A Shot Across the Bow for Software Manufacturers Refusing to Prioritize Security

A Shot Across the Bow for Software Manufacturers Refusing to Prioritize Security

Overview: CISA and FBI Release Joint Guidance on Product Security Bad Practices

Today, CISA and the FBI issued a public bulletin outlining "Product Security Bad Practices," targeting software manufacturers that serve critical infrastructure and national critical functions (NCFs). While this guidance isn’t a final law—it’s open for public comment until December 2, 2024—it signals an urgent call to action.

This is not a suggestion—it’s a warning shot to the software industry, particularly large manufacturers that have ignored the need for secure development. It reflects the growing pressure to make software security a non-negotiable requirement. CISA’s guidance aligns with the Secure by Design initiative, urging manufacturers to prioritize security at every stage of development to reduce customer risk.

Key Areas of Concern: What This Guidance Covers

The CISA-FBI joint bulletin identifies bad practices that are exceptionally risky and provides recommended actions. It divides bad practices into three critical areas:

  1. Development Environments: Development using memory-unsafe languages (like C or C++) without a transition roadmap. Use of SQL injection-prone queries and command injection vulnerabilities.
  2. Security Features: Lack of Multi-Factor Authentication (MFA), especially for admin accounts. Lack of access to logs without requiring additional subscription fees (one of the more notable highlights).
  3. Organizational Processes and Policies: Failure to publish timely CVEs for high-impact vulnerabilities. Absence of a vulnerability disclosure policy (VDP) to enable responsible reporting by researchers.

The bulletin is open for public comment but make no mistake—this will influence the future regulatory landscape. Members of the public have until December 2, 2024, to provide feedback.

Why This Bulletin Matters: Building a Foundation for Future Lawsuits

This guidance is more than just a recommendation; it lays the legal and moral groundwork for future litigation. Courts often look to government guidance when assessing negligence and liability, and this document could become a powerful reference in lawsuits against manufacturers that fail to adopt secure practices.

Historically, government reports like the Surgeon General's warning on smoking (1964) became a catalyst for lawsuits that reshaped entire industries. This CISA bulletin could serve a similar role—outlining what constitutes negligent software development. Failing to comply with these recommendations could expose software vendors to product liability lawsuits and class actions, especially if their software is linked to a breach involving critical infrastructure.

T&Cs Won’t Save You: The End of Waiving Accountability

For years, software manufacturers have relied on terms and conditions (T&Cs) to limit their liability, placing the burden of risk on consumers. But CISA’s guidance is changing the narrative. When a product designed for critical infrastructure lacks basic security—like MFA or timely patching—courts may no longer accept T&Cs as a shield against liability.

Just as car manufacturers couldn’t rely on waivers to avoid responsibility for defective airbags, software manufacturers may soon face similar scrutiny. This guidance lays the foundation for gross negligence claims, where the existence of CISA’s recommendations will undermine any defense based on T&Cs.

Future Litigation Scenarios: What We Can Expect

Here’s how this bulletin could serve as the legal bedrock for future lawsuits:

  1. Breach Due to Known Exploited Vulnerability (KEV): A critical infrastructure organization is compromised due to an unpatched KEV-listed vulnerability. Claim: Plaintiffs argue the software vendor acted negligently by not patching within 30 days as outlined in CISA’s guidance.
  2. Class Action for MFA Neglect: A cloud service provider suffers a breach involving admin access that lacked mandatory MFA. Claim: The vendor is accused of gross negligence for failing to enforce MFA, despite CISA’s explicit recommendation.
  3. Subscription Lockout for Security Logs: An organization loses critical evidence after an attack because they couldn’t access their logs without paying for an upgraded subscription. Claim: Plaintiffs argue the vendor engaged in unfair practices by making logging capabilities inaccessible—a violation of the security baseline defined in the CISA bulletin.

Conclusion: Secure by Design—Or Prepare for Court Battles

This joint guidance is CISA’s shot across the bow, warning software manufacturers that the days of half-measures are over. It defines reasonable security practices and sets a clear expectation for how software serving critical infrastructure should be developed and maintained. Manufacturers that ignore this guidance do so at their own risk—not just to their reputation, but to their legal standing.

Like the Surgeon General’s warning on smoking, this bulletin creates a public record of negligence for future lawsuits. It signals that secure software is now a public safety issue, and manufacturers must either comply with these expectations or face accountability in court.

The comment period closes December 2, 2024—but the legal consequences will be felt long after. For software manufacturers, the choice is simple: embrace Secure by Design, or prepare to fight lawsuits in a courtroom near you.

Thank you for reading. Stay vigilant and demand accountability—whether it’s your car, your medicine, or your software.

Jeffrey Hanson I did not take this particular view on the bulletin, but I appreciate the perspective. I hope this is true and it creates positive change!

George Kamide

Cybersecurity Community Builder | Podcast Host | Speaker | GTM Advisor | Nonprofit Director | Advisory Board Member

5 个月

Dope write up, thanks Jeffrey!

Val Dobrushkin

VP or Director of Governance, Risk, and Compliance (GRC), building IPO-proof GRC

5 个月

This looks very promising and more than anything in the past is likely to finally push the needle where it needs to be across our software landscape.

要查看或添加评论,请登录

Jeffrey Hanson的更多文章

  • The Dismantling of our Cybersecurity Resilience

    The Dismantling of our Cybersecurity Resilience

    The systematic degradation of the United States’ cybersecurity infrastructure under the current administration has…

    2 条评论
  • The Darkest Hour of Democracy

    The Darkest Hour of Democracy

    My Threat-Informed Defense newsletter has focused on external threats—the cyber and geopolitical forces that seek to…

    1 条评论
  • Exit the Algorithm

    Exit the Algorithm

    Autocracies don’t need tanks or secret police anymore. They have something stronger—the algorithm.

  • Spyware: The Silent Assassin of Democracy

    Spyware: The Silent Assassin of Democracy

    Spyware, a covert surveillance tool, infiltrates your devices without consent, harvesting sensitive data like messages,…

    1 条评论
  • Automation as the New Battleground: A Fundamental Shift in Who—or What—is Fighting in the Trenches of Cybersecurity

    Automation as the New Battleground: A Fundamental Shift in Who—or What—is Fighting in the Trenches of Cybersecurity

    As we enter 2025, critical infrastructure faces an unprecedented convergence of challenges that will fundamentally…

    2 条评论
  • The Fate of .io: When Geopolitics Collides with the Digital World

    The Fate of .io: When Geopolitics Collides with the Digital World

    Last year I wrote about ccTLDs in this article: (25) Domain Diplomacy: The Power and Pitfalls of ccTLDs | LinkedIn The…

    1 条评论
  • The Rise of Adversarial AI

    The Rise of Adversarial AI

    As the field of artificial intelligence continues to evolve, so do the risks associated with its misuse. Adversarial AI…

    4 条评论
  • Building Resilience (in Life)

    Building Resilience (in Life)

    The call of "Mayday!" signals distress, but May Day itself celebrates resilience. Like the burgeoning of spring after a…

    1 条评论
  • GPTs: Shaping Tomorrow's Knowledge Economy

    GPTs: Shaping Tomorrow's Knowledge Economy

    Why I Dove into Custom GPTs In an age where brevity often overshadows depth, the art of query-based learning stands as…

  • A Different Kind of Stuffing

    A Different Kind of Stuffing

    Thanksgiving is NEXT WEEK! My favorite holiday and family time of the year… along with my favorite food: stuffing! But…

    5 条评论

社区洞察

其他会员也浏览了