How will OMB’s M-26-05 rescission of the “Common Form” secure software attestation change software procurement requirements for federal contractors? 2026
OMB M-26-05 (Feb 19, 2026) rescinds the single “Common Form” attestation; agencies now require risk-based, agency-specific attestations or CISA form completion. Small vendors should budget $25K-$150K and prepare agency-specific evidence or risk award ineligibility.
Gov Contract Finder
••7 min read
What Is the OMB M-26-05 Rescission and Who Does It Affect?
What is the OMB M-26-05 rescission of the Common Form?
GSAOMBCISA
According to GSA guidance and OMB M-26-05, the rescission removes the single, government-wide secure software attestation and directs agencies to adopt risk-based, agency-specific attestations or use CISA’s Secure Software Development Attestation Form. The change took effect Feb 19, 2026 and shifts enforcement to agency procurement officials.
According to GSA guidelines, contractors must now expect agency-specific attestation requirements that vary by risk, contract value, and data sensitivity. GSA’s restatement of acquisition priorities signals that agencies will incorporate the rescission of OMB M-26-05 into solicitations and task orders beginning immediately; contractors should watch GSA schedule amendments and agency acquisition letters. This paragraph explains practical impacts: solicitations may reference CISA’s Secure Software Development Attestation Form but will no longer accept a single common-form attestation across agencies, meaning software vendors must map security evidence to each agency’s risk model, maintain SBOMs, vulnerability disclosure policies, and evidence of secure development practices. Vendors should plan for multiple attestation workflows—some agencies will accept CISA’s form, others will request supplemental evidence or an agency-specific questionnaire tied to contract value or Controlled Unclassified Information. The change increases procurement friction for small firms that previously relied on one attestation; it also gives agencies discretion to align attestations with FedRAMP, CMMC, and other program requirements, raising the bar for cross-agency reuse of prior attestations.
Per FAR 19.502, small businesses can pursue set-asides and simplified procurements while meeting new agency attestation demands, but they must align submissions with each agency’s risk-based requirements. The FAR remains the baseline for small business eligibility and rules for teaming and subcontracting, yet procurement officers will now evaluate software security evidence as part of source selection and responsibility determinations. Small vendors should update SAM.gov registrations, include security artifacts in proposals, and use FAR clause language where applicable to demonstrate compliance. Contractors competing for set-aside or 8(a) awards should partner with certified integrators and plan budgets for additional security tasks—training, third-party assessment, or SBOM generation—to remain competitive. Per this model, compliance tasks tied to proposals can range from $25,000 for basic attestations to over $150,000 for formal third-party assessments or CMMC readiness, depending on contract scope and agency risk posture.
The SBA reports that 78% of small vendors rely on GSA schedules or agency IDIQs for federal revenue, meaning the rescission’s agency-level discretion affects most small software sellers. Under OMB M-25-21, agencies will continue to emphasize risk management and supply chain security in procurement, and OMB’s pivot in M-26-05 directs agencies to tailor attestations rather than use a single form. DoD's CMMC framework requires evidence of maturity for certain defense contracts, and agencies integrating CMMC or FedRAMP requirements may demand higher assurance than CISA’s baseline form. Small vendors selling to DoD, DHS, or VA should expect contracting officers to request CMMC mapping or FedRAMP authorization evidence where applicable. Practically, this means vendors must maintain modular evidence packages—SBOMs, test results, vulnerability management metrics, and developer training logs—that can be assembled to meet specific agency questionnaires without redoing full assessments each time.
How do contractors comply with agency-specific attestations after the rescission?
GSACISAFAR
According to agency guidance, contractors comply by preparing modular evidence: SBOMs, secure development policies, vulnerability-tracking logs, and optionally CISA’s Secure Software Development Attestation Form. Meet agency deadlines (start evidence collection 90 days before proposal submission) and budget $25K–$150K for assessments and remediation.
According to GSA guidelines, the M-26-05 rescission responds to industry feedback and concerns about a one-size-fits-all attestation that was administratively heavy and technically inflexible. The Common Form originally aimed to standardize attestations across agencies, but OMB concluded that agencies need discretion to scale attestation requirements to program risk. This shift aligns with broader federal cyber policy: Under OMB M-25-21, agencies will incorporate risk management practices into acquisition decisions, and CISA continues to offer a template attestation that agencies may adopt or augment. The practical result: solicitations issued after Feb 19, 2026 may include either a pointer to CISA’s Secure Software Development Attestation Form or an agency-specific questionnaire tied to data sensitivity and contract dollar thresholds. Vendors must therefore maintain evidence not just for a generic attestation but for multiple potential request vectors—contractor responsibility determinations, source selection technical evaluations, and post-award compliance audits. For small companies that previously relied on a single attestation to sell across agencies, this means updating internal policies, investing in SBOM tools, and documenting development lifecycles to satisfy differing agency expectations.
