Back to Frameworks

Secure by Design: A Guide for Manufacturers (CISA)

United States (Federal)
v2023
14 domains
41 controls

CISA's Secure by Design initiative establishes principles for technology manufacturers to build security into their products from the ground up, rather than relying on customers to implement security after deployment. The guidance calls on manufacturers to take ownership of customer security outcomes, embrace radical transparency, and build organizational structures that prioritize security. Developed jointly with international cybersecurity agencies.

Verified

Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.

Framework Domains (14)

Commitment

1 controls
Controls in the Commitment domain of Secure by Design: A Guide for Manufacturers (CISA)1 controls
CodeTitle
SBD-20Sign the Secure by Design Pledge

Measurement

1 controls
Controls in the Measurement domain of Secure by Design: A Guide for Manufacturers (CISA)1 controls
CodeTitle
SBD-15Customer Security Outcome Metrics

Principle 1

1 controls
Controls in the Principle 1 domain of Secure by Design: A Guide for Manufacturers (CISA)1 controls
CodeTitle
SBD-1Take Ownership of Customer Security Outcomes

Principle 1 - Take Ownership of Customer Security Outcomes

5 controls

Manufacturers should take responsibility for the security outcomes of their customers

Controls in the Principle 1 - Take Ownership of Customer Security Outcomes domain of Secure by Design: A Guide for Manufacturers (CISA)5 controls
CodeTitle
SBD-1.1Secure by Default Configuration
SBD-1.2Eliminate Default Passwords
SBD-1.3Free Security Features for All Tiers
SBD-1.4Automatic Security Updates
SBD-1.5Guided Secure Configuration

Principle 2

1 controls
Controls in the Principle 2 domain of Secure by Design: A Guide for Manufacturers (CISA)1 controls
CodeTitle
SBD-2Embrace Radical Transparency

Principle 2 - Embrace Radical Transparency

5 controls

Manufacturers should be transparent about security vulnerabilities, practices, and product security posture

Controls in the Principle 2 - Embrace Radical Transparency domain of Secure by Design: A Guide for Manufacturers (CISA)5 controls
CodeTitle
SBD-2.1Vulnerability Disclosure Program
SBD-2.2CVE and CWE Issuance
SBD-2.3Software Bill of Materials (SBOM)
SBD-2.4Transparent Security Advisories
SBD-2.5Publish Security Roadmaps

Principle 3

1 controls
Controls in the Principle 3 domain of Secure by Design: A Guide for Manufacturers (CISA)1 controls
CodeTitle
SBD-3Lead from the Top

Principle 3 - Build Organizational Structure and Leadership

4 controls

Manufacturers should build organizational structures and leadership that prioritize security

Controls in the Principle 3 - Build Organizational Structure and Leadership domain of Secure by Design: A Guide for Manufacturers (CISA)4 controls
CodeTitle
SBD-3.1Executive Accountability for Security
SBD-3.2Security Investment Prioritization
SBD-3.3Internal Security Culture
SBD-3.4Customer Security Feedback Integration

Process

1 controls
Controls in the Process domain of Secure by Design: A Guide for Manufacturers (CISA)1 controls
CodeTitle
SBD-12Secure Software Development Lifecycle

Resilience

1 controls
Controls in the Resilience domain of Secure by Design: A Guide for Manufacturers (CISA)1 controls
CodeTitle
SBD-18Loss-Free Recovery and Backups

Secure Development Practices

7 controls

Technical practices for building secure products throughout the development lifecycle

Controls in the Secure Development Practices domain of Secure by Design: A Guide for Manufacturers (CISA)7 controls
CodeTitle
SBD-DEV-01Memory-Safe Programming Languages
SBD-DEV-02Parameterized Queries
SBD-DEV-03Web Template Frameworks with Auto-Escaping
SBD-DEV-04Phishing-Resistant Authentication
SBD-DEV-05Secure Software Development Framework
SBD-DEV-06Threat Modeling
SBD-DEV-07Dependency Management and SBOM

Supply Chain

2 controls
Controls in the Supply Chain domain of Secure by Design: A Guide for Manufacturers (CISA)2 controls
CodeTitle
SBD-13SBOM and Software Provenance
SBD-14Open Source Software Stewardship

Tactical

10 controls
Controls in the Tactical domain of Secure by Design: A Guide for Manufacturers (CISA)10 controls
CodeTitle
SBD-10CVE Issuance with Complete Detail
SBD-11Evidence of Intrusion in Logs
SBD-16Eliminate Hardcoded Secrets
SBD-17Authentication for Local and Network Interfaces
SBD-4Eliminate Default Passwords
SBD-5Mandate MFA, Especially for Privileged Users
SBD-6Reduce Entire Classes of Vulnerabilities
SBD-7Increase Use of Secure Defaults
SBD-8Patch Adoption
SBD-9Establish a Vulnerability Disclosure Policy

Usability

1 controls
Controls in the Usability domain of Secure by Design: A Guide for Manufacturers (CISA)1 controls
CodeTitle
SBD-19Reduce Hardening Guide Length

Your Compliance Coverage

If you comply with Secure by Design: A Guide for Manufacturers (CISA), you already cover:

