Product
Everything you need to secure code, cloud, and runtime– in one central system
Code
Dependencies
Prevent open-source risks (SCA)
Secrets
Catch exposed secrets
SAST
Secure code as its written
Container Images
Secure images easily
Malware
Prevent supply chain attacks
Infrastructure as Code
Scan IaC for misconfigurations
License Risk & SBOMs
Avoid risk, be compliant
Outdated Software
Know your EOL runtimes
Cloud
Cloud / CSPM
Cloud misconfigurations
DAST
Black-box security testing
API Scanning
Test your API’s for vulns
Virtual Machines
No agents, no overhead
Kubernetes Runtime
soon
Secure your container workloads
Cloud Search
Cloud sprawl, solved
Defend
Runtime Protection
In-app Firewall / WAF
Features
AI AutoFix
1-click fixes with Aikido AI
CI/CD Security
Scan before merge and deployment
IDE Integrations
Get instant feedback while coding
On-Prem Scanner
Compliance-first local scanning
Solutions
Use Cases
Compliance
Automate SOC 2, ISO & more
Vulnerability Management
All-in-1 vuln management
Secure Your Code
Advanced code security
Generate SBOMs
1 click SCA reports
ASPM
End-to-end AppSec
CSPM
End-to-end cloud security
AI at Aikido
Let Aikido AI do the work
Block 0-Days
Block threats before impact
Industries
FinTech
HealthTech
HRTech
Legal Tech
Group Companies
Agencies
Startups
Enterprise
Mobile apps
Manufacturing
Pricing
Resources
Developer
Docs
How to use Aikido
Public API docs
Aikido developer hub
Changelog
See what shipped
Security
In-house research
Malware & CVE intelligence
Learn
Software Security Academy
Trust Center
Safe, private, compliant
Blog
The latest posts
Open Source
Aikido Intel
Malware & OSS threat feed
Zen
In-app firewall protection
OpenGrep
Code analysis engine
Integrations
IDEs
CI/CD Systems
Clouds
Git Systems
Compliance
Messengers
Task Managers
More integrations
About
About
About
Meet the team
Careers
We’re hiring
Press Kit
Download brand assets
Calendar
See you around?
Open Source
Our OSS projects
Customer Stories
Trusted by the best teams
Partner Program
Partner with us
Contact
Login
Start for Free
No CC required
Aikido
Menu
Aikido
EN
EN
FR
JP
DE
PT
Login
Start for Free
No CC required
Learn
/
Compliance Frameworks Hub
/
Chapter 1Chapter 2Chapter 3

NIST SSDF (SP 800-218)

6minutes read80

Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter
Next Chapter
Previous Chapter

TL;DR

NIST SSDF is a high-level framework for building secure software across the SDLC.

Organized into 4 buckets: Prepare, Protect, Produce, Respond.

Integrates OWASP, SAFECode, and real-world best practices.

It’s about secure-by-design, not compliance theater—and it's a must if you're building software for the U.S. government or care about your supply chain.

NIST SSDF (SP 800-218) Scorecard Summary:

  • Developer Effort: Moderate (Focuses on integrating secure practices developers should ideally already be learning/doing – threat modeling, secure coding, testing, vuln management). Effort lies in formalizing and consistently applying these practices.
  • Tooling Cost: Moderate (Relies heavily on standard DevSecOps tooling: SAST, DAST, SCA, IAST, threat modeling tools, secure repositories, vulnerability management platforms).
  • Market Impact: High (Increasingly important due to US federal requirements via EO 14028; considered best practice for secure SDLC globally, influences supply chain security expectations).
  • Flexibility: High (Provides practices and tasks, not rigid controls; adaptable to various SDLC models like Agile, Waterfall, DevOps).
  • Audit Intensity: Moderate (No formal certification, but requires self-attestation for federal suppliers; assessments focus on demonstrating implementation of the practices).

What is NIST SSDF (SP 800-218)?

NIST Special Publication 800-218, Secure Software Development Framework (SSDF) Version 1.1, provides a set of recommended high-level practices for building secure software. It’s designed to be integrated into any SDLC model (Agile, DevOps, Waterfall, etc.) to help software producers reduce vulnerabilities, mitigate the impact of any remaining flaws, and address root causes to prevent recurrence.

