Framework

NIST SSDF
Secure Software Development Framework on one operating record

The NIST Secure Software Development Framework (SSDF), published as NIST SP 800-218 v1.1, is the consensus reference for what a software producer is expected to do across the development lifecycle. SSDF is the framework behind EO 14028 federal software supply chain expectations, the CISA Secure Software Development Attestation form (CISA SSDA), and the procurement reads buyers run against vendors. This page covers the four practice groups (PO, PS, PW, RV), the 19 practices and 42 tasks they decompose into, how SSDF sits next to OWASP SAMM, BSIMM, SLSA, SBOM, and ISO 27001, the audit evidence the framework expects, and how a workspace-driven approach turns SSDF into a defensible operating record rather than a one-off questionnaire.

No credit card required. Free plan available forever.

NIST SSDF (SP 800-218) explained

The NIST Secure Software Development Framework, published as NIST Special Publication 800-218 v1.1 in February 2022, is the consensus reference for the practices a software producer is expected to operate against. SSDF is not a maturity model and not a control catalogue; it is a named set of practices, broken into tasks, that a producer either implements or documents why a task does not apply. The framework reads as 19 practices and 42 tasks organised into four practice groups: PO (Prepare the Organization), PS (Protect the Software), PW (Produce Well-Secured Software), and RV (Respond to Vulnerabilities).

For internal AppSec teams, product security teams, GRC owners, security engineering teams, vulnerability management functions, and CISOs, SSDF is the vocabulary that lets a software producer communicate consistently across federal procurement reviews, the CISA Secure Software Development Attestation, audit committees, and enterprise customer security questionnaires. Producers already operating against ISO 27001, SOC 2, or NIST SP 800-53 do not migrate to SSDF; the framework reads as the software-producer-side practice catalogue the underlying control sets evidence.

The four practice groups: PO, PS, PW, RV

SSDF v1.1 organises the practice catalogue into four groups. Each group describes the operating intent rather than prescribing tooling, which is why the same reference reads against a producer using GitHub plus Semgrep, a producer using GitLab plus a different SAST, and a producer building on a self-hosted stack. The groups are sequential in dependency, not in calendar time: PO is the foundation, PS protects what the engineering work produces, PW is the engineering work, and RV closes the loop.

PO: Prepare the Organization

Establish the people, process, and technology preconditions for secure development. Define security requirements, assign roles and responsibilities, train the people who write and review code, document the toolchain, and implement supportive criteria for security checks. PO has 5 practices and 13 tasks; it is the foundation the rest of the framework reads against.

PS: Protect the Software

Protect the source, the artefacts, and the released versions from tampering and unauthorised access. PS.1 protects the source code. PS.2 provides a mechanism for verifying release integrity (digital signatures, hashes). PS.3 archives and protects each release so the producer can reproduce, analyse, and respond after release. PS has 3 practices and 6 tasks.

PW: Produce Well-Secured Software

Cover the engineering work itself. Design to meet security requirements (PW.1), review the design for risks (PW.2), reuse or acquire well-secured components (PW.4), follow secure coding practices (PW.5), harden the build and compilation chain (PW.6), review code (PW.7), test executable code (PW.8), and configure secure-by-default settings (PW.9). PW has 8 practices and 18 tasks; it is the largest practice group.

RV: Respond to Vulnerabilities

Close the loop between deployed software and the development organisation. RV.1 identifies and confirms vulnerabilities on an ongoing basis. RV.2 assesses, prioritises, and remediates. RV.3 analyses root cause and feeds the findings back into PO and PW. RV has 3 practices and 5 tasks; without it, PO/PS/PW produces shipping software with no operating link back to engineering when post-release issues arrive.

Example practices and tasks

SSDF practices decompose into tasks. The task is the unit the framework expects a producer to either implement, with documented evidence, or to explicitly document why the task does not apply. The sample below shows the level of specificity SSDF reads against; the full catalogue is in SP 800-218 Appendix A and reads similarly across the four groups.

