Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Secure By Design
  3. Secure by Design Pledge
Share:
A colorful background with icons

Secure by Design Pledge

Overview

This is a voluntary pledge focused on enterprise software products and services, including on-premises software, cloud services, and software as a service (SaaS). Physical products such as IoT devices and consumer products are not scoped in the pledge, though companies who wish to demonstrate progress in those areas are welcome to do so.

By participating in the pledge, software manufacturers are pledging to make a good-faith effort to work towards the goals listed below over the following year. In the case where a software manufacturer is able to make measurable progress towards a goal, the manufacturer should publicly document how they have achieved such progress within one year of signing the pledge. Where the software manufacturer is not able to make measurable progress, the manufacturer is encouraged to, within one year of signing the pledge, share with CISA how the manufacturer has worked towards the goal and any challenges faced. And, in the spirit of radical transparency, the manufacturer is encouraged to publicly document their approach so that others can learn. This pledge is voluntary and not legally binding.

Products designed with Secure by Design principles prioritize the security of customers as a core business requirement, rather than merely treating it as a technical feature. During the design phase of a product’s development lifecycle, companies should implement Secure by Design principles to significantly decrease the number of exploitable flaws before introducing them to the market for widespread use or consumption. Out-of-the-box, products should be secure with additional security features such as multi-factor authentication (MFA), logging, and single sign-on (SSO) available at no extra cost.

The pledge is structured with seven goals. Each goal has the core criteria which manufacturers are pledging to work towards, in addition to context and example approaches to achieve the goal and demonstrate measurable progress. To enable a variety of approaches, software manufacturers participating in the pledge have the discretion to decide how best they can meet and demonstrate the core criteria of each goal. Demonstrating measurable progress across the manufacturer’s products can take a variety of forms — such as by taking action on all the manufacturer’s products, or by choosing a set of products to first address and publishing a roadmap for other products.

CISA acknowledges and applauds software manufacturers who already meet or exceed these goals. In such a case where a software manufacturer already meets or exceeds a goal, the manufacturer should publicly describe how they are doing so. In these cases, CISA welcomes additional efforts to go above and beyond the goals in the pledge.

This pledge seeks to complement and build on existing software security best practices, including those developed by CISA, NIST, other federal agencies, and international and industry best practices. CISA continues to support adoption of complementary measures that advance a secure by design posture.

Take the Pledge today!

If you are an enterprise software manufacturer and would like to join the pledge, please email us.

Pledge Signers

Check out the hundreds of companies who have signed the pledge.

Progress Reports

Read the progress reports from companies who have signed the pledge.

See what they are saying...

Read statements of support from our signatories for the pledge.


Pledge Goals

Multi-factor authentication (MFA)

An icon showing facial recognition
Goal: Within one year of signing the pledge, demonstrate actions taken to measurably increase the use of multi-factor authentication across the manufacturer’s products.

Context: Multi-factor authentication is the greatest defense against password-based attacks such as credential stuffing and password theft. Any form of MFA has been shown to significantly reduce the success of such attacks, with more secure forms of MFA like phishing-resistant MFA offering even more protection against targeted attacks. Manufacturers should seek to increase MFA enrollment among their customers across the board, with an emphasis where possible of adopting phishing-resistant MFA and increasing enrollment by administrators.

Note: Other phishing-resistant forms of authentication, such as passkeys, meet this definition even if they are the sole form of authentication.

Example approaches towards achieving this goal:

  • Enabling MFA by default for users and administrators (e.g., upon first registration, requiring users and administrators to configure MFA).
  • Implementing “seat belt chimes” in products to nudge users towards enabling MFA. This could include, for instance, banners or interstitials notifying users or administrators that MFA is not enabled or suggesting that administrators enable phishing-resistant MFA.
  • Supporting standards-based single sign-on (SSO) in the baseline version of the product, allowing customers to configure with their own identity provider that supports MFA.

Examples of demonstrating measurable progress:

  • Publishing aggregate statistics of MFA adoption over time, broken down by user type (e.g., standard user, administrator) and MFA type (e.g., SMS, TOTP, FIDO2).
  • Publishing a blog post describing measurable progress made, such as where MFA has been enabled by default, and highlighting where barriers exist.
  • Participating in fora to advance long-term standards around MFA or authentication and demonstrating how these will result in measurable progress towards this goal.

Note: For this goal, manufacturers could demonstrate measurable progress either through results of customer behavior (such as a change in the use of MFA across their products), or through changes to the product itself (such as enabling MFA by default).

Read more

Default passwords

An icon showing a password
Goal: Within one year of signing the pledge, demonstrate measurable progress towards reducing default passwords across the manufacturers’ products.

