Alerts: CISA and FBI Release Updated Guidance on Product Security Bad Practices

Source URL: https://www.cisa.gov/news-events/alerts/2025/01/17/cisa-and-fbi-release-updated-guidance-product-security-bad-practices
Source: Alerts
Title: CISA and FBI Release Updated Guidance on Product Security Bad Practices

Feedly Summary: In partnership with the Federal Bureau of Investigation (FBI), CISA released an update to joint guidance Product Security Bad Practices in furtherance of CISA’s Secure by Design initiative. This updated guidance incorporates public comments CISA received in response to a Request for Information, adding additional bad practices, context regarding memory-safe languages, clarifying timelines for patching Known Exploited Vulnerabilities (KEVs), and other recommendations.
While this voluntary guidance is intended for software manufacturers who develop software products and services in support of critical infrastructure, all software manufacturers are strongly encouraged to avoid these product security bad practices.
CISA and FBI urge software manufacturers to reduce customer risk by prioritizing security throughout the product development process. For more information and resources, visit CISA’s Secure by Design webpage or learn how to take CISA’s Secure by Design Pledge.

AI Summary and Description: Yes

Summary: This text discusses an updated guidance released by CISA and the FBI regarding software security best practices, emphasizing the importance of security throughout the product development lifecycle for software manufacturers, especially those involved with critical infrastructure.

Detailed Description: The content outlines a collaborative effort between CISA (Cybersecurity and Infrastructure Security Agency) and the FBI to promote secure software development practices through updated guidance titled “Product Security Bad Practices.” This guidance is part of CISA’s “Secure by Design” initiative, which aims to enhance the security posture of software products and services. Here are the key points of the update:

– **Incorporation of Public Comments**: The updated guidance reflects contributions from public comments received by CISA. This showcases an open approach to refining security practices.

– **Focus on Memory-Safe Languages**: The guidance provides additional context regarding the use of memory-safe programming languages, highlighting their relevance in reducing vulnerabilities and security risks.

– **Clarification on Known Exploited Vulnerabilities (KEVs)**: The update clarifies the timelines for patching KEVs, reinforcing the urgency and responsibility of software manufacturers to mitigate known risks.

– **Target Audience**: While it primarily addresses software manufacturers working with critical infrastructure, the guidance is broadly applicable to all software developers, urging them to adopt better security practices.

– **Encouragement of Secure Practices**: The document stresses the importance of prioritizing security during the product development process, aiming to diminish risk for end-users.

– **Call to Action**: Manufacturers are encouraged to visit CISA’s Secure by Design webpage for resources and consider taking the Secure by Design Pledge as a commitment to security.

The insights from this guidance have profound implications for security and compliance professionals, as it highlights current best practices in software security and encourages a culture of security awareness and responsibility within the industry.