The Proposed SAMOSA Act: The good, the Bad, and the Ugly

The Proposed SAMOSA Act: The good, the Bad, and the Ugly

The proposed SAMOSA Act is an exciting and needed initiative to reduce waste in the government’s spend on software and cloud, and it contains many valuable provisions. As currently written, however, the proposed act includes certain misguided provisions as well. More importantly, the proposed Act falls short of addressing the underlying root cause for ineffective IT/Software Asset Management (ITAM/SAM) in government and misses an opportunity to offer a comprehensive long-term solution.

Background

The proposed SAMOSA Act (Strengthening Agency Management and Oversight of Software Assets) is a bi-partisan bill (Senate version is: S.4908 led by Senators Gary Peters and Bill Cassidy, introduced in September 2022; House version is: H.R.9330 introduced in November 2022). The bill has the following components:

  • Sections 1 & 2 of the Act are the title and definitions.
  • Section 3 gives agencies one year to complete a comprehensive assessment of software entitlements and software inventory.
  • Section 4 gives agencies 120 days after submission of the above assessment to complete and submit an optimization plan aimed to consolidate, reduce costs and improve licensing terms. Specifically, the plan must include at least five categories of software that shall be prioritized for conversion to “Enterprise Agreements” (a term that is left undefined in the proposed Act).
  • Section 5 calls for the OMB Director to submit, within two years of the Act, a strategy for adopting enterprise agreements in government, procurement policies, software entitlement management, use of OpenSource, and others.
  • Section 6 calls for submission of reporting, within three years of the Act, around government trends related to the Act, agency comparison, and others.

The Good

Experience shows that waste in software and cloud can reach 30% or more, costing American taxpayers billions of dollars annually. Therefore, any legislation which promotes awareness of this waste and which drives greater transparency and cost savings in government is positive. Having a timely, complete, and accurate software and cloud inventory is also critical to achieving effective cybersecurity and other Information Technology objectives.

The Act refers to certain generally accepted IT Asset Management (ITAM) and Software Asset Management (SAM) practices, for example, understanding license entitlements, understanding license consumption, reconciling entitlements to consumption, and identifying risks and opportunities. Such practices, when implemented correctly in a repeatable way, result in greater transparency, reduced costs, and mitigated risks.

The Act’s clear requirement for agencies within one year to generate: “the current software inventory of the agency, including software entitlements, contracts and other agreements or arrangements of the agency,” is perhaps the most valuable component as it creates a level of transparency in software utilization, if only for a single point in time, which does not currently exist.

The Act’s focus on leveraging economies of scale and the collective bargaining power of the Federal government should be applauded. The government's purchasing power must be fully leveraged in all procurement negotiations with software vendors. This often means that certain procurement activities must be centrally managed.

The Act’s references to interoperability, limiting restrictions on licenses purchased, use of OpenSource software whenever possible, and others, are also generally positive and in line with industry best practices.

Importantly, tracking all software and cloud is critical to cybersecurity. This is well established in industry standards and best practices and is known as Cyber Asset Attack Surface Management (CAASM). The report from the Congressional investigation of the 2017 Equifax data breach is just one example demonstrating that organizations cannot secure the IT assets they don’t know they have. Legislation and guidance exist about cybersecurity aspects in software and cloud (from FedRAMP to the recent OMB M-22-18, as just a couple of examples), which agencies would need to address in conjunction with the proposed Act.

The Bad

The proposed Act falls short of calling for an overall governance framework for IT Assets (specifically software and cloud) in line with industry best practices. An example of such a framework is the ISO/IEC 19770-1 standard for IT Asset Management System, which establishes a cycle of continuous improvement (Plan-Do-Check-Act), addresses software/cloud cost optimization in its proper context of full lifecycle management, and considers dependencies with other critical IT objectives such as cybersecurity and Technology Business Management (TBM). To drive genuine long-term cost improvements, the Act should require an overall governance framework for ITAM, designating a minimum percentage of the total agency software and cloud spend (1% is considered a minimal industry best practice) to be invested in implementing the people, processes, and technology elements of an ITAM governance framework. This ITAM investment would generate a typical Return On Investment (ROI) through cost savings achieved in the double-digit orders of magnitude.