  • PO.1.1: Identify and document security requirements for software development infrastructure and processes, and maintain them over time as the requirements change.
  • PO.3.2: Follow recommended security practices to deploy, operate, and maintain tools and toolchains. The toolchain itself is in scope, not only the software it produces.
  • PS.1.1: Store all forms of code (source code, executable code, configuration-as-code) based on the principle of least privilege so that only authorised personnel, tools, services, and accounts have the access necessary to perform their roles.
  • PS.2.1: Make software integrity verification information available to consumers of the software. Cryptographic hashes are the common implementation; digital signatures are the stronger one.
  • PS.3.1: Securely archive the necessary files and supporting data (provenance records, build artefacts, configuration, SBOM) for each software release so the producer can reproduce, analyse, and respond.
  • PW.4.1: Acquire and maintain well-secured software components from commercial, open-source, and other third-party developers for use in software development.
  • PW.7.1: Determine whether code review and/or code analysis should be used for human-readable code, and where in the development pipeline the review runs.
  • PW.8.2: Analyse the software through methods like dynamic application security testing, fuzzing, and penetration testing. The task names the technique categories without prescribing tooling.
  • RV.1.1: Gather information from software acquirers, users, and public sources on potential vulnerabilities in the software and third-party components, and investigate the reports.
  • RV.2.2: Assess, prioritise, and remediate vulnerabilities, with the severity calibration approach, the remediation SLA, and the deferred-risk treatment captured per finding.

EO 14028, OMB Memoranda, and the CISA SSDA

SSDF acquired federal-grade weight through Executive Order 14028 and the implementing OMB memoranda. The timeline below names the milestones that turned SSDF from a recommended reference into the practice catalogue federal software producers attest against. Producers outside the federal market still read this timeline because enterprise buyers increasingly ask vendors for SSDF-aligned evidence regardless of federal-sales status.

  • May 2021: Executive Order 14028 directs federal agencies to take action on software supply chain security and requires NIST to publish guidance for software producers.
  • February 2022: NIST publishes SP 800-218 v1.1, the Secure Software Development Framework, as the recommended set of practices.
  • September 2022: OMB Memorandum M-22-18 requires federal agencies to obtain self-attestations from software producers selling to the federal civilian government, citing SSDF as the practice catalogue.
  • June 2023: OMB Memorandum M-23-16 extends the timeline and clarifies the attestation requirements after the initial implementation period.
  • March 2024: CISA publishes the Secure Software Development Attestation form (the SSDA), the operating instrument federal software producers sign.
  • April 2024: NIST publishes SP 800-218A, the SSDF Community Profile for Generative AI and Dual-Use Foundation Models, extending the practice catalogue to generative AI producers.

The CISA Secure Software Development Attestation guide covers the SSDA form itself, the scope, the signature, and the evidence the form expects. The NIST SSDF implementation guide covers the practitioner-side rollout of the framework, including a four-phase sequence for adopting SSDF without rebuilding the engineering organisation. This page is the framework reference both of those guides read against.

Scope notes on the CISA SSDA

The CISA SSDA reads against SSDF, but the form has a specific scope that producers need to understand before signing. The notes below capture the recurring questions that arise when a producer first reads the form.

  • The CISA SSDA reads against a subset of SSDF practices rather than the full 42-task catalogue. Producers identify the practices in scope for the attestation against the specific software product or product class.
  • The signature is by the chief executive officer of the producer or a designee with the authority to bind the producer. The signature is not by a third-party assessor; a third-party assessment can support the attestation but does not replace it.
  • Software covered includes software developed after September 14, 2022 and software with major version changes after that date. Software in operation but not modified after the date is treated separately.
  • The producer maintains the evidence supporting the attestation and produces it on agency request. The attestation does not require submission of the underlying evidence at signature time, but the producer must be able to defend the signature on request.
  • Open-source software components, commercial third-party components, and software-as-a-service offerings have specific treatment in the SSDA. Producers consume SSDF for the producer-side practices and read CISA guidance for the third-party-component treatment.

NIST SP 800-218A: the Generative AI Profile

NIST SP 800-218A, published April 2024, extends SSDF with practices specific to producers of generative AI systems. The profile keeps the PO, PS, PW, RV structure and adds AI-system tasks across the four groups. Producers of generative AI software read SP 800-218 v1.1 plus SP 800-218A together rather than as a substitute, with the same operating record carrying both.

