Press ReleaseCyber SafetyThreat Detection & Defense

Fortinet Strengthens Secure Product Development Practices

Jim Richberg, Head of Cyber Policy and Global Field CISO at Fortinet
“At Fortinet, we have a longstanding commitment to being a role model in ethical and responsible product development and vulnerability disclosure. As part of this dedication, Fortinet has proactively aligned to international and industry best practices and upholds the highest security standards in every aspect of our business. We applaud CISA’s continued call to the industry to follow suit and appreciate CISA’s willingness to collaborate with Fortinet on the development of these important goals. We strongly encourage others in the technology community to join this effort to keep organisations secure.”

News Summary:
Fortinet® (NASDAQ: FTNT), the global cybersecurity leader driving the convergence of networking and security, today announced it is building on the company’s longstanding commitment to responsible radical transparency as an early signer of the Secure by Design pledge developed by the Cybersecurity and Infrastructure Security Agency (CISA). This voluntary industry pledge complements and builds on existing Fortinet software security best practices, including those developed by CISA, NIST, other federal agencies, and international and industry partners. The pledge outlines seven goals, including responsible vulnerability disclosure policies, which are already an integral part of Fortinet’s product security development.

Advancing Fortinet’s Commitment to Secure by Design Principles and Responsible Disclosure Processes
CISA’s latest initiative strongly aligns with Fortinet’s existing product development processes already based on secure-by-design and secure-by-default principles. Fortinet is committed to adhering to robust product security scrutiny at all stages of the product development lifecycle, helping to ensure that security is designed into each product from inception all the way through to the end of life, in the following ways.

  • Secure Product Development Lifecycle (SPDLC): Fortinet aligns its processes in accordance with leading standards, including NIST 800-53, NIST 800-161, NIST 800-218, US EO 14028, and UK Telecom Security Act.

  • Robust Security Product Testing: Fortinet leverages tools and techniques such as static application security testing (SAST) and software composition analysis built into its build processes, dynamic application security testing (DAST), vulnerability scanning, and fuzzing prior to each release, as well as penetration testing and manual code audits.

  • Trusted Supplier Program: To ensure rigorous selection and qualification of its major manufacturing partners, Fortinet adheres to NIST 800-161: Cybersecurity Supply Chain Risk Management Practices for Systems and Organisations. Fortinet’s commitment to data privacy and security is embedded in every part of the company’s business and in every phase of the product development, manufacturing, and delivery processes.

  • Information Security Program: The Fortinet Information Security Program is based on and aligned with industry-leading security standards and frameworks including ISO 27001/2, ISO 27017 and 27018 and NIST 800-53, as well as data privacy regulations such as GDPR and CCPA.

  • Third-party Certifications: Fortinet products are regularly certified to standard and validated through third-party product quality standards, including NIST FIPS 140-2 and NIAP Common Criteria NDcPP / EAL4+.

Additionally, the Fortinet Product Security Incident Response Team (PSIRT) is responsible for maintaining security standards for Fortinet products and operates one of the industry’s most robust PSIRT programs, including proactively and transparently disclosing vulnerabilities. Nearly 80% of Fortinet vulnerabilities discovered in 2023 were identified internally through the company’s rigorous auditing process. This proactive approach enables fixes to be developed and implemented before malicious exploitation can occur. Fortinet works with its customers, independent security researchers, consultants, industry organisations, and other vendors to accomplish the company’s PSIRT mission.

To further advance its dedication to a culture of responsible radical transparency, Fortinet has a longstanding commitment to public and private partnerships that align with its mission, including:

Responsible Radical Transparency Panel at RSAC 2024
Fortinet will expand on how responsible radical transparency can help strengthen cybersecurity resiliency against cyber adversaries as part of a panel session at RSA Conference 2024 titled: No More Secrets in Cybersecurity: Implementing ‘Radical Transparency. The session will take place Thursday, May 9, from 10:50 to 11:40 a.m. PT. in Moscone South – 156.

The panel discussion will feature esteemed industry experts, including:

  • Dr. Carl Windsor, Senior Vice President of Product Technology and Solutions, Fortinet

  • Michael Daniel, President and Chief Executive Officer, Cyber Threat Alliance

  • Eric Goldstein, Executive Assistant Director for Cybersecurity, CISA

  • Suzanne Spaulding, Former Undersecretary, U.S. Department of Homeland Security

Anyone interested in expanding their understanding and familiarity with these critical topics can register here.

Supporting Quotes
“Over and over, across multiple sectors, we have learned that transparency improves outcomes for consumers and society. The cybersecurity industry is no different. In our sector, transparency includes searching for, mitigating, and disclosing vulnerabilities in an open, responsible manner. Fortinet has already taken steps to embrace such responsible transparency, creating a clear set of principles for handling vulnerability communication and analysis. The company’s leadership in this area is a strong example of how cybersecurity vendors should be communicating with customers and the broader public.”
– Michael Daniels, President and CEO of the Cyber Threat Alliance (CTA)

“The dedication to a secure-by-design approach to product development is foundational to strong security. We see vendors like Fortinet leading the way in following and applying these principles globally, principles which are also outlined in Australia’s Essential Eight framework, as a significant step forward in enhancing our collective security.”
– Peter Jennings, Director, Strategic Analysis Australia and member of Fortinet’s Strategic Advisory Council

“Risk identification and assessment are two of the most crucial components of risk management, whether you’re on the battlefield or protecting an IT environment. Fortinet’s approach to transparency, vulnerability disclosure, and threat intelligence sharing is one that the broader cybersecurity industry should emulate.”
-General Sir Richard Sheriff, retired NATO General

“In today’s dynamic environment, enhanced transparency is vital to making every organisation more secure. It’s encouraging to see Fortinet at the forefront of embracing radical transparency as the company leans forward in sharing information about vulnerabilities and threat information.”
– Suzanne Spaulding, former Undersecretary at the U.S. Department of Homeland Security

“Collaboration between governments and private sector companies is and will continue to be integral to staying ahead of cyber threats. As a member of the Fortinet Board of Directors, I’ve seen firsthand and applaud how this cyber leader works with public and private organisations to transparently share threat intelligence and support national security efforts.”
-Admiral James Stavridis, Former 4-star Admiral and Supreme Allied Commander of NATO

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *