Back to Frameworks

NIST SP 800-218 SSDF

United States
4 domains
42 controls

NIST SP 800-218 Secure Software Development Framework v1.1.

Verified

Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.

Framework Domains (4)

PO - Prepare the Organization

13 controls
Controls in the PO - Prepare the Organization domain of NIST SP 800-218 SSDF13 controls
CodeTitle
PO.1.1Identify and document security requirements for software development infrastructure and processes
PO.1.2Identify and document security requirements for organization-developed software
PO.1.3Communicate requirements to third parties providing commercial software components
PO.2.1Create roles and responsibilities for SDLC personnel
PO.2.2Provide role-based training for SDLC personnel
PO.2.3Foster a security-focused culture and management commitment
PO.3.1Specify which tools or tool types must be included in the toolchain
PO.3.2Deploy and maintain a secure toolchain
PO.3.3Configure tools to generate artifacts of provenance for audit
PO.4.1Define criteria for software security checks
PO.4.2Implement processes, mechanisms, etc. to collect and analyze information for criteria
PO.5.1Separate and protect each environment involved in software development
PO.5.2Secure and harden development endpoints

PS - Protect the Software

4 controls
Controls in the PS - Protect the Software domain of NIST SP 800-218 SSDF4 controls
CodeTitle
PS.1.1Store all forms of code based on least privilege, integrity, and provenance
PS.2.1Make software integrity verification information available to acquirers
PS.3.1Archive the necessary files and supporting data for each release
PS.3.2Collect, safeguard, maintain, and share provenance data for components

PW - Produce Well-Secured Software

16 controls
Controls in the PW - Produce Well-Secured Software domain of NIST SP 800-218 SSDF16 controls
CodeTitle
PW.1.1Use forms of risk modeling (e.g., threat modeling, attack modeling) to design
PW.1.2Track and maintain the software's security requirements, risks, and design decisions
PW.1.3Reuse existing, well-secured software when feasible
PW.2.1Have a qualified person review the software design to confirm compliance
PW.4.1Acquire and maintain well-secured software components from commercial, open-source, and other third-party developers
PW.4.2Create well-secured software components in-house following SDLC processes
PW.4.4Verify acquired commercial, open-source, and other third-party software components
PW.5.1Follow all secure coding practices appropriate to the development languages and environment
PW.6.1Use compiler, interpreter, and build tools that offer features to improve security
PW.6.2Determine which compiler, interpreter, and build tool features should be used and how each should be configured
PW.7.1Determine whether code review and/or code analysis should be used
PW.7.2Perform the code review and/or code analysis based on the organization's secure coding practices
PW.8.1Determine whether executable code testing should be performed to find vulnerabilities
PW.8.2Scope the testing, design the tests, perform the testing, and document the results
PW.9.1Define a secure baseline by determining how to configure each setting that has an effect on security
PW.9.2Implement the default settings (or groups of default settings) and document them

RV - Respond to Vulnerabilities

9 controls
Controls in the RV - Respond to Vulnerabilities domain of NIST SP 800-218 SSDF9 controls
CodeTitle
RV.1.1Gather information from purchasers, consumers, and public sources on potential vulnerabilities
RV.1.2Review, analyze, and/or test the software's code to identify or confirm vulnerabilities
RV.1.3Have a policy that addresses vulnerability disclosure and remediation
RV.2.1Analyze each vulnerability to gather sufficient information to plan its remediation
RV.2.2Develop and implement a remediation plan for each vulnerability
RV.3.1Analyze identified vulnerabilities to determine their root causes
RV.3.2Analyze the root causes over time to identify patterns
RV.3.3Review the SDLC to identify changes that could prevent root causes recurring
RV.3.4Inform stakeholders about vulnerabilities, mitigations, and lessons learned

Frequently Asked Questions

What is NIST SP 800-218 SSDF?

NIST SP 800-218 SSDF is a compliance framework from United States with 4 domains and 42 controls. NIST SP 800-218 Secure Software Development Framework v1.1. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.

How many controls does NIST SP 800-218 SSDF have?

NIST SP 800-218 SSDF has 42 controls organised across 4 domains. The largest domains are PW - Produce Well-Secured Software (16 controls), PO - Prepare the Organization (13 controls), RV - Respond to Vulnerabilities (9 controls). Each control defines specific requirements that organisations must implement to achieve compliance.

What frameworks does NIST SP 800-218 SSDF map to?

NIST SP 800-218 SSDF does not currently have cross-framework mappings in our system. Check back as we continuously expand our mapping database.

How do I get started with NIST SP 800-218 SSDF compliance?

Start your NIST SP 800-218 SSDF compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about NIST SP 800-218 SSDF requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 42 controls and track your progress.

Start Your Compliance Journey

Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 769 frameworks.

Get Started Free →

Free forever — no credit card required