The NIST SSDF isn't prescriptive about how exactly to implement things; it defines what outcomes should be achieved. It organizes these outcomes into Practices, which are grouped into four categories reflecting the lifecycle:

  1. Prepare the Organization (PO): Getting people, processes, and technology ready.
    • Examples: Define security roles/responsibilities (PO.1), implement supporting processes (PO.2), define security requirements (PO.3).
  2. Protect the Software (PS): Safeguarding software components from tampering.
    • Examples: Protect all forms of code from unauthorized access/tampering (PS.1), provide mechanisms for verifying software release integrity (PS.2), archive and protect release components (PS.3).
  3. Produce Well-Secured Software (PW): Minimizing vulnerabilities during development.
    • Examples: Design software to meet security requirements/mitigate risks (PW.1), review design for compliance (PW.2), reuse secure, existing software (PW.3), create source code adhering to secure coding practices (PW.4), configure build process securely (PW.5), review and test code (PW.6/PW.7), configure software for secure deployment (PW.8).
  4. Respond to Vulnerabilities (RV): Identifying and addressing vulnerabilities post-release.
    • Examples: Identify and analyze vulnerabilities (RV.1), assess, prioritize, and remediate vulnerabilities (RV.2), analyze root causes (RV.3).

Each Practice is further broken down into Tasks (specific actions) and includes Notional Implementation Examples (suggestions for tools/processes) and References (pointers to established practices like OWASP SAMM, BSIMM).

The NIST SSDF gained prominence with the US Executive Order 14028 on Improving the Nation's Cybersecurity, which mandated federal agencies only use software from producers who attest to following secure development practices like those in the SSDF.

Why is it Important?

The NIST SSDF is significant for several reasons:

  • Addresses Root Causes: Focuses on integrating security throughout the SDLC to prevent vulnerabilities, not just find them later.
  • Common Language: Provides a shared vocabulary for discussing secure development practices between developers, security teams, and acquirers.
  • Flexibility: Adaptable to any development methodology and organizational context.
  • Consolidates Best Practices: Builds upon proven practices from respected sources like OWASP, SAFECode, and BSA.
  • Software Supply Chain Security: Provides a foundation for improving the security of the software supply chain, a major focus of recent cyber threats and regulations.
  • Federal Requirements: Essential for software producers selling to the US federal government due to EO 14028 and associated OMB memorandums (like M-22-18) requiring self-attestation.
  • Industry Benchmark: Increasingly seen as a benchmark for secure development practices even outside federal requirements.

Adopting the NIST SSDF helps build more secure software from the ground up, reduce rework caused by fixing late-stage vulnerabilities, and meet growing customer and regulatory expectations for software security.

What and How to Implement (Technical & Policy)

Implementing the NIST SSDF involves integrating its Practices and Tasks into your existing SDLC:

  1. Prepare the Organization (PO):
    • Define roles (Security Champions, AppSec team).
    • Implement policies for secure development, vulnerability management, disclosure.
    • Provide role-based security training for developers, testers, architects.
    • Define and communicate security requirements applicable to software development.
  2. Protect the Software (PS):
    • Use version control systems (e.g., Git) with strong access controls.
    • Implement code signing or other mechanisms to verify release integrity.
    • Use artifact repositories (e.g., Artifactory, Nexus) with security scanning.
    • Securely archive past releases.
  3. Produce Well-Secured Software (PW):
    • Threat Modeling (PW.1): Integrate threat modeling into the design phase (e.g., using STRIDE).
    • Secure Design Review (PW.2): Review architecture/design against security requirements.
    • Secure Component Reuse (PW.3/PW.4): Use Software Composition Analysis (SCA) tools to vet open-source components; follow secure coding standards (e.g., OWASP Secure Coding Practices).
    • Secure Build Process (PW.5): Harden CI/CD pipelines, scan build artifacts.
    • Code Review (PW.6): Implement mandatory, security-focused code reviews (manual or tool-assisted).
    • Security Testing (PW.7): Integrate SAST, DAST, IAST, and manual penetration testing throughout the SDLC.
    • Secure Configuration (PW.8): Define secure default configurations; scan Infrastructure as Code (IaC).
  4. Respond to Vulnerabilities (RV):
    • Vulnerability Identification (RV.1): Aggregate findings from various tools (SAST, DAST, SCA, bug bounty, etc.) into a central system.
    • Remediation (RV.2): Use a vulnerability management platform to track, prioritize (e.g., using CVSS, EPSS), assign, and verify fixes within defined SLAs.
    • Root Cause Analysis (RV.3): Analyze systemic issues leading to recurring vulnerabilities and update processes/training.

Implementation often involves selecting and integrating appropriate security tools (SAST, DAST, SCA, IAST, secrets scanning, IaC scanning) into the CI/CD pipeline and developer workflow, along with establishing clear processes and providing training. Aikido Security, for example, integrates multiple scanners (SCA, SAST, Secrets, IaC, etc.) into a single platform to help address PW and RV practices.