Maps to 409 other frameworks

41 total controls
OWASP DevSecOps Maturity Model (DSOMM)
10 source controls mapped|9 target controls covered
24%
CNCF Security Technical Advisory Group (TAG)
9 source controls mapped|8 target controls covered
22%
FAA Cybersecurity Framework for Aviation
9 source controls mapped|6 target controls covered
22%
Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1
9 source controls mapped|22 target controls covered
22%
O-RAN Alliance Security Specifications (O-RAN.WG11)
9 source controls mapped|6 target controls covered
22%
Cyber Essentials Plus
9 source controls mapped|11 target controls covered
22%
ASD Information Security Manual (ISM)
9 source controls mapped|27 target controls covered
22%
Saudi NCA ECC
9 source controls mapped|11 target controls covered
22%
NIST SP 800-53A
9 source controls mapped|11 target controls covered
22%
Spain ENS
9 source controls mapped|11 target controls covered
22%
Ghana Cybersecurity Act
9 source controls mapped|11 target controls covered
22%
FISMA
9 source controls mapped|11 target controls covered
22%
BSI IT-Grundschutz
9 source controls mapped|11 target controls covered
22%
NIST SP 800-171
9 source controls mapped|12 target controls covered
22%
CISA Zero Trust Maturity Model
9 source controls mapped|11 target controls covered
22%
Belgium CyberFundamentals
9 source controls mapped|11 target controls covered
22%
DoD Zero Trust Reference Architecture
9 source controls mapped|11 target controls covered
22%
NIST SP 800-172
9 source controls mapped|11 target controls covered
22%
ANSSI Cybersecurity Framework
9 source controls mapped|11 target controls covered
22%
CSA STAR (Security, Trust, Assurance, and Risk)
9 source controls mapped|7 target controls covered
22%
Australian Energy Sector Cyber Security Framework (AESCSF)
9 source controls mapped|8 target controls covered
22%
PCI DSS v4.0
9 source controls mapped|18 target controls covered
22%
South Korea ISMS-P
8 source controls mapped|6 target controls covered
20%
20%
Canada ITSG-33 - IT Security Risk Management
8 source controls mapped|11 target controls covered
20%
New Zealand Information Security Manual (NZISM)
8 source controls mapped|10 target controls covered
20%
MARS-E - Minimum Acceptable Risk Standards for Exchanges
8 source controls mapped|10 target controls covered
20%
South Korea Cloud Security Assurance Program (CSAP)
8 source controls mapped|10 target controls covered
20%
NRC 10 CFR 73.54 - Nuclear Facility Cybersecurity
8 source controls mapped|10 target controls covered
20%
NIST SP 800-53 Rev 5
8 source controls mapped|16 target controls covered
20%
C5 (Germany)
8 source controls mapped|7 target controls covered
20%
FedRAMP Rev 5
8 source controls mapped|20 target controls covered
20%
NIST SP 800-171A - Assessing CUI Security Requirements
8 source controls mapped|16 target controls covered
20%
NIST SP 800-144
8 source controls mapped|7 target controls covered
20%
FTC GLBA Safeguards Rule (16 CFR Part 314)
8 source controls mapped|8 target controls covered
20%
FTC Safeguards Rule (16 CFR Part 314)
8 source controls mapped|8 target controls covered
20%
NIST Privacy Framework 1.0
8 source controls mapped|8 target controls covered
20%
Oman National Cybersecurity Framework
8 source controls mapped|5 target controls covered
20%
NIST SP 800-146
8 source controls mapped|7 target controls covered
20%
ISO 27017
8 source controls mapped|7 target controls covered
20%
AWS Well-Architected Security Pillar
8 source controls mapped|7 target controls covered
20%
NIST SP 800-190
8 source controls mapped|7 target controls covered
20%
ISMAP (Japan)
8 source controls mapped|7 target controls covered
20%
ISO 27018
8 source controls mapped|7 target controls covered
20%
HKMA Cyber Resilience Assessment Framework (C-RAF)
8 source controls mapped|7 target controls covered
20%
FFIEC Cybersecurity Assessment Tool (CAT)
8 source controls mapped|7 target controls covered
20%
Azure Security Benchmark
8 source controls mapped|7 target controls covered
20%
NIST SP 800-145
8 source controls mapped|7 target controls covered
20%
MTCS (Singapore)
8 source controls mapped|7 target controls covered
20%
CAIQ (CSA)
8 source controls mapped|7 target controls covered
20%
DISA Security Technical Implementation Guides (STIGs)
8 source controls mapped|14 target controls covered
20%
EU Digital Markets Act
8 source controls mapped|4 target controls covered
20%
EAR - Export Administration Regulations
8 source controls mapped|7 target controls covered
20%
US ITAR and EAR - Export Control and Data Security
8 source controls mapped|5 target controls covered
20%
ISO 27001:2022
8 source controls mapped|12 target controls covered
20%
ETSI EN 303 645
7 source controls mapped|9 target controls covered
17%
ASD Essential Eight Maturity Model
7 source controls mapped|7 target controls covered
17%
MITRE D3FEND
7 source controls mapped|8 target controls covered
17%
NIST SP 800-187
7 source controls mapped|9 target controls covered
17%
NIST SP 800-161
7 source controls mapped|8 target controls covered
17%
NRF Cybersecurity and Data Privacy Framework (National Retail Federation)
7 source controls mapped|2 target controls covered
17%
BSIMM
7 source controls mapped|8 target controls covered
17%
NYDFS Cybersecurity Regulation (23 NYCRR Part 500)
7 source controls mapped|12 target controls covered
17%
NIST SP 800-181
7 source controls mapped|8 target controls covered
17%
NIST SP 800-183
7 source controls mapped|8 target controls covered
17%
MITRE ATT&CK
7 source controls mapped|8 target controls covered
17%
NIST SP 800-218
7 source controls mapped|7 target controls covered
17%
NIST SP 800-92
7 source controls mapped|8 target controls covered
17%
NIST SP 800-207
7 source controls mapped|7 target controls covered
