Fact-checked by Grok 2 weeks ago

Secure by Design

is a and approach that emphasizes integrating into the fundamental and of products from the outset, rather than treating it as an add-on or retrofit measure, to proactively mitigate risks from malicious actors and prevalent threats. This methodology shifts the burden of from end-users to manufacturers, promoting practices such as , use of memory-safe programming languages, and defense-in-depth strategies to build resilient systems that protect devices, , and by . Key tenets include radical transparency in vulnerability disclosure, organizational accountability through dedicated leadership, and eliminating insecure like generic passwords or unpatched configurations, ensuring products are out-of-the-box with minimal user intervention required. Initiated prominently by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in collaboration with international partners like the UK's National Cyber Security Centre and Australia's ACSC, the Secure by Design framework was formalized in an April 2023 whitepaper outlining three core principles: placing the burden of security on manufacturers rather than customers, radical transparency and accountability, and shaping organizational culture and incentives to prioritize security goals. Complementing this, the related Secure by Default concept calls for products to ship with secure baselines, such as multi-factor authentication (MFA) for privileged users (opt-out by default) and single sign-on (SSO), while prioritizing security over backward compatibility to reduce exploitable weaknesses. Organizations like the Open Web Application Security Project (OWASP) extend these ideas through frameworks such as the Secure Product Design Cheat Sheet and Secure-by-Design Framework, which provide tactical guidance for architects, including principles like least privilege, zero trust, and security-in-the-open to minimize attack surfaces during the design phase of the software development lifecycle (SDLC). Notable implementations include CISA's Secure by Design Pledge, launched on May 8, 2024, to encourage software vendors to adopt these practices, with over 20 initial signatories (including and ) committing to tactics like software bills of materials (SBOMs) for and automated tools such as (SAST); as of 2025, companies continue to submit progress reports on these commitments. These efforts, including CISA's 2024 Secure by Design Alerts series and an updated joint guidance document, address systemic vulnerabilities by advocating for memory-safe languages (e.g., or ) to prevent common exploits like buffer overflows, which account for a significant portion of cyberattacks. Overall, Secure by Design represents a toward proactive, manufacturer-led , influencing standards from NIST's Secure Software Development Framework (SSDF) version 1.1 to global regulatory expectations, ultimately aiming to create a more secure .

Overview

Definition and Importance

Secure by design is a foundational approach in software, , and development that integrates as a core requirement from the initial phase, rather than it later. This emphasizes proactively addressing potential threats to prioritize customer protection and minimize exploitable vulnerabilities throughout the product lifecycle. According to the (CISA), secure by design means "technology products are built in a way that reasonably protects against malicious cyber actors successfully gaining access to devices, data, and connected infrastructure," incorporating risk assessments and layered defenses from the outset. The importance of secure by design lies in its ability to shift cybersecurity responsibility toward manufacturers, reducing the burden on end-users and preventing widespread breaches that disrupt . By embedding early, organizations avoid the high costs associated with reactive patching and incident response, as unpatched vulnerabilities in poorly designed products often enable attackers to exploit systemic weaknesses. For instance, CISA highlights how such flaws have led to real-world impacts, including hospitals canceling surgeries due to enabled by insecure technology. This contrasts sharply with "security by obscurity," which relies on hiding details rather than building inherent resilience, often failing against determined adversaries. Key benefits include enhanced resistance to attacks through principles like least privilege, which limits access to essential functions only, thereby reducing the potential impact of any single . Secure by design also accelerates time-to-market for reliable products by streamlining development and minimizing post-release fixes, while fostering compliance with emerging regulations such as the EU . Furthermore, it aligns with broader business objectives, as evidenced by CISA's Secure by Design Pledge, where as of November 2025 over 340 vendors, including and , have committed to embedding security into their product roadmaps and transparently addressing known defects. This collective effort builds trust and promotes industry-wide resilience against evolving threats.

Historical Development

The concept of secure by design originated in 1975 with the seminal paper "The Protection of Information in Computer Systems" by and , which introduced eight foundational protection principles aimed at safeguarding computer-stored information from unauthorized access or modification. These principles emphasized mechanisms like complete mediation and least privilege to ensure robust system protection from the outset. In the 1980s and 1990s, these ideas gained traction through their integration into operating system architectures and security standards. Unix and its variants incorporated elements such as discretionary access controls and fail-safe defaults, drawing from earlier influences like to enhance protection in multi-user environments. Concurrently, the Bell-LaPadula model, developed in the mid-1970s but widely adopted in military and government systems during this period, formalized confidentiality protections through mandatory access controls, influencing certified secure operating systems under the (TCSEC). The 2000s marked a resurgence of secure by design in practices amid growing vulnerabilities. The Open Web Application Security Project (OWASP) was founded in 2001 to promote secure coding and , providing resources that embedded design principles into . In 2004, introduced the Security Development Lifecycle (SDL), a structured process integrating security requirements, , and testing from the initial design phase to reduce vulnerabilities in software products. Recent developments have accelerated adoption through policy and industry commitments. Executive Order 14028, issued in 2021, mandated federal agencies to adopt secure practices and strengthen supply chain security, responding to high-profile incidents like . In 2023, the (CISA) launched the Secure by Design initiative, issuing joint guidance with agencies like the (NSA) and the UK's National Cyber Security Centre (NCSC) to urge software manufacturers to prioritize security in and configurations. The pledge launched in May 2024 with 68 initial signatories, including and , growing to over 250 by the end of the year and exceeding 340 as of November 2025. By 2025, progress continued with Microsoft's Secure Future Initiative (SFI) releasing its April progress report, detailing advancements across 28 objectives such as zero-trust architectures and identity protections; meanwhile, the EU entered into force in December 2024, setting mandatory cybersecurity requirements for digital products with enforcement of core obligations beginning in December 2027.

