Request for Information on Open-Source Software Security: Areas of Long-Term Focus and Prioritization
Court | Executive Office Of The President,The National Cyber Director Office |
Citation | 88 FR 54315 |
Published date | 10 August 2023 |
Record Number | 2023-17239 |
Section | Notices |
54315
Federal Register / Vol. 88, No. 153 / Thursday, August 10, 2023 / Notices
1
‘‘2023 Open-Source Security and Risk Analysis
Report,’’ Synopsys, February 22, 2023, (https://
www.synopsys.com/software-integrity/resources/
analyst-reports/open-source-security-risk-
analysis.html?utm_source=bing&utm_
medium=cpc&utm_term=&utm_campaign=B_S_
OSSRA_BMM&cmp=ps-SIG-B_S_OSSRA_
BMM&msclkid=15e8216ad16511c8b
01945c7b683c395).
ACTION
: Notice of proposed settlement;
request for public comment.
SUMMARY
: In accordance with the
requirements of the Comprehensive
Environmental Response,
Compensation, and Liability Act of
1980, as amended (‘‘CERLCA’’), notice
is hereby given that a proposed CERCLA
Cashout Settlement Agreement for
Peripheral Parties (‘‘Proposed
Agreement’’) associated with the
Colorado Smelter Superfund Site,
Pueblo, Colorado (‘‘Site’’) was executed
by the U.S. Environmental Protection
Agency (‘‘EPA’’), Region 8 and is now
subject to public comment, after which
EPA may modify or withdraw its
consent if comments received disclose
facts or considerations that indicate that
the Proposed Agreement is
inappropriate, improper, or inadequate.
DATES
: Comments must be submitted on
or before September 11, 2023.
ADDRESSES
: The Proposed Agreement
and additional background information
relating to the agreement will be
available upon request. Any comments
or requests or for a copy of the Proposed
Agreement should be addressed to Julie
Nicholson, Enforcement Specialist,
Superfund and Emergency Management
Division, Environmental Protection
Agency—Region 8, Mail Code 8SEM–
PAC, 1595 Wynkoop Street, Denver,
Colorado 80202, telephone number:
(401) 714–6143, email address:
nicholson.julie@epa.gov, and should
reference the Colorado Smelter
Superfund Site.
You may also send comments,
identified by Docket ID No. EPA–R08–
SFUND–2023–0366, to http://
www.regulations.gov. Follow the online
instructions for submitting comments.
FOR FURTHER INFORMATION CONTACT
:
Sarah Rae, Senior Assistant Regional
Counsel, Office of Regional Counsel,
Environmental Protection Agency,
Region 8, Mail Code 8ORC–LEC, 1595
Wynkoop, Denver, Colorado 80202,
telephone number: (303) 312–6839,
email address: rae.sarah@epa.gov.
SUPPLEMENTARY INFORMATION
: The
Proposed Agreement would resolve
potential EPA claims under section
107(a) of CERCLA, against 1000 South
Santa Fe LLC and 1100 South Santa Fe
LLC(‘‘Settling Parties’’) for EPA
response costs at or in connection with
the property located at 1101–1109 Santa
Fe Avenue and 1045–1049 South Santa
Fe Avenue, in Pueblo, Colorado (the
‘‘Property’’), which is part of the
Colorado Smelter Superfund Site. The
settlement is estimated to be $646,100,
plus an additional sum for interest on
that amount calculated from the
effective date through the date of
payment (‘‘Payment Amount’’). Settling
Parties will remit the Payment Amount
to EPA upon the transfer of the Property
or within three years of the effective
date, whichever occurs earlier. The
Proposed Settlement Agreement also
provides a covenant not to sue or to take
administrative action from the United
States to the Settling Parties pursuant to
sections 106 and 107(a) of CERCLA, 42
U.S.C. 9606 and 9607(a) with regard to
Operable Unit 02 (OU2).