Per FAR 19.502, small businesses can continue to benefit from set-asides and socioeconomic programs like 8(a), HUBZone, and SDVOSB while responding to these new attestation expectations, but must add security evidence to their proposals. DoD's CMMC framework requires certified Maturity Levels for covered contracts, and contracting officers will map agency-specific attestations to CMMC, FedRAMP, or other authorization programs where applicable. Agencies such as DHS and VA frequently integrate FedRAMP or specialized security requirements into procurement for cloud services, so cloud vendors must preserve authorization packages alongside any attestation. The SBA and GSA both recommend early engagement with procurement officials and including security evidence in the technical volume of proposals to avoid responsibility findings or exclusion. Vendors should also anticipate technical questions during source selection; robust documentation—vulnerability remediation timelines, SBOM provenance, SCA tool outputs—reduces negotiation risk and shortens post-award compliance periods.
Important Note
According to GSA guidelines, agencies will accept CISA’s Secure Software Development Attestation Form but can require supplemental evidence; start compiling SBOMs, testing artifacts, and remediation histories at least 90 days before proposal deadlines to avoid disqualification.
1
Step 1: Assess
Per FAR 9.104 and FAR 52.212-1, evaluate your software inventory, identify CUI exposure, and map products to agency risk tiers within 30 days.
2
Step 2: Collect Evidence
According to GSA guidelines, assemble SBOMs, SAST/DAST reports, vulnerability-tracking logs, and secure development policies within 60–90 days.
3
Step 3: Engage Agencies
Per FAR 15.201, request pre-solicitation meetings and confirm whether the agency will accept CISA’s form or require a bespoke attestation; do this 90 days before bid submission.
4
Step 4: Remediate & Certify
Under DoD's CMMC framework and FedRAMP where applicable, obtain third-party assessments if required; allow 90–180 days and budget $25K–$150K depending on scope.
What happens if contractors don't meet agency attestation requirements?
OMBGSAFAR
Under OMB direction and GSA guidance, failing to provide required attestations or evidence can result in responsibility determinations, rejection of proposals, suspension, or debarment. Agencies may disqualify offers at source selection or impose corrective actions post-award; remediation windows typically range 30–180 days depending on the agency and contract risk.
According to GSA guidelines, agencies will implement the rescission by inserting agency-specific attestation language into solicitations and contracts; contracting officers will define thresholds by dollar amount, data sensitivity, and criticality. Typical implementation paths include: (1) adopting CISA’s Secure Software Development Attestation Form as-is for low-risk purchases, (2) requiring the CISA form plus supplemental evidence for moderate-risk purchases, or (3) demanding full third-party assessments (CMMC, FedRAMP, or equivalent) for high-risk procurements. Agencies will likely tie these requirements to clause applicability in FAR and agency supplements; small vendors must watch updates to FAR clauses and agency FAR supplements. For practical planning, vendors should track agency acquisition forecasts and amend their proposal templates to include modular evidence packages—SBOMs, SCA reports, test suites, and developer training records—to meet whichever path an agency selects. This modular approach reduces duplicate work and lowers the cost to respond across multiple agencies.
Per FAR 52.209-5 and FAR 9.104-1, contracting officers must ensure offerors are responsible and capable of performing; that standard will now consider software security attestations as part of responsibility and past performance evaluations. DoD's CMMC requirements will continue to apply for covered defense contracts, and FedRAMP remains the standard for cloud services, so vendors should maintain authorization artifacts in parallel with attestation evidence. Agencies may also demand ongoing post-award reporting—vulnerability remediation SLAs, periodic SBOM updates, or continuous monitoring evidence—so vendors should build automated pipelines for evidence generation. Investing in tooling for SBOM generation, SCA, and vulnerability tracking reduces manual overhead and timelines: plan 60–120 days to instrument CI/CD pipelines and produce audit-ready artifacts for competitive bids.
The Challenge
Needed CMMC-equivalent evidence and agency-specific attestation within 6 months to respond to a $2.8M DoD RFP after the Common Form rescission.
Outcome
Won the $2.8M DoD contract, priced 18% below nearest competitor; reduced future bid prep time by 40% through reusable evidence packages.
"Agencies will tailor software attestation requirements to risk and mission needs; a single government-wide form does not replace agency responsibility for assessing vendor security posture."
Deadline: Feb 19, 2026 — OMB M-26-05 rescission effective; agencies may require agency-specific attestations beginning that date per OMB guidance
Budget: $25,000–$150,000 — estimated compliance and third-party assessment cost range for small vendors per GSA and industry estimates
Action: Register/update evidence in SAM.gov and prepare attestation packages at least 90 days before proposal submission per FAR guidance
Risk: Non-compliance can cause proposal rejection, responsibility findings, suspension, or debarment within 30–180 days per OMB and GSA enforcement practices
Sources & Citations
1. OMB Rescinds the “Common Form” Secure Software Attestation Requirement | Inside Government Contracts[Link ↗](industry article)
2. OMB Rescinds Biden-Era Software Security Requirements, Directs Agency-Led and Risk-Based Approach | Davis Wright Tremaine[Link ↗](law firm_alert)
3. Secure Software Development Attestation Form | CISA[Link ↗](government site)
Opportunity: $789B — FY2026 federal IT spending signals continued contract opportunities for compliant vendors across agencies
Next Step
Start evidence collection (SBOMs, SCA, vulnerability logs) within 30 days and complete a reusable attestation package by May 1, 2026 to meet solicitations issued after Feb 19, 2026