Core Principles

Least Privilege and Separation of Duties

The principle of least privilege dictates that users, processes, or systems should operate with the minimal set of permissions required to perform their intended functions, thereby limiting the potential damage from errors, accidents, or compromises. This approach reduces the scope of possible misuse and facilitates auditing by confining investigations to a narrower range of activities. For instance, in database management, query analysts might be granted read-only to specific tables, preventing unintended modifications or deletions even if their credentials are compromised. Complementing least privilege, the principle of —also termed separation of privilege—requires that critical operations involve multiple distinct conditions or parties to authorize access, avoiding reliance on a single point of control that could be exploited. This enhances robustness by distributing across entities, such as requiring separate keys or approvals, which makes it more difficult for a single failure or malicious actor to enable unauthorized actions. In financial systems, for example, one role may authorize transactions while another executes them, mitigating risks of or insider threats by ensuring no individual can complete a sensitive process independently. These principles are commonly implemented through (RBAC) models, where permissions are assigned to roles rather than individuals, aligning access with organizational functions and enforcing both least privilege and . The NIST RBAC standard supports hierarchical and constrained variants to further refine role inheritance and mutual exclusions, promoting scalable enforcement in complex environments. In practice, applying these principles limits lateral movement during breaches; for example, in the 2020 , attackers exploited overly permissive domain administrator accounts to traverse networks, a scenario that stricter adherence to least privilege could have contained by restricting initial footholds. Such integration into the secure lifecycle ensures these controls are embedded from through deployment.

Economy of Mechanism and Minimize Attack Surface

The principle of economy of mechanism emphasizes designing security mechanisms to be as simple and small as possible, thereby reducing the likelihood of implementation errors and facilitating thorough verification. This approach, articulated by Jerome Saltzer and Michael Schroeder, argues that complexity in security components invites subtle flaws that can be exploited, whereas simplicity allows for easier auditing and maintenance. For instance, developers should prefer established, straightforward protocols like OAuth 2.0 over custom cryptographic solutions, as the latter often introduce unintended vulnerabilities due to the challenges of correctly implementing without expert oversight. Minimizing the attack surface complements this by systematically eliminating unnecessary features, open ports, code paths, or services that could serve as entry points for adversaries, thereby reducing the overall opportunities for exploitation. Organizations can achieve this through practices such as disabling unused services on servers, which prevents potential from leveraging dormant components that may harbor unpatched vulnerabilities. Tools like Microsoft's Attack Surface Analyzer assist in quantifying these risks by scanning systems for changes in exposure—such as new registry keys, services, or network bindings—introduced by software installations, enabling developers to iteratively shrink the surface area. In modern architectures, in architectures exemplifies both principles by isolating components into small, focused units, where each service exposes only essential interfaces, thereby limiting the of any compromise. This modularity aligns with an extension of Kerckhoffs' principle from —originally stating that a system's should rely solely on the of the key, not its design—to , ensuring that non-secret elements remain simple and verifiable without relying on obscurity.

Open Design and Avoid Security by Obscurity

The open principle posits that the security of a should depend solely on the of its keys or other confidential elements, rather than on the obscurity of its or implementation details. This foundational concept, articulated by cryptographer Auguste Kerckhoffs in his 1883 publication La Cryptographie Militaire, asserts that a remains secure even if all aspects except the key are publicly known, allowing for rigorous evaluation by experts to identify and mitigate weaknesses. By promoting transparency in , open design enables widespread , which strengthens security through collective scrutiny rather than relying on hidden mechanisms that could harbor undetected flaws. In contrast, security by obscurity—where protection is assumed from concealing implementation details—fails to provide robust defense and often invites exploitation once secrets are revealed. Proprietary algorithms, for instance, lack the broad analysis afforded to open standards, making them vulnerable to undetected vulnerabilities; historical cases demonstrate that such approaches collapse rapidly under targeted . A prominent example is the Content Scrambling System (CSS) used for DVD , introduced in 1996 without public specification; in 1999, Norwegian programmer Jon Johansen reverse-engineered and released , a decryption tool, exposing CSS's weak 40-bit keys and flawed design, which rendered the system ineffective despite its intended secrecy. This incident underscored how obscurity not only delays but ultimately accelerates breaches by discouraging proactive audits. The (), selected by the National Institute of Standards and Technology (NIST) in 2001 through a public competition, exemplifies successful open design. , specified in (FIPS) 197 as a symmetric with 128-, 192-, or 256-bit keys, underwent extensive global review during its development, ensuring its resilience against known attacks and establishing it as a cornerstone for secure data protection in applications worldwide. Unlike proprietary alternatives, AES's openness has facilitated ongoing , confirming its strength without compromising confidentiality when paired with secure . Open design yields significant benefits through community-driven improvements, particularly in open-source software where peer review uncovers vulnerabilities that closed systems might overlook. The Linux kernel, maintained under the Linux Foundation, leverages thousands of contributors for code audits, enabling rapid identification and patching of security issues; this transparency has contributed to its robustness in enterprise and critical infrastructure environments. Complementing this, simplicity in mechanisms aids openness by making designs easier to scrutinize publicly. Government guidance further reinforces these practices, emphasizing transparency to enhance overall ecosystem security. In its 2023 Secure by Design framework, the (CISA) urges software manufacturers to embrace vulnerability transparency by publishing (CVEs) promptly and maintaining clear disclosure policies, fostering accountability and faster remediation across supply chains.