  • AI training data integrity: capture provenance for training data, document data-collection consent and licensing, record data-cleaning and deduplication procedures, and protect training data from tampering.
  • Model artefact protection: the trained model, fine-tuning artefacts, embeddings, and adapter weights are treated as software artefacts under PS, with access control, integrity verification, and release archival.
  • Generative-AI-specific code review and testing under PW: review the prompts, system messages, retrieval components, tool-use surfaces, and guardrails that surround the model, not just the model weights.
  • Prompt-injection and data-poisoning response under RV: extend the vulnerability disclosure programme to cover AI-specific failure classes, with severity calibration and remediation SLA shaped for the AI behaviour rather than for conventional code.
  • Generative-AI risk governance under PO: training, role definition, and tool selection extend to cover the prompt-engineering team, the model-governance role, and the AI safety review function alongside the conventional secure-development roles.

SSDF against SAMM, BSIMM, SLSA, and SBOM expectations

SSDF is the practice catalogue. OWASP SAMM and BSIMM are the software security maturity models that read against similar practice areas but score the maturity rather than attest the practice. SLSA is the build-integrity framework PS.2 and PS.3 read against in the build pipeline. SBOM is the artefact PS.3 expects a producer to archive per release, and VEX is the assertion layer RV.1 uses when communicating component-level exploitability to downstream consumers. A mature programme runs SSDF as the practice baseline, SAMM or BSIMM for maturity tracking, SLSA for the build-integrity discipline behind PS, and SBOM and VEX as the artefact set behind PS.3 and RV. For the test-side depth behind PW.7 and PW.8, the OWASP ASVS and OWASP WSTG are the verification standard and the testing manual most producers cite.

Failure modes the framework is designed to surface

SSDF is forgiving on tooling, on team structure, and on the choice of supplementary maturity model. It is unforgiving about a small number of patterns that erode the integrity of the programme and leave a producer with the appearance of SSDF alignment rather than the operating posture. The patterns below are the recurring ones across early and mid-stage adoptions.

  • Treating the SSDA signature as the end of the work. The signature is the attestation; SSDF is the operating posture behind it. A producer that signs the SSDA and does not maintain the evidence pack inherits the audit-time excavation the framework is supposed to prevent.
  • Conflating SSDF with a maturity model. SSDF is a practice catalogue with named tasks. OWASP SAMM and BSIMM are the maturity models that read against similar practice areas. A producer that uses SAMM scoring as SSDF evidence ships the maturity view to a buyer that asked for the practice-and-task view.
  • Skipping PO and going straight to PW. The roles, the training, the toolchain inventory, and the supportive criteria PO names are the foundation PS, PW, and RV read against. Programmes that begin with code review tooling and skip the role definition produce well-tooled engineering with an unstaffed governance layer.
  • Treating RV as the security team's problem alone. RV.3 expects the root-cause analysis to feed back into PO and PW. A programme that runs RV as an incident queue without the feedback loop loses the compound improvement the framework expects.
  • Holding the evidence pack across tools that do not reconcile. SSDF reads against the same artefacts as ISO 27001 Annex A 8.25 to 8.34, SOC 2 CC7 and CC8, and PCI DSS 6. Producers that hold the SSDF artefacts in one stack and the ISO 27001 artefacts in another rebuild the same evidence twice.
  • Reading SP 800-218A as a separate programme. The AI profile extends SSDF rather than replacing it. Producers of generative AI software run the v1.1 baseline plus the SP 800-218A tasks on the same operating record, not as a parallel programme.

Evidence the framework expects to see

A defensible SSDF programme produces the evidence pack as a side effect of the engineering work rather than reconstructing it at attestation time. The minimum set below maps to the artefacts the CISA SSDA defence, the ISO 27001 Annex A 8.25 to 8.34 audit response, the SOC 2 CC7 and CC8 examinations, the NIST SP 800-53 SA family review, the PCI DSS 6 controls read, and the enterprise procurement questionnaire response all read against.

