RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
AppSec & Supply Chain SecurityNovember 13, 2024

CISA's secure software deployment push: Key takeaways for AppSec teams

To avoid the next CrowdStrike fiasco, CISA and other agencies recommend embracing safe deployment practices earlier in the SDLC. Here's what you need to know.

John P. Mello Jr.
John P. Mello Jr., Freelance technology writer.John P. Mello Jr.
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
man pushing boulder up slope

In July, a botched software update by CrowdStrike led to millions of Windows systems crashing worldwide, resulting in $10 billion in financial damage, by some estimates. Recent guidance released by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Australian Signals Directorate aims at preventing another such incident.

The agencies explain in their document, titled "Safe Software Deployment: How Software Manufacturers Can Ensure Reliability for Customers," that many software manufacturers and service providers deploy software and configuration updates as part of their service offerings. Although these updates may enhance features or address security vulnerabilities to provide benefits and security to customers, software and the systems that deploy software are highly complex and continually evolving, making it difficult to deploy updates that are secure.

Here's what your AppSec team needs to know about CISA and other agencies' big secure software push.

Get White Paper: Assess & Manage Commercial Software RiskPlus: See the Webinar

Experts see a solid framework for safe software deployment

All software manufacturers need to implement safe software deployment programs supported by verified processes, including robust testing and measurements, the agencies advised in their document. The program should support and enhance both the security and quality of the product and deployment environment.

Software manufacturers should incorporate safe deployment practices early in the software development lifecycle (SDLC), the authors added. Safe deployment processes do not begin with the first push of code; they start much earlier.

To maintain product quality and reliability, technology leaders should ensure that all code and configuration changes pass through a series of well-defined phases that are supported by a robust testing strategy. These phases are designed to catch any new issues and regressions, reducing the risk that flawed software will impact customers.

Iftach Ian Amit, founder and CEO of Gomboc.ai, said CISA's recommendations provide a solid framework to create safe and secure software deployments, and accurately capture the basic elements that most of the industry is already working with — testing and vulnerability scanning — as well as the broader context of the program, "which speaks of the deployment environment, the processes around it, resilience and ongoing updates.”

James Scobey, CISO of Keeper Security, said CISA’s recommendations are "on point and highly relevant" to today’s development environment, while noting that they are brief and easy to implement.

They highlight practical ways that organizations can control risk in a process that’s often overlooked. By emphasizing phases like automated testing and canary releases, CISA has shown that safe deployment isn’t just a best practice; it’s essential for any company serious about security.

James Scobey

The new software deployment guidelines can help transform deployment from a risky phase to one that actively strengthens security, "which is a huge win for both developers and customers,” Scobey said

Meeting the need for structured and repeatable practices

The multi-agency document sets out the key phases of a safe software deployment process — planning, development and testing, internal rollout (dogfood), deployment and canary testing, controlled rollout, and planning again, after receiving feedback. There’s also a lengthy discussion of playbooks, which help ensure that safe software deployment processes are well documented, repeatable, and resilient, the advisory explains. The playbooks provide clear guidelines, best practices, and contingency plans to help teams navigate each phase of deployment.

Playbooks also help software manufacturers reduce risks and respond effectively to any issues that arise, ultimately safeguarding both the software and the customers who rely on it, the documentation added.

John Terrill, CSO of the IoT security company Phosphorus Cybersecurity, said the new recommendations fit into another CISA initiative, Secure by Design, which the agency proposed in April.

Secure by Design is not just an application security idea. You want secure components, you want best practices around scanning code and testing and production and all that, but you also want to make sure that it's all deployed in a reasonable way.

John Terrill

Keeper Security’s Scobey said that a safe software deployment program is crucial to Secure by Design, which advocates baking in security at the conception of software, with security functions and parameters designed, architected, and coded into the software at every stage of its lifecycle.

[It brings] security into every stage of the SDLC, not just after the code is written.

James Scobey

CISA’s guidance reinforces the importance of structured and repeatable deployment practices, which give organizations a powerful framework to catch issues before they become real threats, Scobey said. “By embedding thorough testing, phased rollouts, and feedback loops, teams can effectively reduce risks to customers and maintain software reliability. This way, deployment becomes as much a part of the security strategy as the code itself, which is exactly what Secure by Design aims for," he said.

However, integrating a secure deployment program into the SDLC can be challenging, Scobey said. “Time to deployment is a critical metric for any firm producing software — not only to realize customer value, but to drive cybersecurity improvements through patching and bug fixes,” he said.

