← Back to all briefings
Cybersecurity 5 min read Published Updated Credibility 91/100

CISA Launches Secure by Design Pledge — April 30, 2024

CISA invited major technology manufacturers to commit to seven measurable secure-by-design goals covering memory-safe languages, MFA by default, and vulnerability disclosure performance.

Horizontal bar chart of credibility scores per cited source.
Credibility scores for every source cited in this briefing. Source data (JSON)

Executive briefing: On the Cybersecurity and Infrastructure Security Agency (CISA) unveiled the Secure by Design Pledge, asking leading software and technology companies to commit to specific engineering improvements that measurably reduce exploitability. Initial signatories pledged to expand memory-safe programming languages, enable multi-factor authentication (MFA) by default, shorten vulnerability remediation timelines, and publish secure configuration baselines.

Pledge focus areas

  • Memory safety. Increase adoption of memory-safe languages in new codebases and critical product updates.
  • MFA by default. Deliver phishing-resistant authentication enabled by default for privileged and customer-facing accounts.
  • Vulnerability management. Track patch timelines, coordinated disclosure performance, and security telemetry coverage.

Control alignment guidance

  • Secure development lifecycle. Embed threat modeling, secure coding standards, and automated testing aligned with CISA’s pledge metrics.
  • Identity governance. Extend MFA coverage metrics to include customer and partner access channels, reducing reliance on passwords.
  • Supplier management. Require vendors to disclose Secure by Design commitments and progress, especially for critical SaaS and infrastructure providers.

Operational recommendations

  • Benchmark internal engineering practices against the pledge goals and publish executive dashboards to track progress.
  • Incorporate memory-safe language adoption and vulnerability remediation speed into engineering OKRs and incentive plans.
  • Engage product marketing and customer success teams to communicate default security enhancements and support adoption.
Horizontal bar chart of credibility scores per cited source.
Credibility scores for every source cited in this briefing. Source data (JSON)

Continue in the Cybersecurity pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

  • United States
  • Secure by design
  • Software development
  • CISA
Back to curated briefings