Security and Data Privacy

CISA Launches Secure by Design Pledge with 6 Ed Tech Vendors

The Cybersecurity and Infrastructure Security Agency has launched a voluntary pledge for K–12 education technology software makers to “commit to designing products with greater security built in,” the agency said in a news release. 

The new program was unveiled with commitments already in place from six of the industry’s most-recognized names, including PowerSchoolClasslinkCleverGG4LInstructure, and D2L.

The pledge includes specific, “publicly measurable outcomes that the companies are committing to as they develop their roadmaps toward adhering to Secure by Design principles,” CISA said.

The Secure by Design principles are spelled out in a guide published earlier this year on CISA’s website; they include the following three principles:

  1. Take ownership of customer security outcomes

  2. Embrace radical transparency and accountability

  3. Lead from the top by making secure technology a key priority for company leadership

“We need to address K–12 cybersecurity issues at its foundation by ensuring schools and administrators have access to technology and software that is safe and secure right out of the box,” said CISA Director Jen Easterly. “I want to thank Classlink, Clever, D2L, GG4L, Instructure, and PowerSchool who have already signed this pledge and for their leadership in this area. We need all K–12 software manufacturers to help us improve cybersecurity for the education sector by committing to prioritize security as a critical element of product development.”

Learn more about the pledge, view signatories, or contact CISA to add an ed tech vendor to the pledge at CISA.gov/K–12-education-technology-secure-design-pledge.

The Text of CISA’s Secure By Design Principles 

Principle 1: Take Ownership of Customer Security Outcomes

  1. Single Sign On (SSO) at no extra charge. As SSO can enable greater security by reducing password-based attacks, manufacturers should allow all customers to configure standards-based SSO.

    1. Goal: no later than 6 months after the summit, customers may configure standards-based SSO at no additional charge.

  2. Security audit logs at no extra charge. Security audit logs necessary for monitoring and responding to cybersecurity incidents should be provided at no additional charge to schools.

    1. Goal: no later than 6 months after the summit, security audit logs are provided to customers at no additional charge.

Principle 2: Embrace Radical Transparency and Accountability

  1. Publish a Secure by Design roadmap. Document how you are making changes to your SDLC to improve customer security, including actions taken to eliminate entire classes of vulnerabilities (e.g. by usage of memory-safe languages, parametrized queries, and web template frameworks). Include detail on how you are updating your hiring, training, code review, and other internal development processes to do so. The roadmap should also outline how the manufacturer plans to nudge all users, including students, towards MFA, with the understanding that students may not possess a mobile device traditionally used for MFA (other authentication options, such as passkeys, should be considered).

    1. Goal: no later than 6 months after the summit, the Secure by Design roadmap is published on the manufacturer’s website.

  2. Publish a vulnerability disclosure policy. Publish a vulnerability disclosure policy that (1) authorizes testing against all products offered by the manufacturer, (2) provides legal safe harbor that authorizes testing under the policy, and (3) allows public disclosure of vulnerabilities after a set timeline. Manufacturers should perform root-cause analysis of discovered vulnerabilities and, to the greatest extent feasible, take actions to eliminate root cause vulnerability classes in line with the Secure by Design roadmap.

    1. Goal: no later than 3 months after the summit, the manufacturer has published a vulnerability disclosure policy on its website that adheres to the above criteria.

  3. Embrace vulnerability transparency. Ensure that product CVE entries are correct and complete, including a CWE field that identifies the root cause of the vulnerability.

    1. Goal: no later than 3 months after the summit, all new CVEs published by the manufacturer include complete details on the vulnerability and have a properly-assigned CWE tag for the vulnerability’s root cause.

  4. Publish security-relevant statistics and trends. This may include aggregated statistics of MFA adoption of customers and administrators, and use of unsafe legacy protocols.

    1. Goal: no later than 6 months after the summit, security statistics and trends are published on the manufacturer’s website.

Principle 3: Lead from the Top

  1. Publicly name a top business leader (not the CTO or CISO) who is responsible for security. This individual should be responsible for managing the process of integrating security and quality as a core function of the business, including the development and implementation of the Secure by Design roadmap.

    1. Goal: no later than 3 months after the summit, the manufacturer has publicly named a top business leader responsible for security.

For more information, email [email protected].


About the Author

Kristal Kuykendall is editor, 1105 Media Education Group. She can be reached at [email protected].


Whitepapers