Organizations need buy-in across teams and a willingness to invest in automation, tooling, and training — often while managing tight deadlines. Coordinating controlled rollouts and real-world testing takes time and collaboration, which can be hard to maintain in fast-paced environments.

James Scobey

The payoff is significant, he said. "By building security directly into the deployment process, teams can prevent costly fixes down the line and ensure that updates enhance, rather than compromise, software reliability. It’s a shift in approach that’s well worth the effort.”

However, Phosphorus' Terrill said achieving these goals is going to be difficult. “I think there are just a lot of best practices that are easy to talk about but hard to pull off because they really require a focus and a lot of investment in things that are unsexy," he said. "Developers like building stuff. They don't like fixing stuff. It's just not a thing that gets them excited most of the time."

Lessons from the CrowdStrike incident

To many in the industry, much of the advice offered by CISA isn’t new. "All of this is super common,” Terrill said. “This is telling people rolling out software that these are things of concern that they should be doing.”

I think this is a little bit of CYA, where they're just trying to make sure they've got the information out there so somebody can't say that they didn't state it.

John Terrill

That might especially be the case after the CrowdStrike incident, said Frank Balonis, CISO and senior vice president for operations for Kiteworks. “I believe CrowdStrike is a great example of not following this process. If they had the kind of process in place that's discussed by the CISA guidelines, their problem would never have happened," he said.

Balonis said that before releasing code to any customer, it's best to release it internally to ensure that it's stable and to discover any bugs or other issues. Kiteworks, which has done this for years, then has a group of early adopter customers use the software, and it uses the feedback from those users to further improve the product. The final step: Roll it out, first to a limited number of customers.

Not only does that allow the customer to understand how the product is being updated and released, but it also allows us to understand that the release that we have is viable, reliable, and secure before we release it for the entire customer base. Before we did this, we would do a release and just release it to everybody. Then there'd be issues and we would end up releasing a minor version just a week or two later to fix them. We would do that again and again, really disrupting our customers and how they're using the product.

Frank Balonis

Balonis said that when companies that implement these new guidelines from CISA release their software to customers, "there's very little doubt that you've successfully developed a new version with the additional functionality and security that will meet a majority of everyone's needs."

The other benefit is that such a process can let your team prepare for the next release, as opposed to wondering what you have to fix or improve on the version you just released. "You can focus on the next release and be more efficient in your ability to release good software that's secure and reliable," he said.

Securing releases demands new focus, tools and process

Safety and security incidents often result from multiple contributing factors, including people, processes, and technology elements working together in a system that may become misaligned — sometimes in unexpected and unlikely ways, the multi-agency guidance noted.

A safe software deployment process should be integrated with the organization’s SDLC, quality program, risk tolerance, and understanding of the customer’s environment and operations. By adopting a systems-thinking approach, the agencies reason, teams may reduce the likelihood of their deployment process operating outside the boundaries of safety.

Jasmine Noel, senior product marketing manager for ReversingLabs, said that CISA’s guidance highlights that risk assessment should be part of "security in every stage."

With billions in customer revenue at stake, the metrics, processes and tooling that built up around a 'move fast and break things' culture must change to support a 'rapidly deliver safe software' approach, and that requires strong leadership and a solid framework.

Jasmine Noel

Noel said it's important for teams to reckon fully with the two sides of safe software deployment: software producers and enterprise buyers. She said that assessing third-party software risk before deployment leads to meaningful collaboration and remediation planning with software producers, which significantly reduces risks.

A virtuous cycle of transparency benefits everyone.

Jasmine Noel

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:AppSec & Supply Chain Security

More Blog Posts

Vibeware bad vibes

Vibeware: More than bad vibes for AppSec

Threat actors are leveraging the freewheeling vibe-coding trend to deliver malicious software at scale.

Learn More about Vibeware: More than bad vibes for AppSec
Vibeware: More than bad vibes for AppSec
CRA accelerates advantage

The CRA is coming: Are you ready?

Here's how the EU's Cyber Resilience Act will reshape the software industry — and how that accelerates advantages.

Learn More about The CRA is coming: Are you ready?
The CRA is coming: Are you ready?
AI agents risk

Claude Mythos: Get your AppSec game on

Anthropic's new AI is a 'step change' for exposing software flaws — but also ramps up exploits. Are you ready?

Learn More about Claude Mythos: Get your AppSec game on
Claude Mythos: Get your AppSec game on
28

28 application security stats that matter

AI and open source are redefining the software threat landscape. Here are the key statistics you need to know.

Learn More about 28 application security stats that matter
28 application security stats that matter

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top