- Multi-factor authentication (MFA). Within one year of signing the pledge, demonstrate actions taken to measurably increase the use of multi-factor authentication across the manufacturer's products.
- Default passwords. Within one year of signing the pledge, demonstrate measurable progress towards reducing default passwords across the manufacturers' products.
- Reducing entire classes of vulnerability. Within one year of signing the pledge, demonstrate actions taken towards enabling a significant measurable reduction in the prevalence of one or more vulnerability classes across the manufacturer's products.
- Security patches. Within one year of signing the pledge, demonstrate actions taken to measurably increase the installation of security patches by customers.
- Vulnerability disclosure policy. Within one year of signing the pledge, publish a vulnerability disclosure policy (VDP) that authorizes testing by members of the public on products offered by the manufacturer.
- CVEs. Within one year of signing the pledge, demonstrate transparency in vulnerability reporting by including accurate Common Weakness Enumeration (CWE) and Common Platform Enumeration (CPE) fields in every Common Vulnerabilities and Exposures (CVE) record for the manufacturer's products. Additionally, issue CVEs in a timely manner for, at minimum, all critical or high-impact vulnerabilities (whether discovered internally or by a third party) that require a customer's actions to patch or have evidence of active exploitation.
- Evidence of intrusions. Within one year of signing the pledge, demonstrate a measurable increase in the ability for customers to gather evidence of cybersecurity intrusions affecting the manufacturer's products.
As part of its pledge, Sophos is committed to releasing passkey support in Sophos Central and publishing adoption statistics of its new, stronger multi-factor authentication. Also, customers will be able to choose their own federated multi-factor authentication. Sophos will also better ensure safe deployments through vigorous password creation enforcement during device setup.The primary goal of CISA's Secure by Design initiative is to improve software security by enhancing software's inherent security — and secure manageability — as it's shipped from the manufacturer. By getting software makers to develop more secure code, implement reasonable security practices, and provide the public with transparent insights about their security practices, security of software can only increase. That should, sometime in the future, result in more secure and resilient enterprises.No one knows for sure how long that will take.