Context: Default passwords, which CISA defines as universally-shared passwords that are present by default across a product, continue to enable damaging cyberattacks. This item seeks to reduce the percent of exploitable default passwords in the wild in order to drive down attacks, with a particular focus towards internet-facing products. Default passwords should be replaced with more secure authentication mechanisms, as detailed in the examples below (and, preferably, MFA as detailed above). At the end of provisioning, only the customer should possess their authentication credentials.

Example approaches towards achieving this goal:

  • Providing random, instance-unique initial passwords for the product.
  • Requiring the user who installs the product to create a strong password at the start of the installation process.
  • Providing time-limited setup passwords that disable themselves when a setup process is complete and require configuration of a secure password (or more secure authentication approaches, such as phishing-resistant MFA).
  • Requiring physical access for initial setup and the specification of instance-unique credentials.
  • Conducting campaigns or offering updates that transition existing deployments from default passwords to more secure authentication mechanisms.

Examples of demonstrating measurable progress:

  • Publishing a blog post describing how the manufacturer is moving past (or has already eliminated) default passwords in various product lines.
  • Publishing the number of products that have default passwords over time.
  • Publishing details on the number of customers transitioned from default passwords to more secure authentication mechanisms.
Read more

Reducing entire classes of vulnerability

An icon showing an exploited vulnerability
Goal: Within one year of signing the pledge, demonstrate actions taken towards enabling a significant measurable reduction in the prevalence of one or more vulnerability classes across the manufacturer’s products.

Context: The vast majority of exploited vulnerabilities today are due to classes of vulnerabilities that can often be prevented at scale. Examples include SQL injection, cross-site scripting, and memory safety vulnerabilities, as detailed below. An effective way that software manufacturers can reduce risk for their customers is by working to reduce classes of vulnerabilities at scale across their products. Software manufacturers can pick one or more vulnerability classes for the pledge that they work to reduce over the course of the year. For more information on vulnerability classes that can be prevented at scale, see CISA’s Secure by Design Alert series.

Example approaches towards achieving this goal: 

  • Consistently enforcing the use of parametrized queries to prevent SQL injection attacks.
  • Adopting web template frameworks with built-in protection against cross-site scripting vulnerabilities.
  • Developing a memory safe roadmap to transition to memory safe languages in a prioritized approach and writing new products in memory safe languages.
  • Providing secure defaults for developers, such as by providing “building blocks” of secure functions and libraries that make it impossible (or significantly more difficult) to introduce a certain class of vulnerability.

Examples of demonstrating measurable progress:

  • Publishing a blog on how the manufacturer has worked in the past year to significantly reduce the prevalence of one or more classes of vulnerability. This may include analysis of the root cause (CWE) of CVEs over time in the manufacturer’s products. CISA notes that successfully achieving this goal may actually lead to a short-term increase in CVEs as the manufacturer works to reduce that class of vulnerability — this should be regarded as a success if that class of vulnerability is reduced over the long run.
  • Publishing a memory safety roadmap, or a similar roadmap for other classes of vulnerability.
Read more

Security patches

A software icon
Goal: Within one year of signing the pledge, demonstrate actions taken to measurably increase the installation of security patches by customers.

Context: In line with the first Secure by Design principle, software manufacturers should take ownership of security outcomes of their customers – even after products are shipped. In addition to rooting out entire classes of vulnerabilities at the source, as detailed above, software manufacturers have the ability to make it easier for customers to install security patches – such as by offering support for security patches on a widespread basis to users and enabling functionality for automatic updates.

Example approaches towards achieving this goal:

  • Providing functionality to allow automatic installation of software patches when possible and enabling this functionality by default, where appropriate.
  • Offering support for security patches on a widespread basis to customers.
  • In the cases where products are end of life and security patches are no longer supported, clearly communicate the expected lifespan at time of sale and, when the product reaches end of life, clearly communicate this to customers and invest in provisioning capabilities to ease customer transitions to supported versions.
  • For cloud or SaaS products, applying patches so that the burden is not on customers to patch.

Examples of demonstrating measurable progress:

  • Publishing aggregate statistics of patch adoption by product over time (e.g., the percent of users using various versions of each product).
  • Publishing a blog post demonstrating actions made to foster greater deployment of security patches by users, or that otherwise reduce customers’ burden of patching.

Note: For this goal, manufacturers could demonstrate measurable progress either through results of customer behavior (such as a change in the percent of users on various versions of a product), or through changes to the product itself (such as by functionality for automatic software patches).