Instead, the proposed Act “cherry picks” certain isolated ITAM activities such as an inventory and an optimization analysis, requiring such activities to be done on a one-time basis which, lacking a systematic and repeatable management system, renders such exercises obsolete the moment they are completed. Moreover, the proposed Act fails to specify essential requirements. Examples include leveraging the FinOps methodology to optimize cloud consumption and rates, the cancellation of maintenance on undeployed software, the removal of deployed-but-not-used software, re-harvesting of license entitlements upon hardware retirement, the adoption of specific industry best practices for minimizing “shelfware as a service” in SaaS, and many other.

The proposed Act also fails to call for an ITAM/SAM "tsar" who can lead the adoption and execution of best practices across the government, driving the tracking, management, optimization, and cost-reduction efforts for all software and cloud assets across all agencies. Such a function may report to either the U.S. CIO, the OMB, the GSA, or elsewhere, and be the focal point accountable for all related requirements (the MEGABYTE Act, this proposed Act, and others) within the government. It would be key to ensure that this function has the resources and authority to carry out its responsibilities.

The proposed Act’s call to increase the use of OpenSource could be a double-edged sword. While the lack of license cost is attractive, some OpenSource may be more exposed to security vulnerabilities.

However, the biggest concern with the proposed Act relates to its misguided fixation on “Enterprise Agreements”, a phrase that can mean anything in the software industry depending on the terms and conditions specified. Some software vendors use this phrase relatively freely, merely as a marketing ploy to give their customers the impression that they are getting a “good deal”. The commercial merits of an agreement are more important than its title. In many cases, “Enterprise Agreements” fail to save customers money over the long run and all but ensure that customers are being charged for software they do not need nor will ever use.

Seemingly, the proposed Act’s intention here is to refer to a specific subset of enterprise agreements that are of the “unlimited“ (also known as “all you can eat”) type. Such “unlimited” agreements may look attractive in the short term to immature organizations lacking the ability to know how much software they need or have deployed, desiring to buy an “insurance policy” against an over-deployment of licenses, thus circumventing the need to track assets. Typically, the software vendor makes customers pay dearly for their ignorance. These agreements then make the situation even worse for the customer by further reducing motivation to have strong control over software deployment sprawl during the term of the agreement due to its perceived “unlimited” status.?Unfortunately, every party must eventually come to an end, and upon contract renewal time (usually after three years), deployment will have expanded out of control.?With the baseline now artificially much higher, the software vendor is handed all the negotiation power to charge large sums of money for the next term, starting a vicious cycle. The customer is now forced to sign a new “unlimited” agreement to account for the excessive baseline and, therefore, can never move off or renegotiate the contract.?Put another way, if the starting baseline includes waste, the solution must be to eliminate the waste, not to opt for unlimited waste at a fixed price for a fixed term (also known as “kicking the can down the road”).

Unlimited licensing agreements have an even bigger problem, however. The disincentive to track and manage software and cloud assets may result in cybersecurity risks. It is simply impossible to secure software and cloud assets that are not granularly tracked.

Mandating a specific arbitrary number of “Enterprise Agreements” to migrate to also makes little sense. For some agencies, that number may be zero or, in fact, negative (where achieving cost savings may mean the agency must move away from certain costly and wasteful agreements it already has in place).

Finally, the “Enterprise Agreements” requirement may give undue advantage to the larger software vendors, as has already been pointed out in the October 11 article by FedScoop’s? Nihal J. Krishan . Smaller vendors (including SaaS vendors) may have better products at better rates. Still, they have generally struggled to sell to the Federal government even before the new barriers raised in the proposed Act.