For thirty (30) days following the date
of publication of this document, EPA
will receive electronic comments
relating to the Proposed Agreement.
EPA’s response to any comments
received will be available for public
inspection by request. Please see the
ADDRESSES
section of this document for
instructions.
Ben Bielenberg,
Acting Division Director, Superfund and
Emergency Management Division, Region 8.
[FR Doc. 2023–17174 Filed 8–9–23; 8:45 am]
BILLING CODE 6560–50–P
EXECUTIVE OFFICE OF THE
PRESIDENT
Office of the National Cyber Director
[Docket ID: ONCD–2023–0002]
RIN 0301–AA01
Request for Information on Open-
Source Software Security: Areas of
Long-Term Focus and Prioritization
AGENCY
: Office of the National Cyber
Director, Executive Office of the
President, Cybersecurity and
Infrastructure Security Agency, DHS,
National Science Foundation, Defense
Advanced Research Projects Agency,
and Office of Management and Budget,
Executive Office of the President.
ACTION
: Request for information (RFI).
SUMMARY
: The Office of the National
Cyber Director (ONCD), the
Cybersecurity Infrastructure Security
Agency (CISA), the National Science
Foundation (NSF), the Defense
Advanced Research Projects Agency
(DARPA), and the Office of Management
and Budget (OMB) invite public
comments on areas of long-term focus
and prioritization on open-source
software security.
DATES
: Comments must be received in
writing by 5 p.m. ET October 9, 2023.
ADDRESSES
: Interested parties may
submit comments through
www.regulations.gov. For detailed
instructions on submitting comments
and additional information on this
process, see the
SUPPLEMENTARY
INFORMATION
section of this document.
FOR FURTHER INFORMATION CONTACT
:
Requests for additional information may
be sent to: OS3IRFI@ncd.eop.gov,
Nasreen Djouini, telephone: 202–881–
4697.
SUPPLEMENTARY INFORMATION
: As
highlighted in the National
Cybersecurity Strategy (https://
www.whitehouse.gov/wp-content/
uploads/2023/03/National-
Cybersecurity-Strategy-2023.pdf), and
its Implementation Plan Initiative 4.2.1,
the ONCD has established an Open-
Source Software Security Initiative
(OS3I) to champion the adoption of
memory safe programming languages
and open-source software security. The
security and resiliency of open-source
software is a national security,
economic, and a technology innovation
imperative. Because open-source
software plays a vital and ubiquitous
role across the Federal Government and
critical infrastructure,
1
vulnerabilities in
open-source software components may
cause widespread downstream
detrimental effects. The Federal
Government recognizes the immense
benefits of open-source software, which
enables software development at an
incredible pace and fosters significant
innovation and collaboration. In light of
these factors, as well as the status of
open-source software as a free public
good, it may be appropriate to make
open-source software a national public
priority to help ensure the security,
sustainability, and health of the open-
source software ecosystem.
In 2021, following the aftermath of the
Log4Shell vulnerability, ONCD in
collaboration with the Office of
Management and Budget’s (OMB) Office
of the Federal Chief Information Officer
(OFCIO), established the Open-Source
Software Security Initiative (OS3I)
interagency working group with the goal
of channeling government resources to
foster greater open-source software
security. Since then, OS3I has
welcomed many other interagency
partners, including the Cybersecurity
Infrastructure Security Agency (CISA),
the National Science Foundation (NSF),
Defense Advanced Research Projects
Agency (DARPA), National Institute of
Standards and Technology (NIST),
VerDate Sep<11>2014 17:28 Aug 09, 2023 Jkt 259001 PO 00000 Frm 00027 Fmt 4703 Sfmt 4703 E:\FR\FM\10AUN1.SGM 10AUN1
ddrumheller on DSK120RN23PROD with NOTICES1
54316
Federal Register / Vol. 88, No. 153 / Thursday, August 10, 2023 / Notices
Center for Medicare & Medicaid
Services (CMS), and Lawrence
Livermore National Laboratory (LLNL)
in order to identify open-source
software security priorities and
implement policy solutions.
