CISA Secure by Design Principles
1. Why this guidance matters
1. Why this guidance matters
1. Why the CRA matters now
1. Introduction to Data Privacy
1. Why EN 303 645 matters now
This glossary defines key terms, acronyms, and concepts used throughout the Secure-by-Design Handbook.
1. Why NIS 2 matters now
1. Why it matters for Connected Devices
1. Why PSTI matters now
1. Why the RED cyber rules matter now
1. Introduction to Secure Configuration
A maturity model is a tool that helps an organization measure the effectiveness and completeness of its practices against a defined standard. This Secure-by-Design (SbD) maturity model is designed to help you assess your product security capabilities, identify gaps, and build a roadmap for continuous improvement.
1. Introduction to Security Logging
1. Introduction to Threat Modeling
Not all "Products with Digital Elements" are created equal. The internal architecture of a connected device dramatically influences its security posture, the types of vulnerabilities it is susceptible to, and the kinds of security controls that can be implemented.
1. Introduction to Unique Device Identity
Secure-by-Design (SbD) is a foundational shift in product development. It mandates that security is a core business requirement, integrated from the very first stages of design and maintained throughout the entire product lifecycle. It is not a technical feature to be added on later.