Defense in Depth and Fail Securely

Defense in depth is a foundational in secure by design that involves deploying multiple, independent layers of to safeguard systems, applications, and data against threats. This strategy ensures that if one layer is breached—such as a or perimeter —the attacker must still navigate additional barriers like , intrusion detection systems, and access controls to achieve compromise. Originating from , where it emphasizes redundant fortifications to absorb attacks, defense in depth in cybersecurity integrates technical, procedural, and human elements to create resilient protections that slow or stop adversaries at various stages. In enterprise architectures, serves as a practical application of defense in depth, partitioning networks into isolated segments based on function or sensitivity to restrict lateral movement by intruders. For instance, separating user networks from critical servers limits the of a , allowing and response at segment boundaries without exposing the entire . This layered approach not only mitigates risks from initial intrusions but also supports ongoing threat detection and recovery efforts. The fail securely principle complements defense in depth by requiring systems to default to a denial-of-access or safe shutdown state during failures, errors, or ambiguous conditions, rather than permitting insecure fallbacks that could enable exploitation. Articulated in Saltzer and Schroeder's seminal paper as "fail-safe defaults," it mandates basing access on explicit permissions, ensuring that design flaws or unexpected events do not inadvertently grant privileges. For example, authentication mechanisms should lock accounts after repeated failed attempts or timeouts, preventing brute-force attacks from succeeding due to error handling lapses. In environments, fail securely manifests through tamper-resistant designs that detect physical interference and respond by disabling functionality or erasing sensitive data to avoid cascading compromises. Devices equipped with secure elements or epoxy-encapsulated hardware can trigger alerts or mechanisms upon detecting unauthorized access attempts, thereby containing threats without propagating them across connected networks. This principle underscores the need for proactive error states in resource-constrained systems, where single points of failure could otherwise lead to widespread vulnerabilities.

Methodologies and Practices

Secure Software Development Lifecycle

The (SSDLC), also known as the , integrates security practices into every phase of the traditional software development lifecycle to proactively address vulnerabilities and ensure principles are embedded from the outset. This approach shifts security responsibilities to developers and stakeholders early, reducing the cost and effort of remediation later, as defects identified post-deployment can be up to 100 times more expensive to fix than those caught during requirements or design. By incorporating security at each stage, organizations can mitigate risks associated with common threats, such as or , while aligning with broader goals like . In the requirements phase, security is incorporated through the creation of security user stories that explicitly define non-functional security requirements, such as data standards or mechanisms, ensuring that security needs are captured alongside functional specifications from the project's inception. During the design phase, architecture reviews and sessions evaluate system components for potential weaknesses, applying principles like defense in depth to create resilient blueprints that minimize attack surfaces. Implementation follows with adherence to secure coding standards, including mitigations for the Top 10 risks, such as input validation to prevent injection flaws and secure for cryptographic operations. Testing in the SSDLC emphasizes both (SAST), which analyzes for vulnerabilities without execution, and (DAST), which simulates attacks on running applications to identify runtime issues like . Deployment integrates secure (CI/CD) pipelines that automate vulnerability scans, enforce , and use with least-privilege access to prevent unauthorized changes. Finally, the maintenance phase focuses on patch management processes to timely apply security updates, monitor for emerging threats, and conduct periodic audits to sustain security posture throughout the software's lifecycle. Key frameworks guide the implementation of SSDLC. Microsoft's Security Development Lifecycle (SDL), first introduced in 2004 and updated as of 2025, provides a structured set of 10 practices spanning requirements analysis to final validation, emphasizing tools for static analysis and fuzzing. Similarly, the NIST Special Publication 800-218 (2022), titled Secure Software Development Framework (SSDF), outlines 17 high-level practices organized into four groups—Prepare the Organization, Protect the Software, Produce Well-Secured Software, and Respond to Vulnerabilities—to be integrated across any SDLC model, promoting outcomes like reduced vulnerability prevalence through consistent security controls. As of 2025, OWASP has updated its integration standards to include enhanced guidance for AI and machine learning security in the SSDLC. Supporting tools and practices enhance SSDLC effectiveness, particularly through shift-left security, which moves testing and reviews earlier in the process to detect issues at the source and avoid downstream propagation. Automated code scanning tools like integrate into and pipelines to perform real-time analysis for security hotspots and code smells, enabling developers to address flaws immediately. Adoption of these practices prevents accumulation of and improves overall software reliability.