17%
CISA Cross-Sector Cybersecurity Performance Goals (CPG) 2.0
7 source controls mapped|7 target controls covered
17%
NIST SP 800-150
7 source controls mapped|7 target controls covered
17%
NIST SP 800-63
7 source controls mapped|7 target controls covered
17%
ASIC Cyber Resilience Good Practices
7 source controls mapped|4 target controls covered
17%
NIST SP 800-128
7 source controls mapped|8 target controls covered
17%
NIST SP 800-115
7 source controls mapped|8 target controls covered
17%
OpenSSF Scorecard
7 source controls mapped|9 target controls covered
17%
ISO/IEC 27011:2024
7 source controls mapped|6 target controls covered
17%
California IoT Security Law
7 source controls mapped|8 target controls covered
17%
PTES
7 source controls mapped|8 target controls covered
17%
NIST SP 800-123
7 source controls mapped|8 target controls covered
17%
NIST SP 800-160
7 source controls mapped|9 target controls covered
17%
NIST SP 800-61
7 source controls mapped|7 target controls covered
17%
Singapore Government Instruction Manual on ICT&SS Management (IM8)
7 source controls mapped|4 target controls covered
17%
US Gramm-Leach-Bliley Act (GLBA) - Higher Education Safeguards Rule
7 source controls mapped|10 target controls covered
17%
3GPP Security
7 source controls mapped|9 target controls covered
17%
OWASP MASVS
7 source controls mapped|7 target controls covered
17%
ISO 27002:2022
7 source controls mapped|9 target controls covered
17%
OWASP ASVS
7 source controls mapped|8 target controls covered
17%
ISO/SAE 21434
7 source controls mapped|8 target controls covered
17%
GLI-33 - Gaming Laboratories International Event Wagering Systems
7 source controls mapped|6 target controls covered
17%
TISAX - Trusted Information Security Assessment Exchange
7 source controls mapped|10 target controls covered
17%
NIS2 Directive Implementing Acts
7 source controls mapped|9 target controls covered
17%
NIST SP 800-137
7 source controls mapped|8 target controls covered
17%
ISO 27043
7 source controls mapped|8 target controls covered
17%
OWASP SAMM
7 source controls mapped|7 target controls covered
17%
EBA Guidelines on ICT and Security Risk Management (EBA/GL/2024/07)
7 source controls mapped|3 target controls covered
17%
NIST SP 800-88
7 source controls mapped|8 target controls covered
17%
Proposal for a Regulation on Cyber Resilience Act (CRA)
7 source controls mapped|8 target controls covered
17%
TSA Pipeline Security
7 source controls mapped|4 target controls covered
17%
UNECE WP.29 R156
7 source controls mapped|8 target controls covered
17%
SSDF (NIST)
7 source controls mapped|8 target controls covered
17%
SLSA
7 source controls mapped|8 target controls covered
17%
UK PSTI Act
7 source controls mapped|8 target controls covered
17%
UNECE WP.29 R155
7 source controls mapped|7 target controls covered
17%
SIG (Shared Assessments)
7 source controls mapped|8 target controls covered
17%
ISO/IEC 27400:2022
7 source controls mapped|5 target controls covered
17%
RBI Cybersecurity Framework for Banks
6 source controls mapped|4 target controls covered
15%
Modern Slavery Act 2018 (Australia)
6 source controls mapped|4 target controls covered
15%
UK Defence Standard 05-138 - Cyber Security for Defence Suppliers
6 source controls mapped|5 target controls covered
15%
Defence Security Principles Framework (DSPF)
6 source controls mapped|11 target controls covered
15%
Protective Security Policy Framework (PSPF) Release 2024
6 source controls mapped|11 target controls covered
15%
SSAE 18 - Attestation Standards (SOC Reporting)
6 source controls mapped|3 target controls covered
15%
TSA Pipeline Cybersecurity Directives
6 source controls mapped|3 target controls covered
15%
Notifiable Data Breaches Scheme (Australia)
6 source controls mapped|3 target controls covered
15%
FTC Health Breach Notification Rule
6 source controls mapped|3 target controls covered
15%
UK Product Security and Telecommunications Infrastructure Act (PSTI)
6 source controls mapped|3 target controls covered
15%
European Accessibility Act (Directive (EU) 2019/882)
6 source controls mapped|3 target controls covered
15%
Regulation (EU) 2023/1115 on deforestation-free supply chains
6 source controls mapped|3 target controls covered
15%
NIS2 Directive (Directive (EU) 2022/2555)
6 source controls mapped|3 target controls covered
15%
US SEC Digital Assets and Crypto Regulatory Framework
6 source controls mapped|3 target controls covered
15%
Australia Consumer Data Right - Banking (CDR)
6 source controls mapped|5 target controls covered
15%
Australia eSafety Commissioner - Online Safety Expectations for Industry
6 source controls mapped|3 target controls covered
15%
NIST Cybersecurity Framework 2.0
6 source controls mapped|7 target controls covered
15%
NIST SP 800-171A Rev 3 - Assessing CUI Security Requirements
6 source controls mapped|9 target controls covered
15%
ASD Strategies to Mitigate Cyber Security Incidents
6 source controls mapped|8 target controls covered
15%
CISA Industrial Control Systems (ICS) Security Guidance
6 source controls mapped|9 target controls covered
15%
FBI CJIS Security Policy
6 source controls mapped|10 target controls covered
15%
OWASP Top 10:2025
6 source controls mapped|7 target controls covered
15%
UK Gambling Commission - Cyber Resilience Requirements
6 source controls mapped|6 target controls covered
15%
NIST SP 800-82 Rev 3 - Guide to OT Security
6 source controls mapped|6 target controls covered
15%
SWIFT CSCF
6 source controls mapped|4 target controls covered
15%
CFTC System Safeguards (17 CFR 37, 38, 39, 49)
5 source controls mapped|6 target controls covered
12%
NIST AI Risk Management Framework (AI RMF 1.0)
5 source controls mapped|2 target controls covered
12%
NIST AI 600-1 Generative AI Profile
