Framework

CISA Secure by Design
principles, pledge, and audit-ready evidence

CISA Secure by Design is the principles-based framework the Cybersecurity and Infrastructure Security Agency uses to shift the burden of cyber risk from software customers to software manufacturers. This page covers the three principles, the seven goals of the public Secure by Design Pledge, the manufacturer and customer responsibility split, the relationship to NIST SSDF, and how a workspace records the evidence the framework expects.

No credit card required. Free plan available forever.

The CISA Secure by Design framework explained

Secure by Design is the principles-based framework the Cybersecurity and Infrastructure Security Agency uses to shift the burden of cyber risk from software customers to software manufacturers. The framework was published in April 2023, expanded with international co-sealers in October 2023, and operationalised through a public Secure by Design Pledge in May 2024 that asks software manufacturers to commit to seven measurable goals over twelve months. CISA frames the work as an industry-wide reset rather than a single product certification: the principles describe the operating posture the manufacturer adopts, and the pledge translates the posture into measurable outcomes.

The framework is read in two directions. Software manufacturers read it as the discipline their product organisation runs against, with executive ownership, a published roadmap, a Vulnerability Disclosure Policy, complete CVE records, eliminated vulnerability classes, and annual progress reporting. Software customers read it as a procurement signal: pledge signatories carry observable obligations against the seven goals, and the framework gives customers a public reference for what to expect from a software supplier without bespoke vendor questionnaires.

The three core principles in operating practice

The framework names three principles that each carry concrete operational consequences. Programmes that read the principles as slogans miss the operating discipline; programmes that read them as obligations end up with a roadmap, a published VDP, an executive owner, and a year-over-year measurement record.

Take ownership of customer security outcomes

Customer security outcomes are the manufacturer responsibility, not the customer responsibility. Secure defaults, removed default passwords, MFA without an upcharge, single sign-on without a premium paywall, audit log access without a separate tier, and security patches that ship without a service contract are the observable shape of the principle. The historical pattern, where customers were expected to harden their way out of insecure shipped defaults, is what the principle pushes back on.

Embrace radical transparency and accountability

Manufacturers publish what they ship, what classes of vulnerabilities they have eliminated, what the secure-by-design roadmap looks like, and how they respond when a vulnerability lands. CISA expects a published Vulnerability Disclosure Policy, complete CVE records with the CWE field populated, a public roadmap that names the elimination work, and a reachable security contact. Transparency is the mechanism; accountability is the consequence.

Build organisational structure and leadership to deliver these goals

Secure by Design is an executive accountability rather than a feature flag. Senior leadership endorses the strategy, allocates resourcing to the roadmap, and reports progress to the board. CISA names CEO and board responsibility because the principle is about making secure-by-design the default operating posture rather than a side programme. The organisational structure principle is what keeps the first two durable across leadership turnover and quarterly planning.

The seven goals of the Secure by Design Pledge

The pledge is the measurable instrument underneath the principles. Each goal asks for a measurable change over twelve months, with the manufacturer publishing the baseline, the target, and the methodology. The goals span identity, default credentials, vulnerability classes, patching, disclosure, CVE quality, and customer-side investigative evidence. They are weighted toward outcomes the customer can observe rather than internal manufacturer process metrics.

Goal 1: Multi-factor authentication

A measurable increase in MFA adoption across products within one year. The manufacturer publishes the baseline rate, the target rate, and the measurement methodology. MFA support has to be available without a premium tier; pricing MFA out of reach is a documented anti-pattern in the framework.

Goal 2: Default passwords

A measurable reduction in default passwords across products within one year. The replacement is per-instance unique credentials, automated initial credential generation, or initial-setup flows that force credential rotation before the product enters service. The goal targets shipped-with-defaults appliances that historically produced the most exploitable footholds.

Goal 3: Reducing entire classes of vulnerabilities

A measurable reduction in one or more entire classes of vulnerability across products within one year. The expected classes include SQL injection, path traversal, command injection, memory unsafety, and cross-site scripting. The manufacturer names the class, names the elimination mechanism, and reports progress publicly.

Goal 4: Security patches

A measurable increase in customer installation of security patches across products within one year. The mechanism is automatic patching by default, simplified update flows, support windows that match deployment lifetimes, and the elimination of paywalls that gate security patches behind premium tiers.

Goal 5: Vulnerability disclosure policy

A published Vulnerability Disclosure Policy that authorises good-faith research across all products in service, commits to non-retaliation, allows public disclosure within a reasonable window, and is reachable through a documented channel. Without a VDP, valid reports do not surface and exploited vulnerabilities run silent.