Threat Modeling and Risk Assessment

Threat modeling is a structured process in secure by design methodologies that involves systematically identifying, categorizing, and prioritizing potential security threats to a system during its early design stages. This approach typically begins with the creation of data flow diagrams (DFDs), which visually represent the system's components, data flows, trust boundaries, and interactions to provide a clear architectural overview. By decomposing the system into these elements, developers can pinpoint vulnerabilities and entry points for attacks. A widely adopted framework for mapping threats within these diagrams is STRIDE, developed by , which classifies s into six categories: Spoofing (impersonating a user or system), Tampering (altering data or code), Repudiation (denying actions), Information Disclosure (exposing sensitive data), Denial of Service (disrupting availability), and Elevation of Privilege (gaining unauthorized access levels). For each element in the DFD, the STRIDE model is applied to generate a comprehensive list, enabling teams to anticipate adversarial behaviors and design countermeasures accordingly. This method ensures that security considerations are embedded proactively rather than reactively. As of 2025, extensions to include specific considerations for AI/ML systems, such as adversarial inputs and model poisoning. Following threat identification, evaluates the likelihood and impact of these threats using qualitative or quantitative models. The model, also originating from , assesses risks across five factors—Damage potential, Reproducibility of the attack, Exploitability ease, Affected users scope, and Discoverability of the vulnerability—assigning scores typically on a 1-10 scale to calculate an overall risk rating, with higher scores indicating priorities for . Complementing this, the (CVSS), maintained by the Forum of Incident Response and Security Teams (FIRST), provides a standardized numerical score from 0.0 to 10.0 based on metrics like , complexity, privileges required, and potential impact, facilitating consistent prioritization across organizations. These assessments guide toward high-impact threats. Tools such as Microsoft's Threat Modeling Tool automate much of this process by supporting DFD creation, STRIDE-based threat generation, and mitigation recommendations, integrating seamlessly into development workflows to foster collaborative security reviews. In practice, applying early can mitigate risks like attacks, as exemplified by the 2021 Log4j vulnerability (CVE-2021-44228), where a flaw in the widely used logging library enabled remote code execution across millions of applications; proactive DFD analysis of third-party dependencies could have identified and isolated such exposure points during design. This practice integrates into the broader secure software development lifecycle as a dedicated phase for ongoing threat refinement.

Standards and Regulations

Key Standards and Frameworks

The National Institute of Standards and Technology (NIST) has developed key frameworks that underpin secure by design principles, notably Special Publication (SP) 800-218, the (SSDF), released in February 2022. This framework outlines 19 high-level practices organized into four groups—Prepare the Organization, Protect the Software, Produce Well-Secured Software, and Respond to Vulnerabilities—that span the entire (SDLC). These practices emphasize integrating from the outset, such as defining security requirements early and conducting , to mitigate risks systematically across preparation, protection, production, and response phases. Complementing the SSDF, NIST SP 800-53 Revision 5, published in September 2020, provides a comprehensive catalog of over 1,000 and privacy controls organized into 20 families, including and incident response, to protect information systems and support risk-based secure design implementations. The Open Web Application Security Project (OWASP) contributes significantly through its Secure by Design Framework, initially released as a draft version 0.5.0 in August 2025, which focuses on embedding security into software architecture during the design phase of the SDLC. This framework offers structured guidance for architects and engineers, including checklists for design-time decisions like establishing trust zones and service boundaries, to prevent security flaws before coding begins and align with regulatory requirements. Additionally, OWASP's Software Assurance Maturity Model (SAMM), an open framework updated to version 2.0 in 2020 with ongoing enhancements, enables organizations to assess and improve their software security posture through maturity levels across five business functions: governance, design, implementation, verification, and operations. SAMM uses scoring metrics, such as "Percent to Target," to benchmark practices and identify gaps, supporting tailored strategies for secure development maturity. International standards like ISO/IEC 27034 provide foundational guidance for , with Part 1 (published November 2011) offering an overview of concepts, principles, and processes to integrate security into the management of in-house, acquired, or outsourced applications throughout their lifecycle. This multi-part standard emphasizes specifying security requirements, selecting controls, and maintaining application security norms to ensure consistent protection against threats. For benchmarking, the Building Security In (BSIMM), developed by and based on empirical data from over 100 organizations, measures software security initiatives across 128 activities in 12 practices, spanning , , secure development lifecycle (SDLC) practices, and deployment. In its latest iteration, BSIMM15 (January 2025), it is based on data from 121 organizations. BSIMM serves as a descriptive tool to compare an organization's maturity against industry peers, highlighting observable behaviors without prescribing specific actions. The (CISA) addresses secure by design through its December 2023 whitepaper, "The Case for Memory Safe Roadmaps," co-authored with agencies like the NSA and international partners, which recommends transitioning to memory-safe languages (e.g., , Go, ) to eliminate up to 70% of vulnerabilities stemming from issues, such as those in Microsoft CVEs. The document urges software manufacturers to publish roadmaps detailing phased adoption, training, and prioritization of critical code, reducing the and operational costs associated with patching exploits.