The American taxpayer does not benefit from lower competition and reduced ability to switch technology. Software procurement decisions must be based on factors such as (1) the product’s fit for purpose, (2) meeting critical requirements such as cybersecurity, and of course, (3) overall cost. It is unclear how the American people benefit if an arbitrary and undefined new “Enterprise Agreement” requirement overrides these fundamental factors in the future.

The Ugly

Prior legislation (MEGABYTE Act, FITARA, and their related guidance such as OMB M-16-02, M-16-12, and others) already cover many of the requirements in this proposed Act. Had such prior legislation been adopted and enforced in full, agencies would have had much more effective IT Asset Management today, saving American taxpayers billions of dollars. Unfortunately, the adoption of such existing legislation, at least as it relates to IT Asset Management practices, has largely been subpar and superficial over the years. This is due to a lack of organizational and individual accountability, a lack of budget and resources, and competing priorities. Simply having a new law repeating or augmenting some of the same requirements will not solve this underlying problem of accountability and resources.

Summary

The SAMOSA Act contains many valuable provisions, alongside a few misguided ones and others that still need to be included.

The Act should more precisely define ”Enterprise Agreements”, and require agencies to evaluate such agreements (whether or not already in use for material software vendors) for their actual cost reduction potential and flexibility of operation over the long term.

The Act should require a comprehensive governance framework for IT Assets such as ISO/IEC 19770-1 and the FinOps methodology for cloud financial management, to ensure government agencies evolve their maturity level in managing software and cloud costs to the next level, enabling the achievement of significant and repeatable savings and risk mitigation.

The Act should reinforce the need to comply with existing legislation, such as the MEGABYTE Act (2016). Also, to ensure agency execution around ITAM and cost reduction for software and cloud, the Act should require accountability and provide for the resources required. To drive meaningful long-term results, a minimum budget of 1% of the software and cloud spend should be allocated to the continuous tracking and management of software and cloud assets and to cost reduction efforts. Toward that end, the proposed Act should call for the appointment of an ITAM/SAM "tsar" responsible for all ITAM/SAM activities across the government. This function should be accountable for the execution of all relevant legislation and optimizing the government's use of software and cloud to drive cost savings.

Senators Peters and Cassidy should be applauded for their intention to tackle the waste in our government’s software and cloud supply chain. With a few modifications and the adoption of IT Asset Management (ITAM) industry best practices, the SAMOSA Act could realize its full potential and save the American people billions of dollars while strengthening our government’s cybersecurity posture at the same time.

#samosa #usgovernment #itam #itassetmanagement #sam #softwareassetmanagement #finops #cybersecurity #caasm #anglepoint

Andrea Miller

FOCP / CSAM / IT Account Executive

2 年

Our tax dollars at work. Sigh. Great article, thanks!

回复
Ron Brill

Chair at Anglepoint | Chair at ITAM Forum | Chair at ISO ITAM Standards Committee

2 年

What happened at NASA is a good example of the missed opportunity in the current SAMOSA Bill... None of NASA's fundamental issues would have been solved by a mandate to have more "enterprise agreements". There is no substitute for an ongoing ITAM/SAM program (covering people, processes, and technology), which the current Bill falls short of calling for. https://www.cio.com/article/419281/nasa-overspent-15-million-on-unused-oracle-licenses-as-it-failed-to-track-usage.html

AJ Witt

ITAM Industry Analyst at The ITAM Review

2 年

This really feels like govt treating SAM as a project, not a practice. Maybe that's by design, but ultimately it means like it will fail or get watered down like the other Acts you mention. Cracking name for a Bill though! Sometimes it seems more time is spent on that than formulating the actual legislation.

Jerry Nelson

Helping CIOs drive innovation with actionable business analytics

2 年

Great insights! Thanks for posting

回复

要查看或添加评论,请登录

Ron Brill的更多文章

社区洞察

其他会员也浏览了