www.cisa.gov Open in urlscan Pro
2a02:26f0:480:58c::447a  Public Scan

Submitted URL: http://www.cisa.gov/securebydesign
Effective URL: https://www.cisa.gov/securebydesign
Submission: On November 27 via api from TR — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here’s how you know

Here’s how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the
.gov website. Share sensitive information only on official, secure websites.


Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

×

search
 

Menu
Close
×

search
 

 * Topics
   Topics
   Cybersecurity Best Practices
   Cyber Threats and Advisories
   Critical Infrastructure Security and Resilience
   Election Security
   Emergency Communications
   Industrial Control Systems
   Information and Communications Technology Supply Chain Security
   Partnerships and Collaboration
   Physical Security
   Risk Management
   How can we help?
   GovernmentEducational InstitutionsIndustryState, Local, Tribal, and
   TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help
   LocallyFaith-Based CommunityExecutives
 * Spotlight
 * Resources & Tools
   Resources & Tools
   All Resources & Tools
   Services
   Programs
   Resources
   Training
   Groups
 * News & Events
   News & Events
   News
   Events
   Cybersecurity Alerts & Advisories
   Directives
   Request a CISA Speaker
   Congressional Testimony
 * Careers
   Careers
   Benefits & Perks
   HireVue Applicant Reasonable Accommodations Process
   Hiring
   Resume & Application Tips
   Students & Recent Graduates
   Veteran and Military Spouses
   Work @ CISA
 * About
   About
   Culture
   Divisions & Offices
   Regions
   Leadership
   Doing Business with CISA
   Site Links
   Reporting Employee and Contractor Misconduct
   CISA GitHub
   Contact Us

Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
 1. Home

Share:




SECURE BY DESIGN

It's time to build cybersecurity into the design and manufacture of technology
products.
Find out here what it means to be secure by design.



As America’s Cyber Defense Agency, CISA is charged with defending our nation
against ever-evolving cyber threats and to understand, manage, and reduce risk
to the cyber and physical infrastructure that Americans rely on every hour of
every day. But, as we introduce more unsafe technology to our lives, this has
become increasingly difficult.  

As a nation, we have allowed a system where the cybersecurity burden is placed
disproportionately on the shoulders of consumers and small organizations and
away from the producers of the technology and those developing the products that
increasingly run our digital lives. Americans need a new model to address the
gaps in cybersecurity—a model where consumers can trust the safety and integrity
of the technology that they use every day.


READ NOW!



 

 

Government cannot solve this problem alone. Technology manufacturers must
increasingly embrace their role in putting consumer safety first. Technology
providers and software developers must take the first step to shift this burden
by claiming ownership of their customers’ security outcomes.


FEATURED CONTENT


THE NEXT CHAPTER OF SECURE BY DESIGN

Four of CISA’s top cyber experts discuss the feedback CISA’s received on Secure
By Design principles and outline the second iteration of CISA’s Secure by Design
whitepaper.




SHIFTING THE BALANCE OF CYBERSECURITY RISK: PRINCIPLES AND APPROACHES FOR
SECURITY-BY-DESIGN

UPDATED! Read the NEW guidance now. Joint U.S. & international guide urging
software manufacturers to take necessary steps to ship products that are
secure-by-design.




CISA DIRECTOR EASTERLY REMARKS AT CARNEGIE MELLON UNIVERSITY

Unsafe at Any CPU Speed: The Designed-in Dangers of Technology and What We Can
Do About It




STOP PASSING THE BUCK ON CYBERSECURITY - WHY COMPANIES MUST BUILD SAFETY INTO
TECH PRODUCTS

By CISA Director Jen Easterly and Executive Assistant Director for Cybersecurity
Eric Goldstein




CISA’S CYBER EXPERTS TALK SHOP ON THE NEED FOR SAFER TECH

Three of CISA’s top cyber experts reflect on what it means to be Secure by
Design and Secure by Default and issue call to action to tech manufacturers.




APPLYING “SECURE BY DESIGN” THINKING TO EVENTS IN THE NEWS

As we navigate this landscape, a series of crucial questions arise, especially
when considering alleged security threats like juice-jacking attacks. Read our
latest blog to learn how these principles improve safe tech for all. 





WHAT IT MEANS TO BE SECURE BY DESIGN 

Every technology provider must take ownership at the executive level to ensure
their products are both secure by design and secure by default.

What is Secure by Design?

Secure by Design products are those where the security of the customers is a
core business requirement, not just a technical feature. Secure by Design
principles should be implemented during the design phase of a product’s
development lifecycle to dramatically reduce the number of exploitable flaws
before they are introduced to the market for broad use or consumption.

What is Secure by Default?

Secure by Default products are those that are secure to use out of the box, with
little to no configuration changes and are available at no additional cost, such
as multi-factor authentication (MFA), gather and log evidence of potential
intrusions, and control access to sensitive information.

 




WATCH CISA DIRECTOR EASTERLY'S REMARKS AT CARNEGIE MELLON UNIVERSITY

Unsafe at Any CPU Speed: The Designed-in Dangers of Technology and What We Can
Do About It

Watch the video (link is external)


RELATED NEWS AND RESOURCES

SEPTEMBER 20, 2023 | BLOG


THE URGENT NEED FOR MEMORY SAFETY IN SOFTWARE PRODUCTS

Cybersecurity Technical Advisor Bob Lord stresses the importance of memory
safety in making software safer by design.
JULY 19, 2023 | PRESS RELEASE


CISA AND MICROSOFT PARTNERSHIP EXPANDS ACCESS TO LOGGING CAPABILITIES BROADLY

We applaud Microsoft’s announcement to make necessary logs identified by CISA
and our partners as most critical to identifying cyber-attacks available to
customers without additional cost.
JULY 19, 2023 | BLOG


WHEN TECH VENDORS MAKE IMPORTANT LOGGING INFO AVAILABLE FOR FREE, EVERYONE WINS

JULY 18, 2023 | BLOG


LEADING THE WAY WITH RADICAL TRANSPARENCY

APRIL 13, 2023 | PRESS RELEASE


U.S. AND INTERNATIONAL PARTNERS PUBLISH SECURE-BY-DESIGN AND -DEFAULT PRINCIPLES
AND APPROACHES   

Press Release on joint product that outlines clear steps technology providers
can take to increase the safety of products used around the world.


TAKE THE PLEDGE!

If you are a K-12 education technology vendor and would like to join the pledge,
please email us at SecureByDesign@cisa.dhs.gov.

learn more


CONTACT US

Please share your thoughts by emailing us at: SecureByDesign@cisa.dhs.gov(link
sends email).

Return to top
 * Topics
 * Spotlight
 * Resources & Tools
 * News & Events
 * Careers
 * About

Cybersecurity & Infrastructure Security Agency
 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Instagram
 * RSS

CISA Central 888-282-0870 Central@cisa.dhs.gov(link sends email)
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
 * About CISA
 * Accessibility
 * Budget and Performance
 * DHS.gov
 * FOIA Requests
 * No FEAR Act
 * Office of Inspector General
 * Privacy Policy
 * Subscribe
 * The White House
 * USA.gov
 * Website Feedback