Legislative and Policy Developments

In the United States, 14028, issued on May 12, 2021, mandates the adoption of practices across federal agencies and contractors to enhance the nation's cybersecurity posture, emphasizing the removal of default passwords, implementation of , and centralized vulnerability management. This order also requires the development of software bills of materials (SBOMs) to improve transparency and for critical software. Building on this, the (CISA) launched the Secure by Design Pledge in May 2024, with 328 signatories as of November 2025 committing to measurable actions such as eliminating default credentials and prioritizing vulnerability remediation. Additionally, the Protecting and Transforming Cyber Health Care (PATCH) Act of 2022, enacted in December 2022, requires enhanced vulnerability disclosure requirements for manufacturers, including postmarket monitoring plans and coordinated reporting to address cybersecurity risks. In the , the (CRA), adopted in 2024 and entering into force on December 10, 2024, imposes mandatory security-by-design obligations on manufacturers of digital products, requiring handling throughout the product lifecycle, conformity assessments, and for compliance, with main provisions applying from December 11, 2027. Enforcement mechanisms include market surveillance by national authorities, potential fines up to 15 million euros or 2.5% of global turnover, and harmonized standards to ensure . Complementing this, the Digital Operational Resilience Act (DORA), effective from January 17, 2025, targets the financial sector by requiring ICT risk management frameworks that incorporate secure-by-design principles, third-party oversight, and incident reporting to mitigate operational disruptions. Globally, the United Kingdom's National Cyber Security Centre (NCSC) updated its Secure by Design principles in May 2025 through the Software Security Code of Practice, promoting voluntary adoption of baseline security measures like and secure coding for software developers, with incentives to enforce . In the healthcare domain, the U.S. (FDA) issued final guidance in September 2023 on cybersecurity for medical devices, mandating premarket submissions that demonstrate secure-by-design controls, including plans and SBOMs to protect against evolving threats. These developments, including widespread mandates for SBOMs, align briefly with non-binding frameworks like NIST's secure software guidelines to foster consistent enforcement.

Applications in Architectures

Client-Server and Distributed Systems

In client-server architectures, secure by design emphasizes robust mechanisms for to ensure mutual verification between clients and servers, preventing unauthorized access. One key approach is the use of mutual (mTLS) with 2.0, where both parties present s during the TLS handshake to authenticate each other, binding access tokens to the client's certificate for enhanced security against token theft or impersonation. This method, defined in RFC 8705, ensures that only legitimate clients can request and use tokens, reducing risks in distributed API interactions. Additionally, minimizing server privileges aligns with the principle of least privilege, where server processes are granted only the minimal permissions necessary to handle client requests, thereby limiting the impact of exploits originating from compromised clients, such as injection attacks that could otherwise escalate to full system compromise. Practical implementations in client-server systems include enforcing TLS 1.3 by default for all communications, which mandates and eliminates vulnerable legacy cipher suites, thereby providing stronger encryption and resistance to downgrade attacks out of the box. For web applications, secure session management is critical to avoid replay attacks, involving the generation of high-entropy session IDs using cryptographically secure pseudorandom number generators, binding sessions to client attributes like IP addresses, and regenerating IDs upon or privilege changes to invalidate any intercepted tokens. In distributed systems, secure by design extends to architectures through service meshes that automate and across nodes. For instance, Istio implements mutual TLS (mTLS) to encrypt all service-to-service traffic transparently, using short-lived certificates issued to workloads for without requiring application code changes. This approach supports zero-trust models, where no implicit trust exists between nodes regardless of location, with decisions made dynamically per request based on policy enforcement points that verify identities and authorize actions continuously. By assuming potential compromise at any node, these mechanisms prevent lateral movement by attackers and ensure resilient, communication in highly decentralized environments. As of 2025, CISA's Secure by Design Pledge, launched in May 2024, encourages adoption of such practices in distributed systems through commitments to automated and transparency measures like software bills of materials (SBOMs). Additionally, CISA's February 2025 alert highlights eliminating vulnerabilities in distributed to mitigate issues prevalent in these architectures.

Cloud and IoT Environments

In environments, secure by design principles emphasize integrating security into the from , accounting for the shared responsibility model where cloud service providers (CSPs) secure the underlying infrastructure while customers handle applications, data, and configurations. This approach leverages frameworks like the NIST Secure Software Development Framework (SSDF), which recommends during design (PW.1) to identify risks such as data breaches and unauthorized access, ensuring architectures incorporate zero trust principles, , and encryption for and in transit using /3 validated . For instance, the U.S. Department of Defense Cloud Security Playbook advocates using (IaC) for automated, secure deployments and implementing the principle of least privilege (PoLP) to minimize attack surfaces, with mandatory phishing-resistant (MFA) for privileged access. The (CISA) Secure by Design guidance further stresses eliminating default passwords, providing free security logging, and publishing threat models to enhance transparency in cloud products, reducing customer burden by embedding protections like memory-safe languages and (TLS) for connections. In practice, this means CSPs must offer secure default configurations and configuration templates at no extra cost, while customers conduct regular testing and deploy Cloud-Native Application Platforms (CNAPPs) for , as outlined in guidelines to achieve defense-in-depth. These practices not only mitigate common vulnerabilities but also align with standards like NIST SP 800-53, promoting scalable security in multi-tenant environments. As of 2025, integrations with NIST's Cybersecurity Framework 2.0 (released 2024) enhance these applications by emphasizing governance and in cloud architectures. For (IoT) environments, secure by design focuses on embedding security into device , , and connectivity from the outset, given the resource constraints and vast attack surfaces of interconnected devices. The IoT Security Foundation (IoTSF) Assurance Framework classifies devices into assurance levels (0-4) based on risk assessments of , , and , mandating secure processes, tamper-resistant , and digitally signed updates to prevent unauthorized modifications. NIST integrates its SSDF with IoT-specific guidance (e.g., NISTIR 8259), recommending the reuse of vetted cryptographic modules (PW.4) and secure default settings (PW.9) to address threats like weak and compromises. CISA's principles apply to IoT by requiring manufacturers to eliminate default credentials, implement unique device identifiers with compliant keys, and provide disclosure policies, ensuring a across the . Best practices include using strong, updateable encryption for interfaces (e.g., WPA-2 for ) and offering user-controlled update mechanisms, as per IoTSF guidelines, to mitigate risks in deployments like smart homes or industrial sensors. Compliance with standards such as ETSI EN 303 645 and NIST SP 800-218 enables end-of-life and auditable manifests of software components, fostering resilience against evolving threats. As of September 2024, ETSI EN 303 645 was updated to version 3.1.3, strengthening baseline security provisions for consumer devices against elementary attacks. Additionally, NIST's draft Revision 1 of IR 8259 (public comment through October 2025) introduces updated foundational cybersecurity activities for manufacturers, including risk-based methodologies. Both cloud and benefit from overarching practices like executive accountability for security outcomes and radical transparency through Software Bills of Materials (SBOMs), as promoted by CISA, to build ecosystem-wide trust and reduce systemic vulnerabilities.