5 source controls mapped|2 target controls covered
12%
EIOPA Guidelines on ICT Security and Governance (2023)
5 source controls mapped|5 target controls covered
12%
Telecommunications Sector Security Reforms (TSSR)
5 source controls mapped|5 target controls covered
12%
MDS2 (Medical Device)
5 source controls mapped|6 target controls covered
12%
NIST SP 800-66
5 source controls mapped|6 target controls covered
12%
NAIC Insurance Data Security Model Law (MDL-668)
5 source controls mapped|8 target controls covered
12%
HIPAA Security Rule
5 source controls mapped|9 target controls covered
12%
ISO 27799
5 source controls mapped|6 target controls covered
12%
ISO 13485
5 source controls mapped|7 target controls covered
12%
UK Telecommunications (Security) Act 2021
5 source controls mapped|3 target controls covered
12%
FDA 21 CFR Part 11
5 source controls mapped|6 target controls covered
12%
OWASP API Security Top 10:2023
5 source controls mapped|5 target controls covered
12%
MARS-E
5 source controls mapped|6 target controls covered
12%
HL7 FHIR Security Framework
5 source controls mapped|10 target controls covered
12%
PCI DSS 4.0
5 source controls mapped|3 target controls covered
12%
WCO Authorised Economic Operator (AEO) Framework
5 source controls mapped|7 target controls covered
12%
12%
Customs-Trade Partnership Against Terrorism (C-TPAT)
5 source controls mapped|1 target controls covered
12%
Critical Raw Materials Act (Proposed Regulation COM(2023) 192)
5 source controls mapped|1 target controls covered
12%
SSAE 18 SOC 1 - Report on Controls at a Service Organisation (ICFR)
5 source controls mapped|4 target controls covered
12%
IATA Operational Safety Audit (IOSA) Standards Manual
5 source controls mapped|3 target controls covered
12%
US Executive Order 14028 - Improving the Nation's Cybersecurity
5 source controls mapped|3 target controls covered
12%
US NRC 10 CFR 73.54 - Cyber Security for Nuclear Power Plants
5 source controls mapped|3 target controls covered
12%
Papua New Guinea National Cybersecurity Policy & Cybercrime Act (2016)
4 source controls mapped|2 target controls covered
10%
Japan FSA Cybersecurity Guidelines for Financial Institutions
4 source controls mapped|4 target controls covered
10%
Kuwait National Cybersecurity Framework
4 source controls mapped|2 target controls covered
10%
AICPA Privacy Management Framework (PMF)
4 source controls mapped|2 target controls covered
10%
ASEAN Guide on AI Governance and Ethics
4 source controls mapped|2 target controls covered
10%
Security of Critical Infrastructure Act 2018 (SOCI)
4 source controls mapped|2 target controls covered
10%
ECB TIBER-EU Framework
4 source controls mapped|4 target controls covered
10%
NIST SP 800-124 Rev 2 - Mobile Device Security
4 source controls mapped|4 target controls covered
10%
UK Open Banking Standard
4 source controls mapped|4 target controls covered
10%
3GPP Security Architecture (TS 33.501 - 5G Security)
4 source controls mapped|6 target controls covered
10%
FFIEC IT Examination Handbook
4 source controls mapped|3 target controls covered
10%
3GPP 5G Security Architecture (TS 33.501)
4 source controls mapped|7 target controls covered
10%
ISO 19011
4 source controls mapped|4 target controls covered
10%
10%
CIS Controls v8
4 source controls mapped|6 target controls covered
10%
IRS Publication 1075 - Tax Information Security Guidelines
4 source controls mapped|2 target controls covered
10%
PCI P2PE
4 source controls mapped|3 target controls covered
10%
APRA CPS 234
4 source controls mapped|3 target controls covered
10%
EMV 3-D Secure (3DS2) - Payment Authentication Protocol
4 source controls mapped|4 target controls covered
10%
MAS TRM
4 source controls mapped|3 target controls covered
10%
ISO/IEC 29115:2023 - Entity Authentication Assurance Framework
4 source controls mapped|4 target controls covered
10%
PCI SSF
4 source controls mapped|3 target controls covered
10%
ILO Nursing Personnel Convention C149 (1977)
4 source controls mapped|3 target controls covered
10%
6th Anti-Money Laundering Directive (AMLD6, Directive (EU) 2018/1673)
4 source controls mapped|3 target controls covered
10%
ISO 8000 - Data Quality
4 source controls mapped|3 target controls covered
10%
FATF Recommendation 16 - Virtual Asset Travel Rule
4 source controls mapped|3 target controls covered
10%
Privacy by Design (PbD) - Seven Foundational Principles
4 source controls mapped|3 target controls covered
10%
BS 65000:2014 - Guidance on Organizational Resilience
4 source controls mapped|3 target controls covered
10%
BCBS 239
4 source controls mapped|3 target controls covered
10%
DORA
4 source controls mapped|3 target controls covered
10%
RFC 2350 - Expectations for Computer Security Incident Response (BCP 21)
4 source controls mapped|2 target controls covered
10%
Digital Economy Partnership Agreement (DEPA)
4 source controls mapped|2 target controls covered
10%
Chile Personal Data Protection Law (Law No. 21.719)
4 source controls mapped|2 target controls covered
10%
ISO/IEC 23837 - Security Requirements for Quantum Key Distribution
4 source controls mapped|4 target controls covered
10%
PropTech Security Standards - Smart Building Cybersecurity
4 source controls mapped|4 target controls covered
10%
HKMA SPM
4 source controls mapped|3 target controls covered
10%
PCI PIN Security
4 source controls mapped|3 target controls covered
10%
Open Banking Security
4 source controls mapped|3 target controls covered
10%
OSFI B-13
4 source controls mapped|3 target controls covered
10%
GLBA
4 source controls mapped|3 target controls covered
10%
PSD2 SCA
4 source controls mapped|3 target controls covered
10%
W3C Verifiable Credentials (VC) Data Model 2.0
4 source controls mapped|3 target controls covered
10%
