FISMA Update: What’s changing and why it matters
The Federal Information Security Management Act (FISMA) bill is getting an update. Read all the details about the new legislative requirements around software security that impact federal agencies.
Your Information will be kept private.
Stay up to date on web security trends
Your Information will be kept private.

In early October, the Homeland Security and Governmental Affairs Committee announced bipartisan legislation that’s set to make waves in federal civilian cybersecurity. This move to overhaul the Federal Information Security Management Act (FISMA) from 2014 is especially notable as the government became the most targeted sector over the past year, with high-profile incidents shedding light on several areas for improvement.
A lot has changed since 2014 when the FISMA bill was last updated by congress. Attacks like the 2020 SolarWinds hack – which uncovered gaps in security coverage for third-party service providers – prove that the threat has intensified. New requirements within the legislation enable greater transparency and accountability around software security, specifically for those who create or manage software in a federal capacity.
Covering the vast threat in government
A robust application security (AppSec) program is critical for scanning and testing web apps that, when left unchecked or mismanaged altogether, can leave entire agencies vulnerable to cybersecurity threats. Amendments to the legislation underscore just how vast the threat landscape can be, especially when varying agencies have their own processes and toolsets. To help offset these and other roadblocks, a handful of requirements will steer the way the government handles cybersecurity moving forward. Notable changes include:- Cutting the notification period for cyber breaches to 72 hours, which is more aligned with private sector breach notification standards.
- Requiring agency leaders to conduct the initial analysis of a breach, and, if necessary inform impacted citizens within 30 days of the incident.
- Understanding strengths and weaknesses of various agencies to improve processes, reinforce collaboration, and share security responsibilities.