Over the past year, OS3I identified
several focus areas, including: (1)
reducing the proliferation of memory
unsafe programming languages; (2)
designing implementation requirements
for secure and privacy-preserving
security attestations; and (3) identifying
new focus areas for prioritization.
This Request for Information (RFI)
aims to further the work of OS3I by
identifying areas most appropriate to
focus government priorities, and
addressing critical questions such as:
•How should the Federal
Government contribute to driving down
the most important systemic risks in
open-source software?
•How can the Federal Government
help foster the long-term sustainability
of open-source software communities?
•How should open-source software
security solutions be implemented from
a technical and resourcing perspective?
This RFI represents a continuation of
OS3I’s efforts to gather input from a
broad array of stakeholders.
Three-Phase RFI Approach
For this RFI, the Government intends
to engage with interested parties in
three phases:
Phase I—Addressing Respondent
Questions About this RFI
•If you have any questions about the
context of the Government’s RFI, the
processes described, or the numbered
topics below, you may send them to
OS3IRFI@ncd.eop.gov by August 18,
2023.
•By August 28, 2023, the
Government will post responses to
select questions on
www.regulations.gov, as appropriate.
Phase II—Submittal of Responses to the
RFI by Interested Respondents
•By October 9, 2023, all interested
respondents should submit a written
RFI response, in MS Word or PDF
format, focusing on questions for which
they have expertise and insights for the
Government (no longer than 10 pages
typed, size eleven font) to OS3IRFI@
ncd.eop.gov with the email subject
header ‘‘Open-Source Software Security
RFI Response’’ and your organization’s
name.
•Title page, cover letter, table of
contents, and appendix are not included
within the 10-page limit. In the body of
the email, also include contact
information for your organization (POC
Name, Title, Phone, Email, Organization
Name, and Organization Address).
Phase III—Government Review
•The Government reviews and
publishes the RFI responses submitted
during Phase II. The Government may
select respondents to engage with the
RFI project team to elaborate on their
response to the RFI.
Participation, or lack thereof, in this
RFI process has no bearing on a party’s
ability or option to choose to participate
in or receive an award for any future
solicitation or procurement resulting
from this or any other activity.
Questions for Respondents
We are seeking insights and
recommendations as to how the Federal
Government can lead, assist, or
encourage other key stakeholders to
advance progress in the potential areas
of focus described below.
Please consider providing input on
these areas by addressing the questions
below:
•Which of the potential areas and
sub-areas of focus described below
should be prioritized for any potential
action? Please describe specific policy
solutions and estimated budget and
timeline required for implementation.
•What areas of focus are the most
time-sensitive or should be developed
first?
•What technical, policy or economic
challenges must the Government
consider when implementing these
solutions?
•Which of the potential areas and
sub-areas of focus described below
should be applied to other domains?
How might your policy solutions differ?
Respondents are not required to
respond to every topic and are
encouraged to focus on specific areas
that meet their specialized expertise.