Goal 6: CVEs

A measurable increase in the completeness of CVE records issued for the manufacturer products within one year. Completeness means CVE records include the CWE field, the affected product list, the version range, the fix availability, and the disclosure timeline. Issuing partial CVEs that omit CWE is named in the framework as a failure mode.

Goal 7: Evidence of intrusions

A measurable increase in the ability of customers to gather evidence of cybersecurity intrusions affecting the manufacturer products within one year. The mechanism is sufficient logging, log retention, log accessibility, and tamper resistance, without paywalls that price logs out of customer reach.

Manufacturer, customer, and CISA responsibility split

Secure by Design names a responsibility split that is not symmetric. The manufacturer carries the operational obligations the framework describes; the customer carries procurement and operating discipline that reads against the manufacturer posture; CISA carries the framework, the pledge, the public list of signatories, and the federal procurement guidance that aligns with the framework. The asymmetry is the point: the framework exists to move the burden, not to redistribute it evenly.

Software manufacturer responsibilities

Ship secure defaults, eliminate default passwords, support MFA without an upcharge, publish a Vulnerability Disclosure Policy, run a roadmap that eliminates vulnerability classes, file complete CVE records, ship logging customers can use to investigate intrusions, and report progress against the seven pledge goals annually. The manufacturer carries the operational burden the framework is designed to shift.

Software customer expectations

Read the manufacturer Secure by Design roadmap, prefer pledge signatories during procurement, raise gaps against pledged goals during evaluation rather than only after deployment, configure the secure defaults the manufacturer ships, and feed observed intrusion evidence back through the manufacturer VDP. Customers are not absolved of operating discipline, but they are absolved of compensating for shipped insecurity.

CISA and the federal posture

CISA publishes the framework, hosts the public pledge, runs the public list of signatories, publishes Secure by Design alerts that name observed product-side patterns, and aligns federal procurement guidance with the framework. The public pledge is voluntary; the federal procurement direction it shapes is not.

How a Secure by Design programme operates in practice

A Secure by Design programme runs as a structured engagement rather than an annual report. The work happens in phases that build on each other, and the engagement record carries forward across pledge years so the next cycle starts from the prior baseline rather than a blank page. The lifecycle below is the pattern most manufacturers run when the SbD posture is treated as a real operating discipline.

  1. 1Sign or commit privately against the seven pledge goals. Establish baseline measurements per goal, name the executive owner, and set the year-one targets so the eventual pledge progress report is reproducible rather than reconstructed.
  2. 2Build the secure-by-design roadmap as a living engagement record. Name each vulnerability class targeted for elimination, the mechanism, the affected products, the measurement source, and the named owner. Treat the roadmap as a tracked engagement rather than a slide deck refreshed quarterly.
  3. 3Run the secure-default review across the product line. Audit the default password posture, the MFA support, the SSO availability, the audit log accessibility, and the patching default. Open findings against each gap with severity, owner, and a remediation plan that ties to the pledge goal it serves.
  4. 4Operate the Vulnerability Disclosure Policy. Publish it at /security or the manufacturer-equivalent canonical URL, route inbound reports to a triaged intake, log the receipt-to-acknowledgement-to-fix-to-disclosure timeline per report, and report the aggregate VDP throughput annually.
  5. 5Run CVE record discipline. File a CVE for every customer-affecting vulnerability that ships a fix, populate the CWE field, list the affected products and version ranges, link the fix advisory, and avoid the partial-CVE pattern that omits material fields.
  6. 6Report progress publicly. Publish the year-one pledge progress report, the methodology, the baseline-to-target movement per goal, and the planned year-two work. The reporting itself is the accountability mechanism the framework relies on.

Failure modes that cost manufacturers the year-one review

The framework is unforgiving about a small number of patterns that look responsive on the surface and read poorly when the pledge progress report is written. The patterns below are the ones CISA names directly in the Secure by Design alerts and the pledge guidance, and the ones product security teams routinely fall into when the work is run as a marketing track rather than an operating track.