References

  1. [1]
    [PDF] Principles and Approaches for Security-by-Design and -Default - CISA
    Apr 13, 2023 · “Secure-by-Design” means that technology products are built in a way that reasonably protects against malicious cyber actors successfully ...
  2. [2]
    Secure Product Design - OWASP Cheat Sheet Series
    Security Principles. 1. The principle of Least Privilege and Separation of Duties; 2. The principle of Defense-in-Depth; 3. The principle of Zero Trust; 4. The ...
  3. [3]
    OWASP Secure by Design Framework
    The OWASP Secure-by-Design Framework provides practical guidance to embed security into software architecture from the start—long before code is written.
  4. [4]
    Secure by Design - CISA
    Products designed with Secure by Design principles prioritize the security of customers as a core business requirement, rather than merely treating it as a ...Read the Whitepaper · Secure by Design Alerts · Secure by Design Blogs · Pledge
  5. [5]
  6. [6]
    [PDF] Secure By Design - CISA
    The authoring organizations developed the following three core principles to guide software manufacturers in building software security into their design ...
  7. [7]
    Secure by Design Pledge | CISA
    No readable text found in the HTML.<|control11|><|separator|>
  8. [8]
  9. [9]
    [PDF] Unix and Security: The Influences of History - Purdue e-Pubs
    Abstract. UNIX has a reputation as an operating system that is difficult to secure. This reputation is largely unfounded. Instead, the blame lies.
  10. [10]
    [PDF] Looking Back at the Bell-La Padula Model
    Dec 7, 2005 · The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer sys- tems. Together with its sibling ...
  11. [11]
    About the Microsoft Security Development Lifecycle (SDL)
    The Microsoft SDL became an integral part of the software development process at Microsoft in 2004. The development, implementation, and constant ...
  12. [12]
    Secure by Design Pledge Signers - CISA
    Ivanti. Jobready360, JupiterOne, Keeper Security, Key9 Identity, Kisi, Kiteworks, KnectIQ. Komodo Health, Kontent.ai, Kusari, Lasso Security, Legit Security ...
  13. [13]
    Securing our future: April 2025 progress report on ... - Microsoft
    Apr 21, 2025 · We are sharing the second SFI progress report, which highlights progress made in our multi-year journey to improve the security posture of Microsoft.Topics · Secure By Design, Default... · A Future Of Secure...
  14. [14]
    Cyber Resilience Act | Shaping Europe's digital future
    Mar 6, 2025 · The Cyber Resilience Act entered into force on 10 December 2024. The main obligations introduced by the Act will apply from 11 December 2027.Regulation (EU) 2024/2847 · EU cybersecurity policies · European Commission
  15. [15]
    Enhance security with the principle of least privilege - Microsoft Learn
    Oct 23, 2023 · The information security principle of least privilege asserts that users and applications should be granted access only to the data and operations they require ...Recommendations at a glance · Overprivileged applications
  16. [16]
    Role Based Access Control | CSRC
    With RBAC, security is managed at a level that corresponds closely to the organization's structure. Each user is assigned one or more roles, and each role is ...Rbac-std-draft.pdfRole Engineering and RBAC ...CSRC MENUPublicationsRole-Based Access Control
  17. [17]
    SolarWinds Compromise, Campaign C0024 - MITRE ATT&CK®
    Mar 24, 2023 · During the SolarWinds Compromise, APT29 used domain administrators' accounts to help facilitate lateral movement on compromised networks.
  18. [18]
    [PDF] NIST SP 800-123, Guide to General Server Security
    Removing unnecessary services and applications is preferable to simply disabling them through configuration settings because attacks that attempt to alter ...
  19. [19]
    Announcing the all new Attack Surface Analyzer 2.0 - Microsoft
    May 15, 2019 · Attack Surface Analyzer 2.0 can help you identify security weaknesses introduced when installing software on Windows, Linux, or macOS.
  20. [20]
    Extending SDL: Understanding The Security Guarantees Of Your Apps
    Oct 7, 2019 · This state of the software industry goes against the fundamental tenet called Kerckhoffs' Principle, also known as Shannon's Maxim, which ...
  21. [21]
    La Cryptographie Militaire — Evervault
    This paper is the origin of Kerckhoffs' Principle which states that the security of a cryptosystem must lie in the choice of its keys only.Missing: source | Show results with:source
  22. [22]
    [PDF] CRYPTOGRAPHY 2006 THE RISE AND FALL OF DVD ENCRYPTION
    Dec 15, 2006 · 5.4 Security through obscurity. There has never been released an official description of the cryptosystem behind CSS. Its creators must have ...
  23. [23]
    FIPS 197, Advanced Encryption Standard (AES) | CSRC
    Three members of the Rijndael family are specified in this Standard: AES-128, AES-192, and AES-256. Each of them transforms data in blocks of 128 bits.
  24. [24]
    Funded open source security work at the Linux Foundation
    Aug 10, 2021 · By its very nature, open source enables worldwide peer review, yet while its transparency has the potential for enhanced software security ...