Potential Areas of Focus
•Area: Secure Open-Source Software
Foundations
ÆSub-area: Fostering the adoption of
memory safe programming languages
•Supporting rewrites of critical
open-source software components
in memory safe languages
•Addressing software, hardware, and
database interdependencies when
refactoring open-source software to
memory safe languages
•Developing tools to automate and
accelerate the refactoring of open-
source software components to
memory safe languages, including
code verification techniques
•Other solutions to support this sub-
area
ÆSub-Area: Reducing entire classes of
vulnerabilities at scale
•Increasing secure by default
configurations for open-source
software development
•Fostering open-source software
development best practices,
including but not limited to input
validation practices
•Identifying methods to incentivize
scalable monitoring and verification
efforts of open-source software by
voluntary communities and/or
public-private partnerships
•Other solutions to support this sub-
area
ÆSub-Area: Strengthening the software
supply chain
•Designing tools to enable secure,
privacy-preserving security
attestations from software vendors,
including their suppliers and open-
source software maintainers
•Detection and mitigation of
vulnerable and malicious software
development operations and
behaviors
•Incorporating automated tracking
and updates of complex code
dependencies
•Incorporating zero trust architecture
into the open-source software
ecosystem
•Other solutions to support this sub-
area
ÆSub-Area: Developer education
•Integrating security and open-
source software education into
computer science and software
development curricula
•Training software developers on
security best practices
•Training software developers on
memory safe programming
languages
•Other solutions to support this sub-
area
•Area: Sustaining Open-Source
Software Communities and
Governance
ÆSustaining the open-source software
ecosystem (including developer
communities, non-profit investors,
and academia) to ensure that critical
open-source software components
have robust maintenance plans and
governance structures
ÆOther solutions to support this sub-
area
•Area: Behavioral and Economic
Incentives to Secure the Open-Source
Software cosystem
ÆFrameworks and models for software
developer compensation that
incentivize secure software
development practices
ÆApplications of cybersecurity
insurance and appropriately-tailored
software liability as mechanisms to
incentivize secure software
development and operational
environment practices
ÆOther solutions to support this sub-
area
VerDate Sep<11>2014 17:28 Aug 09, 2023 Jkt 259001 PO 00000 Frm 00028 Fmt 4703 Sfmt 4703 E:\FR\FM\10AUN1.SGM 10AUN1
ddrumheller on DSK120RN23PROD with NOTICES1
54317
Federal Register / Vol. 88, No. 153 / Thursday, August 10, 2023 / Notices
•Area: R&D/Innovation
ÆApplication of artificial intelligence
and machine learning techniques to
enhance and accelerate cybersecurity
best practices with respect to secure
software development
ÆOther solutions to support this sub-
area
•Area: International Collaboration
ÆMethods for identifying and
harmonizing shared international
priorities and dependencies
ÆStructures for intergovernmental
collaboration and collaboration with
various open-source software
communities
ÆOther solutions to support this sub-
area
This RFI seeks public input as the
Federal Government develops its
strategy and action plan to strengthen
the open-source software ecosystem. We
hope that potential respondents will
view this RFI as a civic opportunity to
help shape the government’s thinking
about open-source software security.
Comments must be received no later
than 5:00 p.m. ET October 9, 2023.
By October 9, 2023, all interested
respondents should submit a written
RFI response, in MS Word or PDF
format, with their answers to questions
on which they have expertise and
insights for the Government through
www.regulations.gov.
The written RFI response should
address ONLY the topics for which the
respondent has expertise. Inputs that
meet most of the following criteria will
be considered most valuable:
•Easy for executives to review and
understand: Content that is modularly
organized and presented in such a
fashion that it can be readily lifted (by
topic area) and shared with relevant
executive stakeholders in an easily
consumable format.
•Expert: The Government, through
this effort, is seeking insights to
understand current best practices and
approaches applicable to the above
topics, as well as new and emerging
solutions. The written RFI response
should address ONLY the topics for
which the respondent has knowledge or
expertise.
•Clearly worded/not vague: Clear,
descriptive, and concise language is
appreciated. Please avoid generalities
and vague statements.
•Actionable: Please provide enough
high-level detail so that we can
understand how to apply the
information you provide. Wherever
possible, please provide credible data
and specific examples to support your
views. If you cite academic or other
studies, they should be publicly
available to be considered.
•Cost effective & impactful:
Respondents should consider whether
their suggestions have a clear return on
investment that can be articulated to
secure funding and support.
•‘‘Gordian Knot’’ solutions and
ideas: Occasionally, challenges that
seem to be intractable and
overwhelmingly complex can be
resolved with a change in perspective
that unlocks hidden opportunities and
aligns stakeholder interests. We
welcome these ideas as well.
•All submissions are public records
and may be published on
www.regulations.gov. Do NOT submit
sensitive, confidential, or personally
identifiable information.
