Codify — Article

SAFE Supply Chains Act: requires DoD to buy ICT only from OEMs or authorized resellers

Tightens Defense Department procurement to provenance-verified equipment, adds waiver, vendor-assistance, and reporting rules that reshape supplier compliance and oversight.

The Brief

The SAFE Supply Chains Act directs the Department of Defense to restrict its procurement and use of information and communications technology (ICT) end-use hardware and embedded software to products obtained directly from original equipment manufacturers (OEMs) or their authorized resellers. The statute defines covered products and authorized resellers, bars acquisition from other sources, and creates a narrowly scoped waiver regime plus vendor-assistance and reporting obligations.

This matters for contracting officers, suppliers, and cyber-risk teams because it shifts procurement emphasis to provenance and OEM chains of custody, alters who can lawfully sell ICT to the DoD, and establishes a formal transparency regime around exceptions. It also imposes compliance and transition costs without new appropriations, creating implementation frictions for supply-constrained programs and smaller vendors seeking reseller status.

At a Glance

What It Does

The bill conditions DoD’s purchase and use of ICT end-use hardware on sourcing from OEMs or authorized resellers and prohibits acquisition from other vendors except under limited, documented waivers. It tasks the Secretary of Defense with producing procurement guidance to help noneligible firms become authorized resellers.

Who It Affects

Primary targets are ICT manufacturers, aftermarket resellers, DoD contracting shops, system integrators and subcontractors who source hardware, and congressional defense oversight committees that will receive annual waiver and mitigation reports.

Why It Matters

By tying compliance to OEM provenance, the bill tightens supply-chain controls and effectively privileges OEM-authorized channels. That can reduce supply-chain risk but also concentrate purchasing power, change aftermarket markets, and require new contracting and vendor-management practices across the defense industrial base.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The Act creates a procurement rule that limits which ICT end-use hardware products the Department of Defense may lawfully acquire or use: only items sourced from an original equipment manufacturer or an authorized reseller. The bill supplies statutory definitions for key terms—‘authorized reseller,’ ‘covered product,’ ‘end-use product,’ ‘information and communications technology,’ and ‘original equipment manufacturer’—to make clear that the restriction targets hardware and the firmware/software integral to that hardware while excluding standalone software and non-ICT principal-function devices.

To avoid categorical inflexibility, the Secretary of Defense may grant waivers but only in two narrowly described scenarios: where the purchase is necessary for scientifically valid research or where refusal would jeopardize mission-critical functions. Each waiver requires prior notice to congressional defense committees that must explain the justification, describe any security mitigations in place, and, when mitigations are used, provide a plan and milestones to prevent future reliance on waivers.

The statute further demands an explicit declaration that the product is not being bought from an entity controlled by a foreign adversary; notices are submitted unclassified with the option for a classified annex.The bill directs the Secretary to issue procurement guidance aimed at helping firms that currently cannot participate as authorized resellers to gain authorization—essentially a transition pathway for aftermarket vendors and smaller suppliers. It also imposes an annual reporting obligation for six years: DoD must report counts and types of waivers granted, the legal basis for each waiver, and steps taken to reduce waivers to reach full compliance.

The statute becomes effective one year after enactment and carries an explicit prohibition on new appropriations for implementation, leaving agencies to absorb any compliance costs within existing budgets.Operationally, the Act interacts with existing federal acquisition law by stating the prohibition is effective notwithstanding certain provisions of title 41, U.S. Code (procurement statutes referenced in the bill), and by allowing the Federal Acquisition Regulation definitions to inform the scope of information and communications technology covered. The combination of a provenance-first procurement rule, an assistive transition mechanism for vendors, and an accountability-focused reporting regime is designed to shift DoD purchasing behavior while enabling congressional visibility into exceptions and mitigation plans.

The Five Things You Need to Know

1

The statute prohibits DoD from procuring, renewing contracts for, or using covered ICT products unless obtained from an OEM or an authorized reseller.

2

A waiver is available only for scientifically valid research or to avoid jeopardizing mission-critical functions, and must be accompanied by formal notice to congressional defense committees.

3

Waiver notices must include the justification, any security mitigations, a plan and milestones to avoid repeat waivers when mitigations are used, and a declaration that the vendor is not under the influence or control of a foreign adversary.

4

The Secretary must issue procurement guidance to help ineligible vendors become authorized resellers, creating an explicit transition process for aftermarket suppliers.

5

DoD must submit unclassified annual reports (with optional classified annexes) for six years detailing waiver counts/types, legal bases for waivers, and actions taken to reduce waivers; the Act takes effect one year after enactment and authorizes no new funding.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Section 1

Short title

Names the statute the ‘Securing America’s Federal Equipment Supply Chains Act’ or the ‘SAFE Supply Chains Act.’ This is purely editorial but signals the bill’s focus on supply-chain provenance and national-security justification.

