Software manufacturers are encouraged to ditch C/C++ and take other actions that could “reduce customer risk,” according to the Product Security Best Practices report published Oct. 16. In particular, the Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation set a deadline of Jan. 1, 2026, for compliance with memory safety guidelines.
The report covers guidelines and recommendations rather than mandatory rules, particularly for software manufacturers who work on critical infrastructure or national critical functions. The agencies specifically highlighted on-premises software, cloud services, and software-as-a-service.
While it isn’t directly stated that using ‘unsafe’ languages could disqualify manufacturers from government work, and the report is “non-binding,” the message is straightforward: Such practices are inappropriate for any work classified as relevant to national security.
“By following the recommendations in this guidance, manufacturers will signal to customers that they are taking ownership of customer security outcomes, a key Secure by Design principle,” the report states.
The report describes memory-unsafe languages as “dangerous and significantly elevates risk to national security.” Development in memory-unsafe languages is the first practice the report mentions.
Memory safety has been a topic of discussion since at least 2019. Languages like C and C++ “provide a lot of freedom and flexibility in memory management while relying heavily on the programmer to perform the needed checks on memory references.” a 2023 NSA report on memory safety stated. However, the report continued, those languages lack inherent memory protections that would prevent memory management issues. Threat actors can exploit memory issues that might arise in those languages.
By Jan. 1, 2026, manufacturers should have:
Memory-safe languages approved by the NSA include:
SEE: Benefits, risks, and best practices of password managers (TechRepublic)
Other practices labeled “exceptionally risky” by CISA and the FBI include:
The full report includes recommended next steps organizations can use to comply with the agencies’ guidelines.