Finite StateFinite State
Finite StateFinite State
NIST Defines “Critical Software” — What it Means for Software Vendors and Device Manufacturers
Software Supply Chain SecurityCompliance & Regulations

NIST Defines “Critical Software” — What it Means for Software Vendors and Device Manufacturers

NIST defines "critical software" — we discuss affects on software and device vendors, even if they don't sell to the Federal government.

Eric Greenwald, General Counsel

Eric Greenwald, General Counsel

July 12, 2021

by Eric Greenwald, Finite State General Counsel

On Friday, June 25, the National Institute of Standards and Technology (NIST) released their much anticipated definition of “critical software” as it pertains to the Biden Executive Order on Improving US Cybersecurity (EO 14028). Per NIST, EO-critical software is defined as any software that has, or has direct software dependencies upon, one or more components with at least one of these attributes:

  • is designed to run with elevated privilege or manage privileges;
  • has direct or privileged access to networking or computing resources;
  • is designed to control access to data or operational technology;
  • performs a function critical to trust; or,
  • operates outside of normal trust boundaries with privileged access

They define “direct dependencies” as follows (from their FAQ):


“For a given component or product, we mean other software components (e.g., libraries, packages, modules) that are directly integrated into, and necessary for operation of, the software instance in question. This is not a systems definition of dependencies and does not include the interfaces and services of what are otherwise independent products.”

“For a given component or product, we mean other software components (e.g., libraries, packages, modules) that are directly integrated into, and necessary for operation of, the software instance in question. This is not a systems definition of dependencies and does not include the interfaces and services of what are otherwise independent products.”

They also caveat the scope of the definition as follows (emphasis added): 


“The definition applies to software of all forms (e.g., standalone software, software integral to specific devices or hardware components, cloud-based software) purchased for, or deployed in, production systems and used for operational purposes.”

“The definition applies to software of all forms (e.g., standalone software, software integral to specific devices or hardware components, cloud-based software) purchased for, or deployed in, production systems and used for operational purposes.”

This last clause is meant to exclude research or testing software that is deployed outside of a production environment.

A Phased Approach

NIST has provided a preliminary list with several categories of software that will be subject to the “initial EO implementation phase.” There are two important things to note here: First, the Cybersecurity & Infrastructure Security Agency (CISA) is tasked under the EO with providing an “authoritative” list of software categories; and second, NIST does not define what “the initial phase” is (i.e., when it will start or when the next phase will start).

The preliminary list of software categories is as follows:

  • Identity, credential, and access management (ICAM)
  • Operating systems, hypervisors, container environments
  • Web browsers
  • Endpoint security
  • Network control
  • Network protection
  • Network monitoring and configuration
  • Operational monitoring and analysis
  • Remote scanning
  • Remote access and configuration management
  • Backup/recovery and remote storage

As expected, there are some categories that many deem critical that are not included in the initial phase of the EO-critical list; however, as we’ve noted before, even if your products do not fall into these categories, your organization should be prepared to follow the NIST guidelines anyway. 

Even if a particular category of software is excluded from the initial phase of EO implementation, agencies still have the discretion to require proof of security, as addressed later in the FAQ section of the NIST guidance:


If I am using a software product that is not included in the EO-critical list, but it is critical for me, can I ask the vendor to provide attestation?
Yes, departments and agencies can leverage the EO-critical security measures defined in Section 4(e) as part of a procurement.

If I am using a software product that is not included in the EO-critical list, but it is critical for me, can I ask the vendor to provide attestation?

Yes, departments and agencies can leverage the EO-critical security measures defined in Section 4(e) as part of a procurement.

In other words, vendors need to be prepared to comply with the EO requirements, as any procurement officer may look at what they are selling and determine that it is critical and needs to meet the EO’s requirements. Further, any vendors who do not comply with the EO will find themselves at a competitive disadvantage when vying for sales (whether government or commercial) when lining up against other vendors who do comply. 

About the Author

Finite State General Counsel Eric Greenwald previously served in the Obama White House as Special Assistant to the President, where he focused on protecting critical infrastructure as Senior Director for Cybersecurity on the National Security Council (NSC). Before his selection to the NSC, Eric was the Principal Deputy Director of the FBI’s National Cyber Investigative Joint Task Force and the Deputy Director of Operations at U.S. Cyber Command. Formerly an associate producer for CBS’s “60 Minutes” and for National Public Radio, Eric is a graduate of Yale University with a law degree from the University of Michigan Law School.

Tags

#regulation
Eric Greenwald, General Counsel

Eric Greenwald, General Counsel

Eric Greenwald is General Counsel at Finite State, bringing over 20 years of legal experience across government, tech, and national security. He previously served as Special Assistant to the President for Cybersecurity on the National Security Council and held senior roles at U.S. Cyber Command, the FBI, and the House Intelligence Committee.

Related Articles

Road to Compliance: First Steps OEMs and Suppliers Should Take Today

The Road to Compliance: First Steps OEMs and Suppliers Should Take Today

Learn how to achieve Connected Vehicle Rule compliance with six actionable steps — from SBOM & HBOM generation to supplier engagement and risk evaluat...

Oct 20, 2025
Legacy Software & CVR Compliance Carveouts Explained

Legacy Software & CVR Compliance Carveouts Explained

Learn how legacy carveouts and specific authorizations can help you comply with CVR—while time-limited, they demand proactive planning now.

Oct 16, 2025
Regulations Driving IoT Security Forward

Regulations Driving IoT Security Forward

From EU CRA to FDA 524B, IoT regulations are reshaping the market. Learn what manufacturers need for compliance—SBOMs, testing, and supply chain visib...

Sep 24, 2025

Ready to Level Up Your Security Knowledge?

Join thousands of security professionals learning from the best in the industry

Start Learning TodayStart Learning Today
Finite StateFinite State

Finite State is the Product Security Automation Platform that functions as an autonomous Product Security OS: design → verify → prove, grounded in what you ship.

Platform

Platform Overview
Ground Truth Inventory
Exploitability-Based Prioritization
Design-Time Architecture Security
Automated Evidence-Backed Compliance

Solutions

Device Manufacturers
Automotive
Medical Devices
Energy & Utilities
Government
Industrial

Resources

Blog
Resource Library
Webinars & Videos
Events
Documentation

Company

About Us
CareersHIRING
Press & Media
Contact Sales
X

Privacy PolicyTerms of UseCustomer Terms and Conditions