Read more

Vulnerability disclosure policy

A policy icon
Goal: Within one year of signing the pledge, publish a vulnerability disclosure policy (VDP)

Context: Within one year of signing the pledge, publish a vulnerability disclosure policy (VDP) that authorizes testing by members of the public on products offered by the manufacturer, commits to not recommending or pursuing legal action against anyone engaging in good faith efforts to follow the VDP, provides a clear channel to report vulnerabilities, and allows for public disclosure of vulnerabilities in line with coordinated vulnerability disclosure best practices and international standards.

Context: Coordinated vulnerability disclosure has emerged as a mutually beneficial norm for engaging with security researchers. Software manufacturers benefit from receiving help from the security research community that can allow them to better secure their products. Security researchers receive authorization for testing under the policy, in addition to a clear channel to report vulnerabilities. For examples of vulnerability disclosure policy and safe harbor language, see CISA's Vulnerability Disclosure Policy Template and Disclose.io Policymaker.

Note: Due to the specific nature of this item, examples of achieving this goal are not included.

Examples of demonstrating progress:

  • Publishing a public vulnerability disclosure policy in line with the above criteria.
  • Publishing a machine-readable description of the vulnerability disclosure policy (e.g., a security.txt file) to better enable discovery by researchers.
  • Publishing blog posts reviewing findings and lessons learned from the vulnerability disclosure policy.
Read more

CVEs

Warning icon
Goal: Within one year of signing the pledge, demonstrate transparency in vulnerability reporting

Context: Demonstrate transparency in vulnerability reporting by including accurate Common Weakness Enumeration (CWE) and Common Platform Enumeration (CPE) fields in every Common Vulnerabilities and Exposures (CVE) record for the manufacturer’s products. Additionally, issue CVEs in a timely manner for, at minimum, all critical or high impact vulnerabilities (whether discovered internally or by a third party) that either require actions by a customer to patch or have evidence of active exploitation.

While not required for this goal, companies are encouraged to go above and beyond by filing CVEs for other vulnerabilities that do not meet these criteria for the reasons described below. Companies are also encouraged to explore additional ways to enrich their CVE records to help customers better respond to vulnerabilities.

Context: In addition to serving as a standardized way to communicate actions that customers should take to protect against vulnerabilities, timely, correct, and complete CVE records allow for public transparency in vulnerability trends over time. This benefits both individual companies and their customers, and the software industry more generally, allowing software developers to better understand the most pressing classes of vulnerabilities over time. Timely reporting of CVEs, particularly for ones with active exploitation, is essential to ensure that customers are aware of actions they should take. CISA cautions against interpreting the mere presence of CVEs as a negative sign, as the number of CVEs reported may rise in the short term as a software manufacturer implements Secure by Design principles – more comprehensive reporting of CVEs benefits everyone.

Note: Due to the specific nature of this item, examples of achieving this goal are not included.

Examples of demonstrating progress:

  • Publishing CWE and CPE fields in every CVE record for the manufacturer’s products.
  • Publicly describing the manufacturer’s policy for when a CVE is issued.
Read more

Evidence of intrusions

Discovery icon
Goal: Within one year of signing the pledge, demonstrate a measurable increase in the ability for customers to gather evidence of cybersecurity intrusions affecting the manufacturer’s products.

Context: It is essential that organizations have the ability to detect cybersecurity incidents that have occurred and understand what has happened. Software manufacturers can enable their customers to do so by providing artifacts and capabilities to gather evidence of intrusions, such as a customer’s audit logs. In doing so, software manufacturers embody the Secure by Design principle of taking ownership of their customers’ security outcomes.

Example approaches towards achieving this goal:

  • As part of the baseline version of a product, making available logs related to areas such as:
    • Configuration changes or reading configuration settings;
    • Identity (e.g., sign-in and token creation) and network flows, if applicable; and
    • Data access or creation of business-relevant data.
  • For cloud service providers and SaaS products, retaining logs for a set timeframe (e.g., 6 months) at no additional charge.
  • In the cases where a product does not support the collection of these types of logs, the manufacturer publishes details on how customers can monitor and respond to cybersecurity incidents affecting their product.

Examples of demonstrating measurable progress:

  • Documenting the manufacturer’s policies around providing logs and log retention (for cloud providers).
  • Publishing a roadmap for adding or improving logging capabilities to products where they do not currently support collecting certain types of logs.
Read more

More information

Secure by Design Pledge

Download the Pledge

Disclaimer

CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services referenced or linked to on this page. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA. 

The Secure by Design pledge is a voluntary pledge. CISA does not enforce nor verify adherence to the pledge. CISA does not provide any warranties of any kind for any products or services mentioned here.

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback