Secure by Design. Joint Guide. Product Security Bad Practices Version 2

Product Security Bad Practices Version 2

For software manufacturers who produce software used in service of critical infrastructure or national critical functions (NCFs). This revised joint guide includes feedback from public comment period in 2024.

Closing the Software Understanding Gap

Closing the Software Understanding Gap

Read how we can help close the gap and secure our infrastructure with a deep, scalable understanding of software-controlled systems, including AI-systems.  

Awareness and Prevention of Edged Weapon Attacks - Prevention - Screening - Training and Exercise - Response

Awareness and Prevention of Edged Weapon Attacks Fact Sheet

This resource provides suggested protective, training, and response measures that critical infrastructure owners and operators, as well as venue and event managers, can implement to help protect patrons, visitors, and their staffs.

Microsoft Expanded Cloud Logs Implementation Playbook

Microsoft Expanded Cloud Logs Implementation Playbook

This playbook provides a detailed overview of the newly introduced logging capabilities in Microsoft Purview Audit (Standard). These capabilities enable organizations to conduct forensic and compliance investigations by accessing critical events.

JCDC AI playbook banner image

AI Cybersecurity Collaboration Playbook

Thanks to all our partners who helped shape the JCDC AI Cybersecurity Collaboration Playbook! Learn how gov, industry & global partners can share info on AI threats to secure #CriticalInfrastructure.

CISA in Focus banner image

CISA in Focus Blog Series

These blogs demonstrate how far CISA has come and highlight the important work that we do. We’re just getting started. New blogs will be added daily for the next two weeks. Check back often to see updates!

JCDC unifies cyber defenders from organizations worldwide. This diverse team proactively gathers, analyzes, and shares actionable cyber risk information to enable synchronized, holistic cybersecurity planning, cyber defense, and response.

StopRansomware.gov is the U.S. Government's official one-stop location for resources to tackle ransomware more effectively.

SAFECOM works to improve emergency communications interoperability across local, regional, tribal, state, territorial, international borders, and with federal government entities.

Additional CISA Resources

Abstract image of a PCB overlayed with cyber design elements

CISA’s Federal Cyber Defense Skilling Academy

CISA’s Federal Cyber Defense Skilling Academy provides full-time federal employees an opportunity to focus on professional growth through an intense, full-time, three-month accelerated training program.

Image of an event with speaker and participants

CISA Events

CISA hosts and participates in events throughout the year to engage stakeholders, seek research partners, and communicate with the public to help protect the homeland.

CISA Services Catalog

A single resource that provides you with access to information on services across CISA’s mission areas.

Employees pictured during training session

CISA Training

As part of our continuing mission to reduce cybersecurity and physical security risk, CISA provides a robust offering of cybersecurity and critical infrastructure training opportunities.