An additional appendix of no more
than 5 pages long may also be included.
This section should only include
additional context about you or your
organization.
Privacy Act Statement
Submission of comments is voluntary.
The information will be used to
determine focus and priority areas for
open-source software security and
memory-safety. Please note that all
comments received in response to this
notice will be posted in their entirety to
http://www.regulations.gov, including
any personal and business confidential
information provided. Do not include
any information you would not like to
be made publicly available.
Kemba E. Walden,
Acting National Cyber Director.
[FR Doc. 2023–17239 Filed 8–9–23; 8:45 am]
BILLING CODE 3340–D3–P
EXPORT-IMPORT BANK
[Public Notice: 2023–6040]
Agency Information Collection
Activities; Submission to the Office of
Management and Budget for Review
and Approval; Comment Request;
Annual Competitiveness Report
Survey of Exporters and Lenders
AGENCY
: Export-Import Bank of the
United States.
ACTION
: Notice of information collection;
request for comment.
SUMMARY
: The Export-Import Bank of
the United States (EXIM), invites the
general public and other Federal
Agencies to comment on the proposed
information collection, as required by
the Paperwork Reduction Act of 1995.
As required by Export-Import Bank Act
of 1945 (see section 8A(a)(1) of EXIM’s
charter), EXIM will survey U.S.
exporters and commercial lending
institutions to understand their
experience with EXIM ‘‘meeting
financial competition from other
countries whose exporters compete with
United States exporters.’’ EXIM plans to
survey exporters and lenders that have
engaged with EXIM on medium- and
long-term support over the previous
calendar year or responded to at least
one of EXIM’s last two surveys. The
potential respondents will be sent an
electronic invitation to participate in the
online survey.
DATES
: Comments should be received on
or before October 10, 2023 to be assured
of consideration.
ADDRESSES
: Comments may be
submitted electronically on
WWW.REGULATIONS.GOV (EIB 00–02)
or by email Jessica.Ernst@exim.gov or by
mail to Jessica Ernst, Export-Import
Bank of the United States, 811 Vermont
Ave. NW, Washington, DC 20571 Attn:
OMB 3048–14–01.
FOR FURTHER INFORMATION CONTACT
: For
specific questions related to collection
activities, please contact Jessica Ernst,
Jessica.Ernst@exim.gov, 202–565–3711.
SUPPLEMENTARY INFORMATION
: The
proposed survey will ask participants
about their potential or completed deals
involving EXIM, their opinion of EXIM’s
policies and procedures, their
interaction and perceptions of other
export credit agencies, and impacts of
overall market conditions on their
businesses.
The survey can be reviewed at:
https://img.exim.gov/s3fs-public/
EXIM+Competitiveness+
Report+Exporter+and+Lender+
Survey+2023.pdf.
Titles and Form Number: EIB 00–02
Annual Competitiveness Report Survey
of Exporters and Lenders.
OMB Number: 3048–0004.
Type of Review: Renewal.
Need and Use: The information
requested is required by the Export-
Import Bank Act of 1945, as amended,
12 U.S.C. 635g–1 (see section 8A(a)(1) of
EXIM’s charter) and enables EXIM to
evaluate and assess its competitiveness
with the programs and activities of
official export credit agencies and to
report on the Bank’s status in this
regard.
Affected Public:
The number of respondents: 100.
Estimated time per respondent: 15
minutes.
The frequency of response: Annually.
Annual hour burden: 25 total hours.
Dated: August 4, 2023.
Kalesha Malloy,
IT Specialist.
[FR Doc. 2023–17115 Filed 8–9–23; 8:45 am]
BILLING CODE 6690–01–P
VerDate Sep<11>2014 17:28 Aug 09, 2023 Jkt 259001 PO 00000 Frm 00029 Fmt 4703 Sfmt 9990 E:\FR\FM\10AUN1.SGM 10AUN1
ddrumheller on DSK120RN23PROD with NOTICES1