GSA and CISA Prioritize 'Secure by Design' in Federal Procurement

    The GSA and CISA are focusing on 'Secure by Design' principles in procurement, encouraging the use of innovative security technologies. However, many solicitations still favor the Lowest Price Technically Acceptable (LPTA) evaluation method, which may hinder advanced security solutions unless compliance with stringent guidelines is clear. Contractors must align security innovations with procurement requirements.

    General Services Administration, Cybersecurity and Infrastructure Security Agency

    Key Signals

    • GSA emphasizes 'Secure by Design' principles in federal procurement.
    • CISA advocates for memory-safe programming and automated SBOMs.
    • LPTA evaluation criteria may hinder advanced security solutions.

    "With CISA and the GSA MAS refreshes pushing for "Secure by Design" principles, we’ve been looking at a heavy lift on our dev side, prioritizing memory-safe languages, automated SBOMs, and hardened defaults."

    Original poster

    In an era where cybersecurity threats are increasingly sophisticated, federal procurement practices under the General Services Administration (GSA) and the Cybersecurity and Infrastructure Security Agency (CISA) are evolving to emphasize 'Secure by Design' principles. This holistic approach prioritizes integrating security considerations at the outset of technological development rather than applying them as afterthoughts. Key elements of this strategy include employing memory-safe programming languages, utilizing automated Software Bill of Materials (SBOMs), and ensuring hardened default configurations to bolster system resilience against potential exploits.

    However, despite these critical advancements in security protocols, the traditional evaluation criteria within many federal solicitations, particularly those utilizing the Lowest Price Technically Acceptable (LPTA) framework, remain a significant hurdle. The LPTA pricing model can diminish the competitive edge of firms that invest in progressive security solutions since it often prioritizes lower costs over the complexities of advanced security architectures. As a result, firms responding to GSA and CISA solicitations are compelled to ensure that their proposals include meticulous documentation verifying compliance with established security controls, particularly those aligned with the NIST 800-53 guidelines.

    Procurement professionals and contractors alike must navigate this dichotomy between innovative security engineering and compliance with procurement language that resonates with federal evaluators. The GSA and CISA’s push towards integrating security features into the procurement process demonstrates an acknowledgement of the critical need for robust cybersecurity measures; however, it's essential for contractors to adapt their strategies accordingly. Achieving success in this shifting landscape demands a delicate balance—proposals must not only showcase innovative security enhancements but also articulate those enhancements clearly within the confines of procurement guidelines and documentation standards.

    Moreover, the emphasis on concepts such as minimizing external interfaces and conducting routine vulnerability scanning may provide contractors with strategic advantages. By focusing on reducing the burdens associated with security documentation while simultaneously aligning with agency preferences, vendors can enhance their appeal within federal procurement frameworks. This indicates not only a shift in mentality among federal agencies but also a growing market opportunity for cybersecurity firms capable of demonstrating both advanced secure design and comprehensive documentation.

    For example, the feedback from industry professionals indicates the challenges their organizations face: "With CISA and the GSA MAS refreshes pushing for 'Secure by Design' principles, we’ve been looking at a heavy lift on our dev side, prioritizing memory-safe languages, automated SBOMs, and hardened defaults." This quote highlights the operational adjustments necessary for companies in response to these procurement demands, underscoring a broader industry trend towards more secure, resilient IT infrastructures as requirements evolve.

    In conclusion, as the GSA and CISA ambitiously seek to institutionalize 'Secure by Design' methodologies through federal procurement, stakeholders must adapt to remain competitive. To thrive within this landscape, contractors must leverage technical expertise to ensure their proposals are not only innovative but also compliant with emerging procurement frameworks that increasingly value security alongside cost considerations.

    Agencies

    • General Services Administration
    • Cybersecurity and Infrastructure Security Agency