On January 23, 2026, the Office of Management and Budget (OMB) issued Memorandum M-26-05 “Adopting a Risk-based Approach to Software and Hardware Security,” which rescinds a previous Biden Administration’s requirement for all federal agencies to obtain a self-attestation from software producers in the “Common Form” developed by the Cybersecurity and Infrastructure Security Agency (CISA) before using certain third-party software. As its rationale, OMB noted that the prior memoranda diverted agencies from developing tailored assurance requirements and failed to account for threats posed by insecure hardware. Memorandum M-26-05 signals that the federal government is moving away from a “one-size fits-all” approach to software security and will instead allow each agency to develop tailored requirements. In creating their own assurance requirements, agencies may still require a self-attestation and/or Software Bill of Materials (SBOM) from the software vendor if the agency determines that such assurances are necessary based on the risks involved and the agency’s needs.
Background
Memorandum M-26-05 reverses the attestation requirement imposed by two memoranda: Memorandum M-22-18 “Enhancing the Security of the Software Supply Chain through Secure Software Development Practices” and companion memorandum M-23-16 “Update to Memorandum M-22-18.” Issued in September 2022, M-22-18 aimed to strengthen the federal government’s software supply chain by requiring all agencies to obtain an attestation from software providers that the providers comply with the National Institute of Standards and Technology (NIST) guidance on software security. “Software” was broadly defined to included firmware, operating systems, applications, application services (e.g., cloud-based software), and products containing software. M-22-18 also required agencies to take inventory of all software subject to this requirement, and as part of this effort, gave agencies the discretion to require software offers to submit SBOMs, an inventory of components used to build a software product. M-26-05 appears to leave this inventory-taking requirement in place, as noted further below.
M-23-16 subsequently clarified that the attestation requirement applied to producers of the software end product used by an agency. If a producer was not able provide the attestation for its product, an agency was required to seek OMB’s extension of the deadline for submitting the attestation to be able to continue using the product.
In March 2024, OMB, together with CISA, released the Secure Software Development Attestation Form, or the “Common Form,” for all federal agencies to use to obtain the attestation from software producers.
Summary of Memorandum M-26-05
In issuing M-26-05, OMB Director Russell T. Vought stated that M-22-18 and M-23-16 imposed “unproven and burdensome software accounting processes that prioritized compliance over genuine security investments.” By rescinding these memoranda, OMB now allows agencies to develop their own ways to validate software security by “utilizing secure development principles and based on a comprehensive risk assessment,” although it is unclear whether M-26-05’s own references to “software” are necessarily as broad as the definition in M-22-18, as M-26-05 does not define “software.”
In particular, M-26-05 relieves agencies from any requirement to use the Common Form. In place of the Common Form, M-26-05 requires each agency to adopt a “risk-based” approach to ensuring software and hardware security that is tailored to that agency’s software needs and circumstances.
To be clear, M-26-05 does not prohibit agencies from using resources developed under M-22-18. M-26-05 states that agencies can still choose to use the Common Form, along with the NIST secure software development standards and other NIST resources, as part of such a tailored approach. More significantly, M-26-05 states that “an agency may choose to adopt contractual terms that require a software provider to provide a current SBOM upon request.”
The only limitation, or clarification, that M-26-05 imposes on an agency’s discretion is if an agency requires an SBOM “for a cloud provider, agencies adopting such a contractual term should specify that the producer must provide an SBOM of the runtime production environment upon request.” In other words, if an SBOM is required by an agency, Cloud Service Providers should be prepared to provide information for the live production environment used to provide the service, and not just information derived from test environments or software lists. In addition, agencies are still required to continue maintaining a complete inventory of software.
M-26-05 now answers the question that we presented in the summer of last year regarding whether software attestations would remain mandatory requirements after the Trump Administration rescinded only one out of two Biden-era cybersecurity executive orders. That action eliminated the executive order requirements to iterate on the secure software acquisition framework developed under the Biden Administration, but left the fundamental attestation framework set forth under the non-rescinded executive order in place.
Takeaways
The memorandum represents one of the few areas where we have seen a divergence between the Biden and Trump administrations in the area of cybersecurity. Even with the recission of the Biden OMB memoranda, agencies may still “choose to use” the prior resources that were developed in connection with those memoranda, including the Common Form.
It remains uncertain whether, and how quickly, agencies will develop individualized processes for evaluating software providers. Companies seeking to provide software products to the federal government should closely monitor announcements regarding agency‑specific requirements and proactively participate in agencies’ risk‑assessment activities for developing these requirements. Additionally, companies should not take this new action as a pass on software security, particularly given lead times that can be significant in the software development process. Along these lines, companies should ensure they are prepared to submit software inventory information upon request.