  • Toolchain inventory and security-tool selection criteria per practice group (PO.3), with the documented rationale for each tool and the review cadence
  • Documented roles, responsibilities, and training records per role (PO.2 and PO.5), covering developers, security reviewers, AppSec, product security, and the governance roles named in the producer's operating model
  • Source-code repository access policy, integrity verification approach, and the separation-of-duties record (PS.1 and PS.2), with the credential storage and access review evidence
  • Per-release artefact archive including the signed binary or container, the SBOM, the build configuration, the provenance record, and the documentation of the configuration-as-code (PS.3)
  • Design output and threat-modelling record per significant release (PW.1 and PW.2), with the design review queue and the dispositions per identified risk
  • Third-party component review and software composition analysis record (PW.4), with the inventory, the advisory ingestion source, and the remediation evidence per finding
  • Secure coding standard with the enforcement evidence (PW.5), covering both the developer-facing reference and the verification record
  • Build and compilation hardening evidence (PW.6), covering compiler flags, container base images, reproducible-build posture where applicable, and the dependency-resolution policy
  • Code-review evidence per change (PW.7), covering both peer review and automated analysis output, with the disposition per finding
  • Security-testing evidence per release (PW.8), covering SAST, DAST, IAST, fuzzing, and manual testing, with the coverage statement per release
  • Secure-by-default configuration record (PW.9), with the validation evidence the producer ships against
  • Vulnerability disclosure programme intake evidence (RV.1), covering the disclosure channel, the SLA, and the per-report record
  • Severity calibration, remediation SLA, and exception record per finding (RV.2), with retest evidence per remediation
  • Root-cause analysis and process-feedback record (RV.3), with the named improvements folded back into PO and PW

How SSDF relates to ISO 27001, SOC 2, NIST SP 800-53, and adjacent regimes

SSDF is the practice catalogue for software producers. The control catalogues most enterprises operate against carry the underlying control evidence the framework reads against. The relationships below are the ones producers most often need to read together.

  • The ISO 27001 framework page covers the certifiable Information Security Management System. ISO 27001:2022 Annex A controls 8.25 (secure development life cycle) through 8.34 (protection of test information) carry the underlying evidence SSDF reads against, so an ISO 27001 ISMS already produces most of the artefact set the SSDF evidence pack expects.
  • The SOC 2 framework page covers the AICPA Trust Services Criteria. SOC 2 examinations read against the same development-lifecycle, change-management, and vulnerability-management evidence SSDF expects; producers operating SOC 2 already hold most of the CC7 (System Operations) and CC8 (Change Management) artefacts the SSDA defence reads against.
  • The NIST SP 800-53 framework page covers the control catalogue federal systems operate against. The SA (System and Services Acquisition), SI (System and Information Integrity), CM (Configuration Management), and RA (Risk Assessment) families carry the control evidence SSDF reads against; federal systems and federal customers typically run SSDF and SP 800-53 together rather than as a substitute.
  • The NIST CSF 2.0 framework page covers the outcome framework SSDF reads against. The PR (Protect) function maps to the PS and PW work; the ID (Identify) function aligns with the PO toolchain inventory and role definitions; the RS (Respond) function reads against RV. CSF 2.0 is the leadership-side read; SSDF is the producer-side practice catalogue underneath.
  • The CISA Secure by Design framework page covers the principles and pledge for software manufacturers. Secure by Design and SSDF share the operating premise that defaults must be safe and that producer accountability for security is non-delegable; software produced under Secure by Design produces most of the PW.5, PW.6, and PW.9 evidence SSDF reads against.
  • The EU Cyber Resilience Act framework page covers the European-side product-cybersecurity regulation. CRA Annex I essential requirements read against the same producer-side discipline SSDF describes; producers shipping into the EU run CRA and SSDF together on the same record so the evidence pack carries both reads.
  • The CMMC framework page covers the Cybersecurity Maturity Model Certification for the US defence industrial base. CMMC Level 2 and Level 3 read against NIST SP 800-171 controls that overlap with SSDF producer-side expectations; producers shipping to the defence industrial base run CMMC and SSDF together.
  • The CISA Secure Software Development Attestation guide covers the SSDA form, the scope rules, the signature requirements, and the evidence the form expects. The guide pairs with this framework page as the operational companion when the federal-side attestation cycle is on the calendar.
  • The NIST SSDF implementation guide covers the four-phase practitioner rollout: baseline, gap analysis, evidence build, and continuous run. The implementation guide pairs with this framework page as the rollout-side companion.

Audience reads of SSDF

SSDF is read differently by different functions inside the producer. The framework is the same; the lens shifts. The audience reads below cover the recurring roles that consume SSDF inside the producer and the work each one carries on the operating record.