SWIFT CSP
4 source controls mapped|3 target controls covered
10%
AICPA SOC 1
4 source controls mapped|3 target controls covered
10%
SWIFT Customer Security Programme (CSP)
4 source controls mapped|5 target controls covered
10%
Sigstore - Software Artifact Signing and Verification
4 source controls mapped|6 target controls covered
10%
FIDO2 and W3C WebAuthn Standard
4 source controls mapped|3 target controls covered
10%
TIBER-EU (Threat Intelligence-Based Ethical Red Teaming - European Union)
4 source controls mapped|3 target controls covered
10%
AICPA SOC 3
4 source controls mapped|3 target controls covered
10%
APEC Cross-Border Privacy Rules (CBPR) System
3 source controls mapped|1 target controls covered
7%
7%
EU Taxonomy Regulation
3 source controls mapped|1 target controls covered
7%
EDM Council DCAM - Data Management Capability Assessment Model
3 source controls mapped|1 target controls covered
7%
ISO/IEC 30111:2019
3 source controls mapped|3 target controls covered
7%
Nevada Gaming Control Board Cybersecurity Requirements
3 source controls mapped|2 target controls covered
7%
Lloyd's Minimum Standards - Cyber Security
3 source controls mapped|2 target controls covered
7%
UN Guiding Principles on Business and Human Rights (UNGPs)
3 source controls mapped|1 target controls covered
7%
APRA CPS 230 Operational Risk Management
3 source controls mapped|1 target controls covered
7%
ISO/IEC 29147:2018
3 source controls mapped|4 target controls covered
7%
ISO/IEC 29134:2023
3 source controls mapped|1 target controls covered
7%
APRA Prudential Standard CPS 234 - Information Security (Australia)
3 source controls mapped|1 target controls covered
7%
SA8000:2014 - Social Accountability Standard
3 source controls mapped|1 target controls covered
7%
Singapore Cybersecurity Act 2018
3 source controls mapped|1 target controls covered
7%
UK FCA/PRA Operational Resilience Framework
3 source controls mapped|1 target controls covered
7%
US OFAC Sanctions Compliance Framework
3 source controls mapped|1 target controls covered
7%
UK Building Safety Act 2022
3 source controls mapped|1 target controls covered
7%
SEC Cybersecurity Disclosure Rules
3 source controls mapped|1 target controls covered
7%
CWE Top 25 Most Dangerous Software Weaknesses (2024)
3 source controls mapped|6 target controls covered
7%
PIPEDA
3 source controls mapped|2 target controls covered
7%
Armenia Law on Protection of Personal Data (2015)
3 source controls mapped|2 target controls covered
7%
ISO 22739:2024 - Blockchain and Distributed Ledger Technologies Vocabulary
3 source controls mapped|4 target controls covered
7%
Kenya DPA
3 source controls mapped|2 target controls covered
7%
Kenya Data Protection Act
3 source controls mapped|2 target controls covered
7%
India DPDP Act
3 source controls mapped|2 target controls covered
7%
Law No. 172-13 on the Protection of Personal Data
3 source controls mapped|2 target controls covered
7%
Ley Orgánica de Protección de Datos Personales (LOPDP)
3 source controls mapped|2 target controls covered
7%
TEFCA - Trusted Exchange Framework and Common Agreement
3 source controls mapped|3 target controls covered
7%
Bahrain PDPL
3 source controls mapped|2 target controls covered
7%
EU Maritime Single Window Environment Regulation (EU) 2019/1239
3 source controls mapped|1 target controls covered
7%
CCPA/CPRA
3 source controls mapped|2 target controls covered
7%
Qatar DPL
3 source controls mapped|2 target controls covered
7%
Regional Comprehensive Economic Partnership (RCEP) - E-Commerce Chapter
3 source controls mapped|1 target controls covered
7%
DFARS 252.204-7012 - Safeguarding Covered Defense Information
3 source controls mapped|3 target controls covered
7%
Connecticut Data Privacy Act (CTDPA)
3 source controls mapped|5 target controls covered
7%
Illinois Biometric Information Privacy Act (BIPA)
3 source controls mapped|3 target controls covered
7%
Law 1581 of 2012 - Statutory Framework for the Protection of Personal Data
3 source controls mapped|2 target controls covered
7%
Russia Federal Law on Personal Data (152-FZ)
3 source controls mapped|1 target controls covered
7%
FIDO2 / WebAuthn - Passwordless Authentication Standard
3 source controls mapped|3 target controls covered
7%
Colorado Privacy Act (CPA)
3 source controls mapped|4 target controls covered
7%
Wisconsin Data Privacy Act (SB 670)
3 source controls mapped|3 target controls covered
7%
Tennessee Information Protection Act (TIPA)
3 source controls mapped|2 target controls covered
7%
Chile DPL
3 source controls mapped|2 target controls covered
7%
DAMA-DMBOK2 - Data Management Body of Knowledge (2nd Edition)
3 source controls mapped|1 target controls covered
7%
Turkey KVKK
3 source controls mapped|2 target controls covered
7%
Turkey Personal Data Protection Law (KVKK - Law No. 6698)
3 source controls mapped|2 target controls covered
7%
Mexico LFPDPPP
3 source controls mapped|2 target controls covered
7%
FERPA
3 source controls mapped|2 target controls covered
7%
USMCA Chapter 19 - Digital Trade (United States-Mexico-Canada Agreement)
3 source controls mapped|1 target controls covered
7%
Nebraska Data Privacy Act
3 source controls mapped|2 target controls covered
7%
PDPA Thailand
3 source controls mapped|2 target controls covered
7%
Colorado Privacy Act
3 source controls mapped|2 target controls covered
7%
Kentucky Consumer Data Protection Act
3 source controls mapped|2 target controls covered
7%
Vermont Artificial Intelligence and Consumer Data Act (AICDA)
3 source controls mapped|2 target controls covered
7%
Nigeria NDPR
3 source controls mapped|2 target controls covered
7%
EU Payment Services Directive (PSD2) - Under Review
3 source controls mapped|3 target controls covered
7%
CTDPA (Connecticut Data Privacy Act)