Section 2(a)

Definitions for scope and coverage

Sets the technical boundaries the rest of the statute relies on. Key definitions: ‘authorized reseller’ (a reseller or aftermarket firm with a direct/prime contract or express written authority from the OEM to sell, service, or distribute the covered product); ‘covered product’ (ICT end-use hardware and its integral software/firmware, with explicit exclusions for standalone software and devices whose principal function is non-ICT); ‘original equipment manufacturer’ (firm that designed the product from sourced components and sells under its own name). These definitions matter because small changes in what counts as ‘authorized’ or ‘covered’ will determine which vendors are excluded or included under the procurement bar.

Section 2(b)

Procurement and use prohibition

Imposes the substantive rule: DoD may not procure, renew contracts for, or use covered products procured from entities other than an OEM or authorized reseller. The text explicitly states the prohibition applies notwithstanding specific procurement statutes in title 41, signaling congressional intent to override certain procurement flexibility. Practically, contracting officers will need to verify vendor status against OEM authorization before award or acceptance of hardware.

3 more sections
Section 2(c)

Waiver process and notice requirements

Allows the Secretary of Defense to waive the prohibition when necessary for scientifically valid research or to avoid jeopardizing mission-critical functions. Each waiver must be accompanied by notice to congressional defense committees that explains the waiver justification, lists security mitigations, and—if mitigations are used—provides a plan and milestones to eliminate future reliance on waivers. The notice must include a declaration that the vendor is not under foreign-adversary influence; it must be submitted in unclassified form with an optional classified annex. Waivers tied to research are limited to the duration of the identified research.

Section 2(d)

Vendor technical-assistance and transition guidance

Directs the Secretary to produce procurement guidance to assist firms currently ineligible to sell covered products to the DoD, describing the pathway to become an authorized reseller. This provision creates an explicit compliance pathway intended to reduce market disruption by enabling aftermarket and smaller vendors to meet OEM authorization requirements, though the statute does not fund these activities separately.

Sections 2(e)–(g)

Reporting, funding, and effective date

Requires DoD to submit annual unclassified reports (with possible classified annex) to the Armed Services Committees for one year after enactment and each year for five more years (six total). Reports must enumerate waiver instances, the legal authority used, and actions taken to reduce waivers. The Act prohibits any new appropriations for implementation and becomes effective one year after enactment, meaning agencies must plan for transition within existing budgets and a delayed compliance start date.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Defense across all five countries.

Explore Defense in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • DoD cybersecurity and supply-chain risk teams — gain clearer provenance rules and documented waiver/mitigation plans that improve traceability and oversight of critical ICT hardware.
  • Original equipment manufacturers — receive stronger market preference and protection for authorized channels, increasing control over distribution and aftermarket servicing.
  • Congressional defense oversight committees — obtain annual, unclassified reporting (with classified annex option) on waivers and mitigation plans, improving legislative visibility into exceptions and supply-chain risk management.

Who Bears the Cost

  • Secondary-market resellers and brokers — face exclusion from DoD purchases unless they obtain written OEM authorization, creating compliance burdens and potential loss of DoD market access.
  • DoD contracting offices and program managers — must implement verification processes, manage waiver notices, and produce required reports without additional appropriations, adding administrative workload and potential schedule risk.
  • Smaller defense suppliers and aftermarket service firms — will incur costs to seek OEM authorization (legal agreements, certifications, system changes) and may face cash-flow disruptions during transition.

Key Issues

The Core Tension

The statute pits supply-chain security and provenance assurance—reducing risks from uncertain or adversary-influenced sources—against procurement flexibility, market competition, and program continuity; strengthening provenance control protects systems but can concentrate sourcing, raise costs, and strain DoD contracting and small suppliers unless accompanied by funded transition support and sharply defined implementation rules.

The bill’s central operational choice—privileging OEM and OEM‑authorized channels—trades broadened provenance control for reduced procurement flexibility. That trade produces three sets of implementation questions.

First, the definitions leave room for interpretation: what constitutes ‘express written authority’ from an OEM; when does an aftermarket manufacturer qualify as an authorized reseller; and how do existing distributor agreements map to the statute’s standard? Contracting officers will need clear policy-level and FAR-aligned guidance to apply those concepts consistently.

Second, the waiver regime places oversight and transparency obligations on DoD but does not guarantee timeliness or resourcing. Waiver notices must be unclassified with possible classified annexes and include mitigation plans, but the statute forbids new funds—so DoD must absorb the burden administratively.

That creates a risk that programs facing urgent operational needs will rely on waivers while the department conducts costly mitigation measures, or conversely that programs will be delayed pending OEM-authorized sourcing.

Third, concentrating purchases through OEM-authorized channels could constrict supply during spikes in demand or when OEMs limit aftermarket support, potentially increasing costs or creating single-supplier dependencies. The vendor-assistance provision attempts to mitigate this by directing DoD to help vendors become authorized resellers, but without funding or explicit timelines this assistance may be limited in practice.

Finally, the requirement that waiver notices declare a vendor is not under foreign-adversary control raises evidentiary and intelligence-coordination issues—contracting officers will need clear standards and possibly classified support to make such determinations reliably.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.