Internal AppSec teams

Run the PW.5, PW.7, and PW.8 evidence on the engagement record. Tie code-scanning findings to the per-release evidence pack and the per-change review record. Use the SSDF practice-and-task vocabulary in design reviews, threat-modelling outputs, and post-release retrospectives so the engineering team reads the same framework the audit team reads.

Product security teams

Operate SSDF as the practice baseline that PO defines, PS protects, PW produces, and RV closes. The product security function carries cross-team accountability for the toolchain inventory (PO.3), the release archive (PS.3), the design-and-threat-model review queue (PW.1, PW.2), and the disclosure programme intake (RV.1) so the producer-wide posture is consistent across product lines.

GRC and compliance teams

Read SSDF as the practice catalogue behind the CISA SSDA, the ISO 27001 Annex A 8.25 to 8.34 audit response, the SOC 2 CC7 and CC8 evidence, the PCI DSS 6 controls, and the procurement questionnaire responses. Hold the cross-framework crosswalk on one record so the SSDA defence, the ISO 27001 surveillance audit, and the SOC 2 examination read against the same artefact set.

CISOs and security leaders

Carry the SSDF programme accountability at the operating layer. Track the per-release evidence cadence, the RV.3 root-cause-analysis feedback into PO and PW, the SSDA scope and signature record, and the cross-framework reconciliation. Read SSDF as the federal-grade vocabulary for board-level discussion of software supply chain posture rather than as an engineering check-list.

Vulnerability management teams

Own the RV practice group on the operating record. Run the disclosure-intake-to-remediation lifecycle (RV.1 to RV.2) inside the findings record, hold the severity calibration policy and the remediation SLA as the consistent inputs RV.2 cites, and pair the root-cause analysis (RV.3) with the broader VM programme so SSDF response reads as part of the wider vulnerability-management posture.

Security engineering teams

Own the toolchain inventory (PO.3), the build-pipeline hardening (PW.6), the secure-by-default configuration (PW.9), and the artefact-protection mechanisms (PS.1, PS.2, PS.3). Run the SSDF discipline as part of the platform-engineering work so the per-release evidence is produced by the build pipeline rather than reconstructed at attestation time.

Where SecPortal fits in an SSDF programme

SecPortal is the operating layer for the SSDF evidence record, not a SAST scanner, a build system, a secrets vault, or a vulnerability disclosure intake portal. The platform handles the engagement record per release, the per-finding lifecycle from intake to closure across PW.7, PW.8, RV.1, and RV.2, the document archive PS.3 and PO.3 read against, the activity log every state change accumulates against, the cross-framework compliance reads, and the producer-side AI report generation. SSDF is the practice catalogue; SecPortal is the record the catalogue reads from.

  • Engagement management dedicated to the SSDF programme, with the per-release PW work, the RV cycle, and the PO baseline tracked as workstreams that produce the evidence pack as a side effect rather than as a parallel project
  • Findings management with CVSS 3.1 scoring so the PW.7, PW.8, and RV.2 evidence has consistent severity calibration, the remediation SLA is enforceable, and the retest record is paired to the original finding
  • Code scanning via Semgrep so the PW.7 code-review-and-analysis evidence accumulates against the repositories connected to the workspace, with the scan execution record archived per release
  • Repository connections via GitHub, GitLab, and Bitbucket OAuth so the PS.1 access control, the PW.5 secure coding enforcement, and the PW.7 review trail read against the same source-control state
  • Document management for the PO toolchain inventory, the PO.2 role-and-responsibility records, the PS.3 per-release archive, the PW.4 third-party review record, and the RV.1 disclosure programme intake evidence
  • Activity log with CSV export so every state change to a finding, an engagement, a document, or a user role is reproducible from one source, which is the audit trail PO.3, PS.1, and the SSDA defence read against
  • Compliance tracking across SSDF, ISO 27001, SOC 2, NIST SP 800-53, PCI DSS, CISA Secure by Design, EU CRA, and the additional framework catalogues, so the SSDF evidence pack reads against the parallel framework reads from the same record
  • AI report generation that turns the engagement record and the per-release evidence into the producer-side narrative the CISA SSDA defence, the procurement reply, and the leadership read all consume
  • Retesting workflows paired to the original finding, so the RV.2 remediation evidence and the PW.8 retest record live on one operating record rather than across parallel spreadsheets