Common Mistakes to Avoid

When adopting the NIST SSDF, watch out for these pitfalls:

  1. Treating it as a Rigid Standard: The NIST SSDF is flexible guidance; trying to implement every example literally without adapting to your context is inefficient. Focus on the outcome of each Practice.
  2. Lack of Organizational Buy-In (PO): Failing to establish clear roles, responsibilities, training, and supporting policies before diving into technical implementation.
  3. Tool-Focused Implementation: Buying tools without integrating them properly into the SDLC workflow or addressing the underlying process and people aspects.
  4. Ignoring Existing SDLC: Trying to bolt on SSDF practices without considering how they fit naturally into your current development process (Agile sprints, CI/CD stages, etc.).
  5. Insufficient Training: Expecting developers to follow secure practices without providing adequate, role-specific training.
  6. Poor Vulnerability Management (RV): Identifying vulnerabilities but lacking a clear process for prioritization, remediation tracking, and root cause analysis.
  7. Focusing Only on "Produce" (PW): Neglecting the crucial preparation (PO), protection (PS), and response (RV) aspects.

What Auditors/Assessors Might Ask (Developer Focus)

While there's no formal NIST SSDF audit, organizations attesting compliance (especially for federal contracts) might undergo assessments. Questions for dev teams could include:

  • (PO.1) "How are security responsibilities defined and assigned within the development team?"
  • (PO.4) "What security training have developers received recently?"
  • (PS.1) "How do you control access to source code repositories?"
  • (PW.1) "Can you show evidence of threat modeling performed for this application?"
  • (PW.4) "What secure coding standards or guidelines does the team follow? How is compliance checked?"
  • (PW.6/PW.7) "Describe your code review process. What security testing tools (SAST, DAST, SCA) are integrated into your CI/CD pipeline? Show me recent results."
  • (PW.8) "How do you ensure secure configurations for deployed applications and infrastructure?"
  • (RV.1/RV.2) "Walk me through your process for handling a newly discovered vulnerability in a third-party library."

Assessors look for documented processes, evidence of tool usage (scan reports, threat models), training records, and consistent application of secure practices throughout the SDLC.

Quick Wins for Development Teams

Getting started with NIST SSDF alignment can begin with achievable steps:

  1. Basic SAST/SCA Integration (PW.7): Add automated static analysis and software composition analysis tools to your main CI pipeline.
  2. Secrets Scanning (PW.4/PS.1): Implement automated scanning to prevent committing secrets to code repositories.
  3. Mandatory Code Reviews (PW.6): Enforce peer reviews for all code changes, perhaps using a simple security checklist.
  4. Dependency Updates (RV.2): Establish a basic process for regularly updating vulnerable third-party libraries.
  5. OWASP Top 10 Training (PO.4): Provide developers with foundational training on common web vulnerabilities.
  6. Simple Threat Modeling (PW.1): Start incorporating basic threat modeling (e.g., whiteboard sessions during design) for new features.

Ignore This And... (Consequences of Non-Compliance)

While NIST SSDF itself doesn't carry direct fines, ignoring its principles (especially if subject to US federal requirements) can lead to:

  • Inability to Sell to US Government: Failure to provide the required self-attestation based on SSDF practices can block software sales to federal agencies.
  • Increased Vulnerabilities: Not following secure development practices directly leads to more security flaws in released software, increasing breach risk.
  • Higher Remediation Costs: Fixing vulnerabilities later in the SDLC (or after release) is significantly more expensive than preventing them early.
  • Supply Chain Risk: Producing insecure software contributes to broader software supply chain risks for your customers.
  • Reputational Damage: Releasing software with significant, preventable vulnerabilities damages trust and reputation.
  • Inefficient Development: Lack of secure practices can lead to rework, delays, and unpredictable security fire drills.

FAQ

Is NIST SSDF (SP 800-218) mandatory?

It's not mandatory for all organizations. However, compliance (via self-attestation) is required for software producers selling to the U.S. federal government, as mandated by Executive Order 14028 and OMB Memo M-22-18. It's considered a best practice framework for all software producers.

Is there a NIST SSDF certification?

No, NIST does not offer a certification for the SSDF. Compliance is demonstrated through self-attestation, particularly for federal suppliers. Third-party assessments can validate this attestation but don't result in a formal NIST certificate.

How does NIST SSDF relate to NIST CSF or NIST 800-53?

The NIST SSDF focuses specifically on secure software development practices throughout the SDLC. The NIST CSF is a broader framework for managing overall organizational cybersecurity risk. NIST 800-53 is a detailed catalog of security/privacy controls. SSDF practices help implement certain CSF functions (like Protect, Detect) and specific 800-53 controls related to software development (like the SA - System Acquisition family).

