Paul Krill
Editor at Large

CISA publishes security goals for software development process, product design

news
Jan 13, 20253 mins

IT sector-specific goals to protect against cyber threats include 11 for more secure software development processes and seven for more secure software product design.

Padlock. Reliability, safety, security.
Credit: Ruslan Grumble/Shutterstock

The US Cybersecurity & Infrastructure Security Agency (CISA) has published IT sector-specific goals (IT SSGs) to protect against cyber threats, including 11 software development process goals and seven product design goals.

Published January 7, the Information Technology (IT) Sector-Specific Goals were based on CISA operational data and research on the current threat landscape. The IT SSGs are additional voluntary practices with high-impact security actions beyond cross-sector cybersecurity performance goals (CPGs).

The number-one software development process goal cited is to separate all environments used in software development—including development, build, test, and distribution environments—to prevent unauthorized access to sensitive data and systems. The number-one goal for secure product design cited is to increase the use of multifactor authentication (MFA) to reduce the risk of password compromise or utilization of weak passwords. The goals were developed in collaboration with government, industry groups, and private sector groups.

The complete list of security goals for the software development process:

  1. Separate all environments used in software development.
  2. Regularly log, monitor, and review trust relationships used for authorization and access across software development environments.
  3. Enforce multifactor authentication (MFA) across software development environments.
  4. Establish and enforce security requirements for software products used across software development environments.
  5. Securely store and transmit credentials used in software development environments.
  6. Implement effective perimeter and internal network monitoring solutions with streamlined, real-time alerting to aid responses to suspected and confirmed cyber incidents.
  7. Establish a software supply chain risk management program.
  8. Make a software bill of materials (SBOM) available to customers.
  9. Inspect source code for vulnerabilities through automated tools or comparable processes and mitigate known vulnerabilities prior to any release of products, versions, or update releases.
  10. Address identified vulnerabilities prior to product release.
  11. Publish a vulnerability disclosure policy.

The complete list of security goals for software product design:

  1. Increase the use of multifactor authentication (MFA).
  2. Reduce default passwords.
  3. Reduce entire classes of vulnerabilities.
  4. Provide customers with security patching in a timely manner.
  5. Ensure customers understand when products are nearing end-of-life support and security patches will no longer be provided.
  6. Include common weakness enumeration (CWE) and common platform enumeration (CPE) fields in every common vulnerabilities exposures (CVE) record for the organization’s products.
  7. Increase the ability for customers to gather evidence of cybersecurity intrusions affecting the organization’s products.
Paul Krill

Paul Krill is editor at large at InfoWorld. Paul has been covering computer technology as a news and feature reporter for more than 35 years, including 30 years at InfoWorld. He has specialized in coverage of software development tools and technologies since the 1990s, and he continues to lead InfoWorld’s news coverage of software development platforms including Java and .NET and programming languages including JavaScript, TypeScript, PHP, Python, Ruby, Rust, and Go. Long trusted as a reporter who prioritizes accuracy, integrity, and the best interests of readers, Paul is sought out by technology companies and industry organizations who want to reach InfoWorld’s audience of software developers and other information technology professionals. Paul has won a “Best Technology News Coverage” award from IDG.

More from this author