For the producer-side workflows SSDF reads against, the SDLC vulnerability handoff workflow carries the per-finding handoff from PW.7 and PW.8 into the engineering remediation queue that RV.2 cites. The SBOM and VEX publishing workflow holds the PS.3 release-archive record and the RV.1 disclosure response evidence on one operating record. The dependency vulnerability triage workflow carries the PW.4 third-party component review and the RV.2 remediation evidence on the same record. The vulnerability finding intake workflow carries the RV.1 disclosure-and-scanner intake discipline so the entry-point to the framework is a recorded queue rather than an ad-hoc inbox. The security onboarding for new applications workflow carries the PO foundation work each new product line inherits before PW work starts. The control mapping cross-framework crosswalks workflow reads the same SSDF evidence into the parallel ISO 27001, SOC 2, NIST SP 800-53, PCI DSS, and CISA SSDA records so the producer answers each framework from one record rather than rebuilding the artefact set per audit.

For internal teams running the programme, the internal security teams workspace bundles the platform with the engagement structure SSDF expects across the producer-side cycle. For the AppSec function that owns the PW.5, PW.7, and PW.8 evidence, the AppSec teams workspace covers the development-adjacent angle. For the product security function carrying the cross-team PO foundation and the per-release PS discipline, the product security teams workspace covers the producer-side discipline. For the GRC and compliance function that holds the CISA SSDA defence, the ISO 27001 surveillance audit response, and the SOC 2 examination evidence, the GRC and compliance teams workspace carries the cross-framework reconciliation. For security leaders carrying the SSDF programme accountability, the CISOs and security leaders workspace covers the programme-level reporting model. For the application security programme leads running SSDF as the producer-wide baseline, the application security programme leads workspace covers the cross-team operating layer.

For the capability set SSDF reads against, the code scanning capability produces the PW.7 review-and-analysis evidence, repository connections carry the PS.1 access control and the PW.5 enforcement record, and document management holds the PO.3 toolchain inventory and the PS.3 per-release archive. For analytical context on how the evidence accumulates across releases, the vulnerability evidence reuse across audits research covers the artefact discipline a multi-framework producer keeps, and the multi-framework control crosswalk economics research covers the budget-side ledger an SSDF producer reads against when running multiple framework reads off the same evidence pack.

Key control areas

SecPortal helps you track and manage compliance across these domains.

PO: Prepare the Organization

PO is the practice group that establishes the people, process, and technology preconditions for secure software development. PO covers security requirements definition, role and responsibility assignment, training of the people who write and review code, the toolchain inventory, the criteria for tool selection, the documentation of security checks, and the implementation of supportive criteria across the producer. PO is the practice group that turns SSDF from a one-off attestation into an operating posture: PS, PW, and RV all depend on the foundations PO names.

PS: Protect the Software

PS covers protection of all components of the software from tampering and unauthorised access. PS.1 protects the source code (access control, separation of duties, integrity verification). PS.2 provides a mechanism for verifying software release integrity (digital signatures, hashes). PS.3 archives and protects each software release so the producer can reproduce, analyse, and respond to issues that arise after release. PS is the practice group that supplies the artefact-side discipline downstream consumers (federal buyers, customers, auditors) read against.

PW: Produce Well-Secured Software

PW is the largest practice group and covers the engineering work itself: design software to meet security requirements and mitigate security risks (PW.1), review the software design for risks (PW.2), verify that third-party software complies with security requirements (PW.4), create source code by adhering to secure coding practices (PW.5), configure the compilation, interpreter, and build processes to improve executable security (PW.6), review and analyse human-readable code (PW.7), test executable code for vulnerabilities (PW.8), and configure software with secure-by-default settings (PW.9). PW is where most of the day-to-day AppSec, product security, and security engineering work lands.

RV: Respond to Vulnerabilities

RV is the practice group that names the response discipline. RV.1 identifies and confirms vulnerabilities on an ongoing basis (vulnerability disclosure programme, monitoring of advisories, scanner ingestion). RV.2 assesses, prioritises, and remediates the vulnerabilities (severity calibration, exception register, remediation SLA, retest evidence). RV.3 analyses the vulnerabilities to identify their root causes (post-mortem, recurring-class analysis, process feedback into PO and PW). RV is the practice group that closes the loop between the deployed software and the development process; without RV, PO/PS/PW produce shipping software with no operating link back to the engineering organisation when the post-release issues arrive.