How does NIST SSDF relate to OWASP SAMM or BSIMM?

The NIST SSDF drew heavily from established models like OWASP SAMM (Software Assurance Maturity Model) and BSIMM (Building Security In Maturity Model). SSDF provides a higher-level set of practices, while SAMM and BSIMM offer more detailed maturity models and activity descriptions. They are complementary; an organization might use SAMM or BSIMM to assess and improve the specific activities that support SSDF practices.

Can the SSDF be applied to Agile/DevOps?

Yes, absolutely. The NIST SSDF is designed to be methodology-agnostic. Its practices and tasks can and should be integrated into Agile sprints, CI/CD pipelines, and DevOps workflows (e.g., automating security tests, threat modeling iteratively).

What is the Secure Software Attestation Form?

This is the form required by OMB Memo M-22-18 where software producers selling to the US federal government must attest that their software was developed following secure practices aligned with the NIST SSDF.

Does following the SSDF guarantee secure software?

No process can guarantee 100% secure software. However, consistently applying the NIST SSDF practices significantly reduces the likelihood of vulnerabilities, mitigates the impact of flaws, and fosters a more secure development culture, leading to demonstrably more secure software products.

Jump to:
Text Link

Security done right.
Trusted by 25k+ orgs.

Start for Free
No CC required
Book a demo
Share:

www.aikido.dev/learn/software-security-tools/nist-ssdf

Table of contents

Chapter 1: Understanding Compliance Frameworks

What Are Compliance Frameworks and Why Do They Matter?
How Compliance Frameworks Affect DevSecOps Workflows
Common Elements Across Frameworks

Chapter 2: Major Compliance Frameworks Explained

SOC 2 Compliance
ISO 27001
ISO 27017 / 27018
NIST SP 800-53
NIST SSDF (SP 800-218)
OWASP ASVS
GDPR
NIS2 Directive
DORA
EU Cyber Resilience Act (CRA)
CMMC
PCI DSS
FedRAMP
HIPAA / HITECH
Essential Eight
Singapore CCoP (for CII)
Japan Cybersecurity Act & Related (APPI)

Chapter 3: Implementing Compliance in Development

Choosing the Right Frameworks for Your Organization
Building Compliant DevSecOps Pipelines
Training Development Teams for Compliance
Audit Preparation for Developers
Maintaining Compliance Long-Term
The End

Related blog posts

See all
See all
June 4, 2024
•
Compliance

SOC 2 certification: 5 things we learned

What we learned about SOC 2 during our audit. ISO 27001 vs. SOC 2, why Type 2 makes sense, and how SOC 2 certification is essential for US customers.

January 16, 2024
•
Compliance

NIS2: Who is affected?

Who does NIS2 apply to? Who does it affect? What are essential and important sectors and company size thresholds? Aikido's app has a NIS2 report feature.

December 5, 2023
•
Compliance

ISO 27001 certification: 8 things we learned

What we wished we'd known before starting the ISO 27001:2022 compliance process. Here are our tips for any SaaS company going for ISO 27001 certification.

Company
ProductPricingAboutCareersContactPartner with us
Resources
DocsPublic API DocsVulnerability DatabaseBlogIntegrationsGlossaryPress KitCustomer Reviews
Security
Trust CenterSecurity OverviewChange Cookie Preferences
Legal
Privacy PolicyCookie PolicyTerms of UseMaster Subscription AgreementData Processing Agreement
Use Cases
ComplianceSAST & DASTASPMVulnerability ManagementGenerate SBOMsWordPress SecuritySecure Your CodeAikido for MicrosoftAikido for AWS
Industries
For HealthTechFor MedTechFor FinTechFor SecurityTechFor LegalTechFor HRTechFor AgenciesFor EnterpriseFor PE & Group Companies
Compare
vs All Vendorsvs Snykvs Wizvs Mendvs Orca Securityvs Veracodevs GitHub Advanced Securityvs GitLab Ultimatevs Checkmarxvs Semgrepvs SonarQube
Connect
hello@aikido.dev
LinkedInX
Subscribe
Stay up to date with all updates
Not quite there yet.
👋🏻 Thank you! You’ve been subscribed.
Team Aikido
Not quite there yet.
© 2025 Aikido Security BV | BE0792914919
🇪🇺 Registered address: Coupure Rechts 88, 9000, Ghent, Belgium
🇪🇺 Office address: Gebroeders van Eyckstraat 2, 9000, Ghent, Belgium
🇺🇸 Office address: 95 Third St, 2nd Fl, San Francisco, CA 94103, US
SOC 2
Compliant
ISO 27001
Compliant