  25. [25]
    defense-in-depth - Glossary | CSRC
    defense-in-depth ... Definitions: Information security strategy integrating people, technology, and operations capabilities to establish variable barriers across ...
  26. [26]
    [PDF] Recommended Practice: Defense in Depth - CISA
    In the cybersecurity paradigm, Defense in Depth correlates to detective and protective measures designed to impede the progress of a cyber intruder while.
  27. [27]
    Network Segmentation - OWASP Cheat Sheet Series
    This cheat sheet is to show the basics of network segmentation to effectively counter attacks by building a secure and maximally isolated service network ...
  28. [28]
    The Protection of Information in Computer Systems
    f) Least privilege: Every program and every user of the system should operate using the least set of privileges necessary to complete the job.Missing: duties | Show results with:duties
  29. [29]
  30. [30]
    [PDF] IoTSF Secure Design Best Practice Guides
    Make the device circuitry physically inaccessible to tampering, e.g. epoxy chips to circuit board, resin encapsulation, hiding data and address lines under ...
  31. [31]
    [PDF] Secure Software Development Framework (SSDF) Version 1.1
    This publication has been developed by NIST in accordance with its statutory responsibilities under the. Federal Information Security Modernization Act ...
  32. [32]
    integration standards | OWASP in SDLC
    Security can be embedded in a SDLC by building on top of previous steps with policies, controls, designs, implementations and tests.1. The Software Development... · 1.2. Design Stage · 1.3. Development Stage
  33. [33]
    CI CD Security - OWASP Cheat Sheet Series
    CI/CD pipelines and processes facilitate efficient, repeatable software builds and deployments; as such, they occupy an important role in the modern SDLC.
  34. [34]
    [PDF] Developer Guide - OWASP Foundation
    Feb 2, 2023 · Application Security Testing (IAST, SAST & DAST) and implementing supply chain security, and there ... Refer to the CI/CD Security Cheat Sheet for ...
  35. [35]
    Microsoft Security Development Lifecycle (SDL)
    The Security Development Lifecycle (SDL) is Microsoft's approach to integrate security into DevOps, applicable to all software development and platforms.Practices · Frequently Asked Questions · Resource List · Getting started
  36. [36]
    Microsoft Security Development Lifecycle (SDL)
    Sep 29, 2025 · Microsoft SDL consists of seven components, including five core phases and two supporting security activities. The five core phases are ...Training · Design · Verification
  37. [37]
    Shift-Left Security: Advancing Early Stage Security Integration - Sonar
    By automating code reviews, Sonar provides immediate feedback on the security and quality of the code being written. This not only facilitates early detection ...Missing: density metrics
  38. [38]
    What is Shift Left? Testing, Strategy, Security & Principles ... - Sonar
    The principle of Shift Left testing is to transpose testing activities earlier within the Software Development Lifecycle (SDLC). This proactive stance allows ...Missing: density metrics
  39. [39]
    Beyond cybersecurity awareness: Make a strategic shift to code ...
    Oct 29, 2025 · SonarQube makes this shift achievable by integrating code quality and security checks directly into developers' IDEs and CI/CD pipelines.
  40. [40]
    Threat Modeling Process - OWASP Foundation
    Threat Analysis. It is frequently claimed that “a prerequisite in the analysis of threats is the understanding of the generic definition of risk.” But this is ...
  41. [41]
    Uncover Security Design Flaws Using The STRIDE Approach
    This article discusses: The importance of threat modeling; How to model a system using a data flow diagram; How to mitigate threats. This article uses the ...
  42. [42]
    What is STRIDE in Threat Modeling? - Security Compass
    Aug 25, 2025 · STRIDE is a threat modeling framework created by Microsoft that helps teams identify potential security threats by classifying them into six ...
  43. [43]
    DREAD Threat Modeling: An Introduction to Qualitative Risk Analysis
    Mar 9, 2022 · The DREAD model quantitatively assesses the severity of a cyberthreat using a scaled rating system that assigns numerical values to risk categories.
  44. [44]
    CVSS v4.0 Specification Document - FIRST.org
    CVSS is an open framework for communicating software vulnerability characteristics and severity, capturing technical details and outputting numerical scores.
  45. [45]
    Microsoft Threat Modeling Tool overview - Azure
    Aug 25, 2022 · The Threat Modeling Tool is a core element of the Microsoft Security Development Lifecycle (SDL). It allows software architects to identify and mitigate ...Getting StartedStrideGet familiar with the featuresSystem requirementsMitigations
  46. [46]
    What is the Log4j Vulnerability? - IBM
    The Log4J vulnerability, also known as Log4Shell, is a critical vulnerability discovered in the Apache Log4J logging library in November 2021.
  47. [47]
