CISA Secure by Design Principles
CISA's Secure by Design initiative establishes principles for technology manufacturers to build security into their products from the ground up, rather than relying on customers to implement security after deployment. The guidance calls on manufacturers to take ownership of customer security outcomes, embrace radical transparency, and build organizational structures that prioritize security. Developed jointly with international cybersecurity agencies.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (4)
Principle 1 — Take Ownership of Customer Security Outcomes
Manufacturers should take responsibility for the security outcomes of their customers
| Code | Title |
|---|---|
| SBD-1.1 | Secure by Default Configuration |
| SBD-1.2 | Eliminate Default Passwords |
| SBD-1.3 | Free Security Features for All Tiers |
| SBD-1.4 | Automatic Security Updates |
| SBD-1.5 | Guided Secure Configuration |
Principle 2 — Embrace Radical Transparency
Manufacturers should be transparent about security vulnerabilities, practices, and product security posture
| Code | Title |
|---|---|
| SBD-2.1 | Vulnerability Disclosure Program |
| SBD-2.2 | CVE and CWE Issuance |
| SBD-2.3 | Software Bill of Materials (SBOM) |
| SBD-2.4 | Transparent Security Advisories |
| SBD-2.5 | Publish Security Roadmaps |
Principle 3 — Build Organizational Structure and Leadership
Manufacturers should build organizational structures and leadership that prioritize security
| Code | Title |
|---|---|
| SBD-3.1 | Executive Accountability for Security |
| SBD-3.2 | Security Investment Prioritization |
| SBD-3.3 | Internal Security Culture |
| SBD-3.4 | Customer Security Feedback Integration |
Secure Development Practices
Technical practices for building secure products throughout the development lifecycle
| Code | Title |
|---|---|
| SBD-DEV-01 | Memory-Safe Programming Languages |
| SBD-DEV-02 | Parameterized Queries |
| SBD-DEV-03 | Web Template Frameworks with Auto-Escaping |
| SBD-DEV-04 | Phishing-Resistant Authentication |
| SBD-DEV-05 | Secure Software Development Framework |
| SBD-DEV-06 | Threat Modeling |
| SBD-DEV-07 | Dependency Management and SBOM |
Maps to 398 other frameworks
Frequently Asked Questions
What is CISA Secure by Design Principles?
CISA Secure by Design Principles is a compliance framework from International with 4 domains and 21 controls. CISA's Secure by Design initiative establishes principles for technology manufacturers to build security into their products from the ground up, rather than relying on customers to implement security after deployment. The guidance calls on manufacturers to take ownership of customer security outcomes, embrace radical transparency, and build organizational structures that prioritize security. Developed jointly with international cybersecurity agencies. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does CISA Secure by Design Principles have?
CISA Secure by Design Principles has 21 controls organised across 4 domains. The largest domains are Secure Development Practices (7 controls), Principle 1 — Take Ownership of Customer Security Outcomes (5 controls), Principle 2 — Embrace Radical Transparency (5 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does CISA Secure by Design Principles map to?
CISA Secure by Design Principles maps to 398 other compliance frameworks. The top mapping partners are OWASP DevSecOps Maturity Model (DSOMM) (48% coverage), CNCF Cloud Native Security (Cloud Native Computing Foundation) (43% coverage), FAA Cybersecurity Framework for Aviation (43% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with CISA Secure by Design Principles compliance?
Start your CISA Secure by Design Principles compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about CISA Secure by Design Principles requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 21 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required