The 19 practices and 42 tasks

SSDF v1.1 decomposes the four groups into 19 named practices, and each practice breaks down into one or more tasks (42 in total). The task is the unit the framework expects a producer to either implement or document why it does not apply. A defensible SSDF programme reads task by task rather than practice by practice: PO.1.1 defines security requirements for the software development infrastructure; PS.1.1 stores source code in a repository with access control; PW.4.1 acquires and maintains well-secured software components; PW.7.1 determines whether code review (peer or automated) is to be used. The task identifier is what audit, procurement, and the CISA SSDA form cite against.

EO 14028 and the CISA Secure Software Development Attestation

Executive Order 14028 (May 2021) directed federal agencies to take action on software supply chain security. OMB M-22-18 (September 2022) and OMB M-23-16 (June 2023) translated the executive direction into requirements for federal agencies to obtain attestations from software producers. CISA publishes the Secure Software Development Attestation form (the SSDA), which is the document a producer or third-party assessor signs to attest to conformance with the relevant SSDF practices. The SSDA reads against a subset of the full SSDF practice set, not the full 42-task catalogue. Federal software producers, and any producer selling into the federal civilian agency market, read SSDF through the SSDA lens first and the full framework second.

NIST SP 800-218A: SSDF Profile for Generative AI

NIST SP 800-218A, published April 2024, extends the SSDF with practices specific to producers of generative AI systems. The profile keeps the PO/PS/PW/RV structure and adds AI-system tasks: training data integrity, model artefact protection, generative-AI-specific code review and testing, prompt-injection and data-poisoning response. Producers of generative AI software read SSDF v1.1 plus SP 800-218A together rather than as a substitute. The same operating record carries both: the engagement scope names the AI system, the findings record carries prompt-injection-class findings alongside conventional vulnerabilities, and the RV practices cover the same response discipline against the AI-specific failure modes.

SSDF vs OWASP SAMM, BSIMM, SLSA, and SBOM expectations

SSDF is the federal-side practice catalogue. OWASP SAMM and BSIMM are software security maturity models that read against similar practice areas but are model-oriented rather than attestation-oriented. SLSA (Supply-chain Levels for Software Artefacts) is the build-integrity framework SSDF practices PS.2 and PS.3 read against in the build pipeline. SBOM (Software Bill of Materials) is the artefact PS.3 expects a producer to archive per release and that RV.1 reads against during vulnerability response. A mature programme runs SSDF as the practice baseline, SAMM or BSIMM for maturity tracking, SLSA for the build-integrity discipline behind PS, SBOM and VEX as the artefact set behind PS.3 and RV, and the OWASP testing references (ASVS, WSTG, MASTG, API Security Top 10) for the test-side depth behind PW.7 and PW.8.

Evidence the framework expects to see

A defensible SSDF programme produces a stable evidence set as a side effect of the engineering work rather than reconstructed at attestation time. The minimum set covers the toolchain inventory and security-tool selection criteria (PO.3), the documented roles, responsibilities, and training records (PO.2 and PO.5), the source-code repository access policy and integrity verification approach (PS.1, PS.2), the release archive per shipped version including SBOM and signed artefacts (PS.3), the design and threat-modelling outputs per release (PW.1, PW.2), the third-party component review and SCA record (PW.4), the secure-coding standard and the enforcement evidence (PW.5), the build configuration and hardening posture (PW.6), the code-review evidence per change (PW.7), the security-testing evidence including SAST, DAST, IAST, fuzzing, and manual testing (PW.8), the secure-by-default configuration record (PW.9), the vulnerability disclosure programme and intake evidence (RV.1), the severity calibration and remediation SLA evidence per finding (RV.2), and the root-cause analysis and process feedback record (RV.3). The same evidence set reads cleanly under the CISA SSDA, ISO 27001 Annex A 8.25 through 8.34, SOC 2 CC7 and CC8, NIST SP 800-53 SA family, and PCI DSS 6 controls.

Run a defensible NIST SSDF programme on one operating record

Hold the PO baseline, the per-release PS artefacts, the PW engineering evidence, and the RV response record on one workspace, then carry the same record into the CISA SSDA, ISO 27001, SOC 2, and procurement reads without rebuilding the evidence pack. Start free.

No credit card required. Free plan available forever.