3 source controls mapped|2 target controls covered
7%
POPIA
3 source controls mapped|2 target controls covered
7%
LGPD
3 source controls mapped|2 target controls covered
7%
Iceland DPA
3 source controls mapped|2 target controls covered
7%
APPI
3 source controls mapped|2 target controls covered
7%
Argentina PDPA
3 source controls mapped|2 target controls covered
7%
Montana Consumer Data Privacy Act
3 source controls mapped|2 target controls covered
7%
New Jersey Data Privacy Act
3 source controls mapped|2 target controls covered
7%
HITECH Act
3 source controls mapped|2 target controls covered
7%
Norway PDPA
3 source controls mapped|2 target controls covered
7%
EU Cyber Solidarity Act (Regulation (EU) 2025/38)
3 source controls mapped|1 target controls covered
7%
AS9100D:2016 - Quality Management Systems for Aviation, Space, and Defence
3 source controls mapped|2 target controls covered
7%
ISO 20000-1
3 source controls mapped|2 target controls covered
7%
Philippines DPA
3 source controls mapped|2 target controls covered
7%
Philippines Data Privacy Act (RA 10173)
3 source controls mapped|3 target controls covered
7%
US EPA Safe Drinking Water Act (SDWA) - Cybersecurity Requirements
3 source controls mapped|1 target controls covered
7%
New Hampshire Privacy Act
3 source controls mapped|2 target controls covered
7%
Mauritius DPA
3 source controls mapped|2 target controls covered
7%
Jamaica DPA
3 source controls mapped|2 target controls covered
7%
Malaysia PDPA 2010
3 source controls mapped|2 target controls covered
7%
eIDAS 2.0 - EU Digital Identity Regulation
3 source controls mapped|1 target controls covered
7%
IEC 62351 - Power Systems Communication Security
3 source controls mapped|3 target controls covered
7%
COPPA
3 source controls mapped|2 target controls covered
7%
Vietnam PDPD
3 source controls mapped|2 target controls covered
7%
Maryland Online Data Privacy Act
3 source controls mapped|2 target controls covered
7%
Indonesia PDP Law
3 source controls mapped|2 target controls covered
7%
Iowa Consumer Data Protection Act
3 source controls mapped|2 target controls covered
7%
China PIPL
3 source controls mapped|2 target controls covered
7%
OWASP Top 10 for LLM Applications 2025
3 source controls mapped|4 target controls covered
7%
PDPA Singapore
3 source controls mapped|2 target controls covered
7%
Switzerland FADP
3 source controls mapped|2 target controls covered
7%
Oregon Consumer Privacy Act
3 source controls mapped|2 target controls covered
7%
Peru DPL
3 source controls mapped|2 target controls covered
7%
Indiana Consumer Data Protection Act
3 source controls mapped|2 target controls covered
7%
SWIFT CSCF v2024
3 source controls mapped|1 target controls covered
7%
EDM Council CDMC - Cloud Data Management Capability Framework
3 source controls mapped|2 target controls covered
7%
Liechtenstein DPA
3 source controls mapped|2 target controls covered
7%
Delaware Online Privacy and Protection Act (proposed)
3 source controls mapped|2 target controls covered
7%
EN 301 549 - ICT Accessibility Requirements
3 source controls mapped|1 target controls covered
7%
NIST Privacy Framework Version 1.0
3 source controls mapped|1 target controls covered
7%
Bank Secrecy Act / Anti-Money Laundering (BSA/AML)
3 source controls mapped|1 target controls covered
7%
Minnesota Consumer Data Privacy Act
3 source controls mapped|2 target controls covered
7%
US Consumer Product Safety Commission (CPSC) - Connected Product Safety
3 source controls mapped|1 target controls covered
7%
AML/CTF Act 2006 (Australia)
3 source controls mapped|1 target controls covered
7%
NIST SP 800-122
3 source controls mapped|2 target controls covered
7%
Saudi Arabia PDPL
3 source controls mapped|2 target controls covered
7%
Privacy Act 1988 (Australia)
3 source controls mapped|2 target controls covered
7%
New Zealand Privacy Act
3 source controls mapped|2 target controls covered
7%
ISO 27701
3 source controls mapped|2 target controls covered
7%
Rwanda DPL
3 source controls mapped|2 target controls covered
7%
Proposal for a Regulation on the European Health Data Space (EHDS)
3 source controls mapped|1 target controls covered
7%
WCAG 2.2
3 source controls mapped|2 target controls covered
7%
UK Data Protection Act 2018
3 source controls mapped|2 target controls covered
7%
Utah Consumer Privacy Act
3 source controls mapped|2 target controls covered
7%
Texas Data Privacy Act
3 source controls mapped|2 target controls covered
7%
Uruguay DPL
3 source controls mapped|2 target controls covered
7%
Virginia CDPA
3 source controls mapped|2 target controls covered
7%
Florida Digital Bill of Rights (SB 262)
3 source controls mapped|2 target controls covered
7%
Tennessee IPA
3 source controls mapped|2 target controls covered
7%
Taiwan PDPA
3 source controls mapped|2 target controls covered
7%
Zimbabwe Data Protection Act (2021)
3 source controls mapped|2 target controls covered
7%
ITU-T X.805 - Security Architecture for End-to-End Communications
3 source controls mapped|1 target controls covered
7%
UAE PDPL
3 source controls mapped|2 target controls covered
7%
C-TPAT - Customs-Trade Partnership Against Terrorism
3 source controls mapped|6 target controls covered
7%
Space ISAC (Information Sharing and Analysis Center) - Threat Framework
3 source controls mapped|2 target controls covered
7%
EU Medical Devices Regulation (MDR 2017/745)
2 source controls mapped|1 target controls covered
5%
ESRB Privacy Certified
2 source controls mapped|2 target controls covered
5%
ISO 31000:2018
2 source controls mapped|2 target controls covered
5%
Australian Information Security Manual
2 source controls mapped|3 target controls covered
5%
NIST Post-Quantum Cryptography Standards (FIPS 203, 204, 205)
2 source controls mapped|5 target controls covered