  • Treating Secure by Design as a marketing badge rather than a measured operating discipline. The framework is published with goals that have to be measured; programmes that ship the badge without the measurements fail the year-one review.
  • Pricing MFA, SSO, audit logs, or security patches behind premium tiers. The framework explicitly names this as a failure mode; the pledge progress report has to show that the priced-out posture has been retired.
  • Filing partial CVE records that omit the CWE field, the affected version range, or the fix availability. The CVE goal in the pledge is about completeness, not volume; partial CVEs make the manufacturer look responsive on the surface and read poorly when the framework is applied.
  • Running the Vulnerability Disclosure Policy as an inbox without acknowledgement, triage, fix, and disclosure timing. CISA expects the VDP to operate; a published VDP without the operating record behind it is read as performative.
  • Running the secure-by-default audit only at marketing launches rather than continuously. New products and new releases regress the secure-default state; the audit has to operate continuously rather than at announcement time.
  • Holding the secure-by-design roadmap in a slide deck refreshed quarterly. The framework expects an operating record; programmes that maintain a static deck rebuild the work at every executive review and lose the year-over-year continuity the pledge progress report relies on.

Evidence the framework expects to see, organised against the pledge

Pledge progress reports that read well are the ones that draw from a live operating record rather than from documents reconstructed at the year-end. Build the evidence pack as the work happens, retain raw evidence alongside the structured engagement record, and tie every artefact back to the principle and pledge goal it supports. The pledge progress report reads the way the underlying record reads.

  • Public Secure by Design roadmap that names which vulnerability classes the manufacturer is eliminating, the elimination mechanism per class, and the progress measurement
  • Published Vulnerability Disclosure Policy with the safe-harbour clause, the disclosure timeline, the inbound channel, and the named security contact
  • Pledge progress report covering the seven goals, the baseline measurements, the year-over-year change, and the methodology used
  • CVE record audit covering the manufacturer CVEs filed in the period, the percentage with the CWE field populated, the affected-version completeness, and the fix-availability completeness
  • Default credential audit covering shipped products, the percentage with default passwords retired, and the rollout plan for products still on defaults
  • MFA adoption telemetry covering the baseline rate, the target rate, the measurement source, and the rollout plan for products without MFA
  • Memory-safety roadmap or vulnerability-class elimination roadmap with the named language migration, the named static analysis baseline, and the measurement plan
  • Audit log accessibility statement covering what logs the product produces, what retention applies, whether logs are paywalled, and how customers obtain them
  • Customer-facing security configuration guidance with the secure defaults documented, the deviation from defaults flagged, and the security trade-offs of each deviation explained
  • Board-level Secure by Design endorsement evidence: minutes, named executive owner, resourcing allocation, and quarterly progress reporting cadence

How Secure by Design relates to NIST SSDF, OWASP, and the wider regime

Secure by Design is one framework inside a wider product security picture. Manufacturers operating across federal procurement, regulated industries, and global markets usually find that a single underlying body of evidence satisfies several frameworks when it is structured against principles, goals, and observable outcomes rather than against a single framework template. The relevant comparison points include:

  • The NIST SSDF implementation guide covers Secure Software Development Framework (SP 800-218) practice groups and implementation work that the federal Secure Software Development Attestation Form consumes, and the CISA SSDA form guide walks through the form itself, the four practice clusters, POAMs, 3PAOs, and the False Claims Act exposure on the signing officer. SbD is the principles framework; SSDF is the practice framework underneath; SSDA is the federal evidence package. A manufacturer evidencing SSDF practices already holds most of the artefacts SbD pledge reporting asks for.
  • The OWASP SAMM framework page covers the OWASP Software Assurance Maturity Model and the practice-level maturity ladder that maps cleanly to SbD operating posture. SAMM gives the maturity vocabulary; SbD gives the public commitment vocabulary.
  • The OWASP ASVS framework page covers the Application Security Verification Standard. ASVS verification levels are the mechanism many manufacturers use to evidence the secure-default posture and the vulnerability-class elimination commitments under SbD goal 3.
  • The SBOM guide and the VEX guide cover the supply-chain transparency artefacts that map to SbD goal 6 (CVE completeness) and the customer-facing evidence the pledge expects manufacturers to publish alongside their products.
  • The SLSA framework guide covers the build-integrity scaffold (in-toto provenance, sigstore signing, hardened build platforms) that turns the SbD transparency narrative into verifiable evidence. Manufacturers running SLSA L2 or L3 hold a build-side audit trail that pairs with the SBOM, VEX, and SSDF evidence the pledge expects.
  • The ISO 27001 framework page and the SOC 2 framework page cover information security management obligations that overlap with SbD principle 3 (organisational structure and leadership). A mature ISMS or SOC 2 control environment already holds most of the executive ownership artefacts SbD principle 3 expects.
  • The CMMC framework page covers Cybersecurity Maturity Model Certification for the defence industrial base. Manufacturers selling into DoD-adjacent markets read SbD and CMMC together; the SbD pledge progress report and the CMMC assessment package draw from a shared evidence base.
  • The CISA KEV catalog guide covers the Known Exploited Vulnerabilities catalog. SbD goal 3 (vulnerability-class elimination) reads against KEV class breakdowns; manufacturers eliminating injection, memory unsafety, or path traversal classes can demonstrate the customer-side impact by reading their progress against the KEV class distribution.
  • The CISA Cybersecurity Performance Goals (CPGs) framework page covers the customer-side baseline that complements SbD. Where SbD names the manufacturer obligations, the CPGs name the prioritised cybersecurity practices the customer organisation adopts as a voluntary baseline. Both publications are CISA outputs and read against a shared NIST CSF 2.0 spine, so manufacturer-side and customer-side cyber posture can be tracked on one evidence pack.

