NIST Issues SSDFv1.2 with Runtime-Security Focus

NIST just quietly issued SSDFv1.2 and it's more runtime-security aware! In the v1.2 draft updates to SP 800-218, they add two big missing pieces: continuous improvement (explicitly driven by incidents and new threats) and secure update/patch delivery (realistic testing, rollback, staged rollout). That’s a clear shift from “write secure code” guidance toward “operate secure software” guidance. NIST is starting to understand that vulnerability management can’t live in spreadsheets and quarterly scans anymore. Good job NIST moving away from “shift left” and towards connecting left and right. The key is watching what’s actually happening at runtime and creating a fast feedback loop to development for *real* vulnerabilities shown to be exploitable in production and prioritized with architectural, threat, and business context from production. https://lnkd.in/eRzyNRbS

Completely agree, Jeff Williams. In fact I'd even go as far as to state that addition of these two practices (PO.6 and PS.4) to the SSDF framework may warrant bumping the framework's version number to 2 instead of 1.2.

Have they moved away or simply added more stuff?

Like
Reply
See more comments

To view or add a comment, sign in

Explore content categories