5%
ENISA Privacy-Enhancing Technologies Reports and Recommendations
2 source controls mapped|2 target controls covered
5%
NSA Quantum-Resistant (QR) Cryptography Migration Guidance
2 source controls mapped|3 target controls covered
5%
NSA CNSA Suite 2.0 - Commercial National Security Algorithm Suite
2 source controls mapped|3 target controls covered
5%
ISO 27005
2 source controls mapped|1 target controls covered
5%
ISO/IEC 42001:2023
2 source controls mapped|1 target controls covered
5%
Nigeria Open Banking Regulatory Framework (CBN, 2023)
2 source controls mapped|1 target controls covered
5%
ISO/IEC 27010:2015
2 source controls mapped|1 target controls covered
5%
NIST SP 800-34 Rev 1 - Contingency Planning Guide
2 source controls mapped|1 target controls covered
5%
ISO/IEC 27557:2022 - Organisational Privacy Risk Management
2 source controls mapped|1 target controls covered
5%
EU GMP Annex 11: Computerised Systems
2 source controls mapped|2 target controls covered
5%
NATO STANAG 4774/4778 - Confidentiality Metadata Labels
2 source controls mapped|2 target controls covered
5%
SOC for Cybersecurity - Cybersecurity Risk Management Examination
2 source controls mapped|1 target controls covered
5%
IMO Maritime Cybersecurity Guidelines (MSC-FAL.1/Circ.3/Rev.2)
2 source controls mapped|1 target controls covered
5%
ISO 28001:2007 Supply Chain Security Management
2 source controls mapped|1 target controls covered
5%
5%
FIRST CSIRT Services Framework and Standards
2 source controls mapped|1 target controls covered
5%
Defence Industry Security Program (DISP)
2 source controls mapped|1 target controls covered
5%
BSI C5 - Cloud Computing Compliance Criteria Catalogue
2 source controls mapped|1 target controls covered
5%
FATF 40 Recommendations
1 source controls mapped|1 target controls covered
2%
GLOBALG.A.P. Integrated Farm Assurance (IFA) Standard v6
1 source controls mapped|1 target controls covered
2%
GHG Protocol
1 source controls mapped|1 target controls covered
2%
PIC/S Guide to Good Manufacturing Practice for Medicinal Products
1 source controls mapped|1 target controls covered
2%
ISO/IEC 25012:2008 - Data Quality Model
1 source controls mapped|1 target controls covered
2%
Canada Artificial Intelligence and Data Act (AIDA)
1 source controls mapped|1 target controls covered
2%
ICH E6(R3) - Good Clinical Practice
1 source controls mapped|1 target controls covered
2%
BIMCO Cyber Security
1 source controls mapped|2 target controls covered
2%
ECSS-E-ST-40C: Space Engineering - Software
1 source controls mapped|2 target controls covered
2%
ECSS Software Engineering Standards
1 source controls mapped|2 target controls covered
2%
NIST SP 1800-32
1 source controls mapped|2 target controls covered
2%
NIS2 Directive
1 source controls mapped|2 target controls covered
2%
NERC CIP
1 source controls mapped|2 target controls covered
2%
IEC 62304:2015 Medical Device Software Lifecycle Processes
1 source controls mapped|2 target controls covered
2%
IEC 62443
1 source controls mapped|2 target controls covered
2%
IEEE 1686
1 source controls mapped|2 target controls covered
2%
GAMP 5 - Good Automated Manufacturing Practice
1 source controls mapped|1 target controls covered
2%
ISO 27019
1 source controls mapped|2 target controls covered
2%
API 1164
1 source controls mapped|2 target controls covered
2%
C2M2
1 source controls mapped|2 target controls covered
2%
DO-326A / ED-202A
1 source controls mapped|2 target controls covered
2%
ITIL 4
1 source controls mapped|1 target controls covered
2%
ISO 26262:2018 - Functional Safety for Road Vehicles
1 source controls mapped|1 target controls covered
2%
AS9100D - Aerospace Quality Management System
1 source controls mapped|1 target controls covered
2%
ISO/IEC 27003:2017
1 source controls mapped|1 target controls covered
2%
Automotive SPICE (ASPICE) v4.0 - Process Assessment Model
1 source controls mapped|1 target controls covered
2%
DO-178C / ED-12C - Software Considerations in Airborne Systems
1 source controls mapped|1 target controls covered
2%
Angola Personal Data Protection Law (Law No. 22/11)
1 source controls mapped|1 target controls covered
2%
ISO/IEC 27006:2024
1 source controls mapped|1 target controls covered
2%
ITAR - International Traffic in Arms Regulations
1 source controls mapped|2 target controls covered
2%
EU Markets in Crypto-Assets Regulation (MiCA)
1 source controls mapped|3 target controls covered
2%
MiFID II / MiFIR
1 source controls mapped|1 target controls covered
2%
Authorised Economic Operator (AEO) Programmes - Global Standards
1 source controls mapped|1 target controls covered
2%
US Automated Commercial Environment (ACE) - CBP Trade Data Requirements
1 source controls mapped|1 target controls covered
2%
Samoa Telecommunications Act (2005) - Privacy & Data Protection
1 source controls mapped|2 target controls covered
2%
ICAO Annex 17 - Aviation Security (AVSEC)
1 source controls mapped|1 target controls covered
2%
EU Clinical Trials Regulation (CTR 536/2014)
1 source controls mapped|1 target controls covered
2%
Uganda Data Protection and Privacy Act (2019)
1 source controls mapped|1 target controls covered
2%
SOC 2
1 source controls mapped|2 target controls covered
2%
Bermuda Monetary Authority (BMA) Cyber Risk Management Code of Conduct
1 source controls mapped|1 target controls covered
2%
UAE Virtual Asset Regulatory Authority (VARA) Regulations
1 source controls mapped|1 target controls covered
2%
CIRCIA (Cyber Incident Reporting for Critical Infrastructure Act)
1 source controls mapped|1 target controls covered
2%
South Korea PIPA
1 source controls mapped|1 target controls covered
2%
Bermuda Personal Information Protection Act 2016 (PIPA)
1 source controls mapped|1 target controls covered
2%

