.

Learn More
arrow_forward
ONBOARDING FAQS

Frequently Asked Questions For U.S. CISA Secure Software Development Attestation Form (SSDAF)

What is the CISA Secure Software Development Attestation Form (SSDAF) used for?

The SSDAF is used to confirm that software producers have implemented secure software development practices as required under U.S. federal guidance, particularly for software provided to federal agencies. The form is designed to promote transparency and accountability by requiring organizations to self-attest to their software security practices.

Is completion of the SSDAF mandatory for software vendors?

Yes, completion and submission of the SSDAF is mandatory for organizations wishing to provide software to U.S. federal agencies, in line with Executive Order 14028 and OMB Memorandum M-22-18. Non-compliance can result in disqualification from federal procurement processes.

Which organizations or software products fall within the scope of the SSDAF?

The SSDAF applies to all software producers whose products are used by U.S. federal agencies, including both commercial off-the-shelf and custom-developed software. It covers both new and existing software that is subject to federal acquisition.

What key requirements or artifacts are needed to fulfill the SSDAF?

Organizations must provide a completed attestation form and demonstrate adherence to secure software development practices, such as threat modeling, code review, vulnerability remediation, and supply chain security. Evidence may include documentation of policies, procedures, and technical controls supporting secure development.

How should organizations implement SSDAF requirements?

Organizations should align their software development lifecycle with secure-by-design principles, integrating security controls such as secure coding standards, automated security testing, and third-party component risk assessments. Regular training and process reviews are also essential to ensuring continued compliance.

How does the SSDAF relate to other security frameworks or standards?

The SSDAF draws on requirements from frameworks such as NIST SP 800-218 (Secure Software Development Framework) and aligns with federal security mandates, but it does not replace other certification regimes (like FedRAMP or FISMA). Organizations may reference existing controls and processes already implemented under these standards when completing the SSDAF.

What are the ongoing compliance requirements after submitting the SSDAF?

Organizations must maintain secure software development practices continuously and update their attestation as changes occur. Periodic review, monitoring for emerging threats, and ongoing documentation are required to remain compliant with SSDAF obligations.

How would SmartSuite support U.S. CISA Secure Software Development Attestation Form (SSDAF)?

SmartSuite can assist organizations in managing SSDAF compliance by providing centralized tracking of risks and controls, managing evidence collection across development teams, and supporting audit readiness with robust documentation. Automated workflows and reporting capabilities streamline ongoing compliance and demonstrate adherence to SSDAF requirements to auditors and regulators.

NEXT STEP

Put CRI Profile into action with SmartSuite

Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

Explore in SmartSuite
chevron_forward
View all Frameworks
chevron_forward