Where SecPortal fits in the Secure by Design workflow

SecPortal is the operating layer for the Secure by Design programme, not a replacement for the manufacturer accountable for the principles or for CISA running the framework. The platform handles the SbD roadmap, vulnerability-class elimination work, default-credential audits, MFA adoption tracking, VDP intake records, CVE discipline, and the pledge progress evidence so the cycle runs as a structured workflow rather than a slide deck refreshed quarterly. The same workspace that hosts the SbD roadmap hosts the SAST, SCA, authenticated DAST, and pentest evidence the principles and pledge goals consume, so the line from artefact to outcome stays traceable.

  • Engagement management dedicated to the Secure by Design roadmap, with phases (baseline measurement, gap remediation, pledge progress reporting, year-two planning) tracked as workstreams rather than as one document stitched together at the end
  • Findings management with CVSS 3.1 scoring and 300+ templates so vulnerability-class elimination work, default-credential audits, and MFA adoption gaps tie back to the principle and pledge goal they evidence
  • Code scanning through GitHub, GitLab, or Bitbucket OAuth so SAST and SCA findings tied to memory-safety, injection, and dependency-class vulnerabilities feed into the same engagement record the SbD roadmap reads from
  • Authenticated DAST against deployed products so secure-default behaviour and MFA enforcement tests run reliably across releases without leaving session secrets in shared password managers
  • Compliance tracking that maps the same evidence pack to ISO 27001, SOC 2, NIST SSDF, and OWASP ASVS where the manufacturer carries parallel obligations across regimes
  • Continuous monitoring with scheduled scans so the secure-default audit, the default-password audit, and the patching-default audit have a coverage record between annual pledge reporting cycles
  • AI report generation that turns the engagement evidence and per-goal measurements into a structured pledge progress report and a board-ready summary without manual rewriting
  • Activity log that captures every state change to a finding, a roadmap entry, or a VDP record with timestamp and named user, so the trail is reproducible at audit time without a multi-team excavation
  • Document management for the public Secure by Design roadmap, the published Vulnerability Disclosure Policy, the customer security configuration guidance, and the board endorsement evidence pack

The vulnerability-class elimination work is where most of the pledge progress lives. Findings raised against memory unsafety, injection, path traversal, command injection, and cross-site scripting classes need owners, deadlines, and verification evidence that walks back to the goal they affect. The remediation tracking workflow keeps that line auditable. The retesting workflow keeps the verification evidence paired to the original finding rather than opening a parallel record. The vulnerability prioritisation workflow sets which classes the SbD roadmap is eliminating in the next pledge year, and the security leadership reporting workflow carries the executive accountability principle 3 names.

For internal teams running the Secure by Design programme inside a software vendor, the product security teams workspace bundles the platform with security review intake, security champion portal, and PSIRT-style disclosure workflow that the SbD VDP commitment relies on. For application security functions that own the per-release authenticated DAST and SAST work that feeds the pledge roadmap, the AppSec teams workspace covers the same mechanics from the engineering-adjacent angle. For security leaders who carry the executive ownership principle 3 expects, the CISOs and security leaders workspace covers the program-level reporting model that sits on top of the SbD operating record.

Customer-side teams reading SbD as a procurement signal can use the GRC and compliance teams workspace and the vulnerability management teams workspace to track supplier SbD posture alongside their internal vulnerability programme. The vulnerability acceptance and exception management workflow is the place where unsupported supplier defaults become a documented exception rather than an undocumented inheritance.

