CISA and FBI Update Guidance on Risky Software Security Practices
2025-01-22
Learn about the crucial importance of secure software development practices and how addressing risky practices can enhance your pitch for CloudGuard solutions in safeguarding critical infrastructure.
The CISA and FBI have updated their guidance on risky software security practices, emphasizing the need for software manufacturers to prioritize security, especially for critical infrastructure. The guidance highlights practices like using memory-unsafe languages, default passwords, and components with known vulnerabilities, and stresses the importance of multi-factor authentication and timely publication of CVEs. New additions include avoiding hardcoded credentials, outdated cryptographic functions, and improving product support. The updates also provide more examples for preventing SQL and command injection vulnerabilities, with specific recommendations for operational technology products to support phishing-resistant MFA. This guidance aims to help software manufacturers, including those developing on-premises, cloud, and SaaS products, to improve security and signal commitment to customer security outcomes.
Patch Management, Hardcoded Secrets, Weak or Compromised Credentials, Web App/Website Vulnerability
Software Security, CISA, FBI, Risky Practices, Multi-Factor Authentication, Cryptographic Functions, Critical Infrastructure
N/A
N/A
The US cybersecurity agencies CISA and the FBI have issued updated guidance on risky software security practices, aimed at software manufacturers, especially those developing for critical infrastructure. This guidance, known as Product Security Bad Practices, highlights security practices deemed exceptionally risky and provides recommendations on how to address them. The guidance outlines several risky practices related to product properties, security features, and organizational processes. These include: The updated guidance introduces three new risky practices: Moreover, the update includes more examples on preventing SQL injection and command injection vulnerabilities. It also revises the MFA section with recommendations specific to operational technology products, advocating for phishing-resistant MFA solutions. This guidance is intended for software developers creating on-premises, cloud services, and software-as-a-service (SaaS) products. It also applies to software running on operational technology (OT) products or embedded systems. CISA and the FBI urge all software manufacturers to review this guidance to signal their commitment to customer security outcomes, aligning with the secure-by-design principles.Updated Guidance on Risky Software Security Practices
Key Risky Practices
New Additions and Recommendations
Intended Audience and Implementation
https://www.securityweek.com/cisa-fbi-update-software-security-recommendations/