Frequently Asked Questions

What is Secure by Design: A Guide for Manufacturers (CISA)?

Secure by Design: A Guide for Manufacturers (CISA) is a compliance framework from United States (Federal) with 14 domains and 41 controls. CISA's Secure by Design initiative establishes principles for technology manufacturers to build security into their products from the ground up, rather than relying on customers to implement security after deployment. The guidance calls on manufacturers to take ownership of customer security outcomes, embrace radical transparency, and build organizational structures that prioritize security. Developed jointly with international cybersecurity agencies. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.

How many controls does Secure by Design: A Guide for Manufacturers (CISA) have?

Secure by Design: A Guide for Manufacturers (CISA) has 41 controls organised across 14 domains. The largest domains are Tactical (10 controls), Secure Development Practices (7 controls), Principle 1 - Take Ownership of Customer Security Outcomes (5 controls). Each control defines specific requirements that organisations must implement to achieve compliance.

What frameworks does Secure by Design: A Guide for Manufacturers (CISA) map to?

Secure by Design: A Guide for Manufacturers (CISA) maps to 409 other compliance frameworks. The top mapping partners are OWASP DevSecOps Maturity Model (DSOMM) (24% coverage), CNCF Security Technical Advisory Group (TAG) (22% coverage), FAA Cybersecurity Framework for Aviation (22% coverage). Use our comparison tool to explore control-level mappings between frameworks.

How do I get started with Secure by Design: A Guide for Manufacturers (CISA) compliance?

Start your Secure by Design: A Guide for Manufacturers (CISA) compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about Secure by Design: A Guide for Manufacturers (CISA) requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 41 controls and track your progress.

Start Your Compliance Journey

Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 768 frameworks.

Get Started Free →

Free forever — no credit card required