For programmes that want continuous detection and trend evidence between annual SbD pledge cycles, the continuous monitoring capability and the code scanning capability produce the cadence and coverage record that goal 3 (vulnerability-class elimination) and goal 7 (customer evidence of intrusions) read against. For analytical context on how product security findings age across remediation cycles, the vulnerability remediation throughput research covers what tends to happen to SbD roadmap items when the cycle does not carry forward against a structured engagement record, and the security control drift research covers how secure-default postures erode between pledge progress reviews when the audit is run only at announcement time.

Key control areas

SecPortal helps you track and manage compliance across these domains.

Principle 1: Take ownership of customer security outcomes

Software manufacturers accept that customer security outcomes are the manufacturer responsibility, not the customer responsibility. The principle pushes back on the historical pattern where customers were expected to harden, configure, patch, and operate their way out of insecure defaults that the manufacturer chose. CISA names secure defaults, eliminated default passwords, MFA support without extra cost, single sign-on without paywall, audit log access without a premium tier, and shipped security patches without a service contract as observable manifestations of the principle.

Principle 2: Embrace radical transparency and accountability

Software manufacturers publish what they ship, what classes of vulnerabilities they have eliminated, what the secure-by-design roadmap looks like, and what the discovered-vulnerability response posture is. CISA expects published Vulnerability Disclosure Policies, complete CVE records with the CWE field populated, a public Secure by Design roadmap that names the vulnerability classes the manufacturer is eliminating, and a reachable security contact. Transparency is the mechanism the principle uses; accountability is the consequence.

Principle 3: Build organisational structure and leadership to deliver these goals

Secure by Design is an executive accountability rather than a feature flag. Senior leadership endorses the secure-by-design strategy, allocates resourcing to the roadmap, and reports progress to the board. CISA explicitly names CEO and board responsibility because the principle is about making secure-by-design the default operating posture rather than a special programme. The organisational structure principle is the one that makes the first two principles durable.

Goal 1: Multi-factor authentication

The Secure by Design Pledge commits manufacturers to a measurable increase in multi-factor authentication adoption across products within one year. The manufacturer publishes the baseline rate, the target rate, and the measurement methodology. CISA emphasises that MFA support has to be available without a premium tier; pricing MFA out of reach is a documented anti-pattern in the framework.

Goal 2: Default passwords

The pledge commits manufacturers to a measurable reduction in default passwords across products within one year. The replacement is per-instance unique credentials, automated initial credential generation, or initial-setup flows that force credential rotation before the product enters service. The goal targets the IoT, network device, and shipped-with-defaults appliance market that historically produced the most exploitable footholds.

Goal 3: Reducing entire classes of vulnerabilities

The pledge commits manufacturers to a measurable reduction in one or more entire classes of vulnerability across products within one year. The expected classes include SQL injection, path traversal, command injection, memory unsafety, and cross-site scripting. CISA expects the manufacturer to name the class, name the elimination mechanism (parameterised queries, memory-safe languages, contextual encoding), and report progress publicly.

Goal 4: Security patches

The pledge commits manufacturers to a measurable increase in installation of security patches by customers across products within one year. The mechanism is automatic patching by default, simplified update flows, support windows that match deployment lifetimes, and the elimination of paywalls that gate security patches behind premium tiers. Patching a discovered vulnerability stops being a customer competence question and becomes a manufacturer delivery question.

Goal 5: Vulnerability disclosure policy

The pledge commits manufacturers to publish a Vulnerability Disclosure Policy that authorises good-faith research across all products in service, commits to non-retaliation, allows public disclosure within a reasonable window, and is reachable through a documented channel. The policy is the contract between the manufacturer and the security research community; without it, valid reports do not surface and exploited vulnerabilities run silent.

Goal 6: CVEs

The pledge commits manufacturers to a measurable increase in the completeness of CVE records issued for the manufacturer products within one year. Completeness means CVE records include the CWE field, the affected product list, the version range, the fix availability, and the disclosure timeline. CISA names the historical practice of issuing partial CVE records that omit the CWE field as a Secure by Design failure mode.

Goal 7: Evidence of intrusions

The pledge commits manufacturers to a measurable increase in the ability of customers to gather evidence of cybersecurity intrusions affecting the manufacturer products within one year. The mechanism is sufficient logging, log retention, log accessibility, and tamper resistance, all without paywalls that price logs out of the customer reach. The goal closes the gap that opens when an intrusion is detected and the customer cannot reconstruct what happened from the data the product produced.

Evidence Secure by Design without losing the audit trail

Hold the SbD roadmap, vulnerability class elimination work, VDP intake, CVE record discipline, and customer-evidence logging on one workspace. Start free.

No credit card required. Free plan available forever.