cisa.gov

Home Page | CISA

  • ️Tue Mar 18 2025

Active Assailant Emergency Action Plan

Active Assailant Emergency Action Plan Template and Instructional Guide

Provide organizations and venue operators with tangible guidance to assist users with developing a comprehensive and implementable emergency action plan (EAP).

Guidance: Mitigation Strategies for Edge Devices: Executive Order

Mitigation Strategies for Edge Devices: Executive Guidance

Foreign adversaries routinely exploit software vulnerabilities in network edge devices. With U.S. and international partners, we released strategies and guides to help organizations protect their network edge devices and appliances.

Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

Read recommended actions and mitigations to detect and protect against exploitation of Ivanti vulnerabilities, CVE-2024-8963, CVE-2024-9379, CVE-2024-8190 and CVE-2024-9380.  

Unlocking Vulnrichment: Enriching CVE Data

Unlocking Vulnrichment: Enriching CVE Data

In today’s fast-paced cybersecurity landscape, staying ahead of vulnerabilities is a daily race against time. Every day, dozens to hundreds of new Common Vulnerabilities and Exposures are published, many of which affect critical systems.

Secure by Design. Joint Guide. Product Security Bad Practices Version 2

Product Security Bad Practices Version 2

For software manufacturers who produce software used in service of critical infrastructure or national critical functions (NCFs). This revised joint guide includes feedback from public comment period in 2024.

Closing the Software Understanding Gap

Closing the Software Understanding Gap

Read how we can help close the gap and secure our infrastructure with a deep, scalable understanding of software-controlled systems, including AI-systems.