    Microsoft Security Development Lifecycle Threat Modelling
    The Microsoft Threat Modeling Tool makes threat modeling easier for all developers through a standard notation for visualizing system components, data flows, ...
  48. [48]
    Secure Software Development Framework (SSDF) Version 1.1
    Feb 3, 2022 · This document recommends the Secure Software Development Framework (SSDF) – a core set of high-level secure software development practices that can be ...
  49. [49]
    What is NIST SSDF and how should you implement it? - Codific
    Jan 27, 2025 · The NIST SSDF framework consists of 42 specific tasks across 19 practices, organized into four categories, each addressing critical aspects of ...
  50. [50]
    SP 800-53 Rev. 5, Security and Privacy Controls for Information ...
    This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets.
  51. [51]
  52. [52]
    OWASP SAMM
    SAMM is a Software Assurance Maturity Model that helps organizations analyze and improve their software security posture.
  53. [53]
  54. [54]
    ISO/IEC 27034-1:2011 - Information technology — Security techniques
    In stockISO/IEC 27034 provides guidance to assist organizations in integrating security into the processes used for managing their applications.
  55. [55]
  56. [56]
    What Is the BSIMM and How Does It Work? - Black Duck
    ... Building Security In Maturity Model (BSIMM) measures software security. The BSIMM (pronounced “bee simm”) is a study of existing software security initiatives.
  57. [57]
    [PDF] The Case for Memory Safe Roadmaps - CISA
    Memory safe programming languages (MSLs) can eliminate memory safety vulnerabilities. Therefore, transitioning to MSLs would likely greatly lessen the need to ...
  58. [58]
    [PDF] The Case for Memory Safe Roadmaps
    Dec 6, 2023 · Memory safe programming languages (MSLs) can eliminate memory safety vulnerabilities. Therefore, transitioning to MSLs would likely greatly ...
  59. [59]
    Building a Secure by Design Ecosystem - CISA
    Jan 13, 2025 · The Secure by Design movement has ignited tangible improvements in how manufacturers develop and secure software.
  60. [60]
    Text - H.R.7084 - 117th Congress (2021-2022): PATCH Act of 2022
    “(1) The manufacturer shall have a plan to appropriately monitor, identify, and address in a reasonable time postmarket cybersecurity vulnerabilities and ...
  61. [61]
    Digital Operational Resilience Act (DORA) - EIOPA - European Union
    The Digital Operational Resilience Act (DORA) is a regulation introduced by the European Union to strengthen the digital resilience of financial entities.EU - 2024/1774 - EN - EUR-Lex · Directive (EU) 2022/2556 · 2022/2554 - EN
  62. [62]
    [PDF] Software Security Code of Practice - May 2025 - GOV.UK
    This document outlines a voluntary Software Security Code of Practice. The Code of. Practice has been developed to improve the security and resilience of ...
  63. [63]
    [PDF] Cybersecurity in Medical Devices: Quality System Considerations ...
    Sep 27, 2023 · FDA recommends that device manufacturers implement comprehensive cybersecurity risk management programs and documentation consistent with the QS ...
  64. [64]
    RFC 8705: OAuth 2.0 Mutual-TLS Client Authentication and ...
    This document describes OAuth client authentication and certificate-bound access and refresh tokens using mutual Transport Layer Security (TLS) authentication ...Table of Contents · Mutual TLS for OAuth Client... · Mutual-TLS Client Certificate...
  65. [65]
    least privilege - Glossary - NIST Computer Security Resource Center
    A security principle that a system should restrict the access privileges of users (or processes acting on behalf of users) to the minimum necessary to ...
  66. [66]
    RFC 8446 - The Transport Layer Security (TLS) Protocol Version 1.3
    This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet.
  67. [67]
    Session Management - OWASP Cheat Sheet Series
    The session ID regeneration is mandatory to prevent session fixation attacks, where an attacker sets the session ID on the victim user's web browser instead of ...
  68. [68]
    Istio / Security
    The Istio security features provide strong identity, powerful policy, transparent TLS encryption, and authentication, authorization and audit (AAA) tools.
  69. [69]
    [PDF] Zero Trust Architecture - NIST Technical Series Publications
    Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area ...
  70. [70]
    [PDF] Cloud Security Playbook Volume 1 - DoD CIO
    Feb 26, 2025 · Cloud Service Providers are responsible for the physical security of their datacenters. They are also responsible for providing secure services.
  71. [71]
    [PDF] IoTSF IoT Security Assurance Framework Release 3.0 Nov 2021
    Providing good security capability requires decisions upfront in design and use – often referred to as secure by design. In most cases, addressing the security ...
  72. [72]
    SSDF and IoT Cybersecurity Guidance: Building Blocks for IoT ...
    Jun 22, 2023 · When used together, NIST's SSDF and IoT cybersecurity guidance help manufacturers design and deliver more secure IoT products to customers.