In February 2024, the White House Office of the National Cyber Director (ONCD) released a report that should be on every CTO’s radar: “Back to the Building Blocks: A Path Toward Secure and Measurable Software.”
The core message: Technology manufacturers should adopt memory-safe programming languages to eliminate entire classes of vulnerabilities.
Here’s what you need to know.
The Policy Context
This isn’t an isolated recommendation. It’s part of the National Cybersecurity Strategy published in March 2023, which fundamentally shifts responsibility for cybersecurity from individual users to technology creators.
The key shift: Instead of expecting users and small businesses to defend themselves, the government is putting the burden on developers and technology companies to build security into products from the start.
The January 2026 Deadline
CISA’s guidance sets a significant milestone:
“For existing products written in memory-unsafe languages, not having a published memory safety roadmap by January 1, 2026 is considered dangerous and significantly elevates risk to national security, national economic security, and national public health and safety.”
Let that sink in. Not having a roadmap is now explicitly labeled as dangerous.
What a Memory Safety Roadmap Should Include
According to CISA, your roadmap should detail:
- Prioritized approach to eliminating memory safety vulnerabilities
- Focus on priority components - especially network-facing code and cryptographic operations
- How you’ll modify your SDLC to reduce and eventually eliminate memory-unsafe code
- Timeline and milestones for the transition
The Federal Procurement Lever
Here’s where it gets real for vendors selling to government:
Federal acquisition regulations (FAR), OMB circulars, and agency-specific directives will increasingly require memory safety evidence. The government is using its purchasing power as a market signal.
If you sell to federal agencies - or hope to - this is becoming table stakes.
The Approved Languages
The NSA’s list of memory-safe languages includes:
- Rust
- C#
- Go
- Java
- Ruby
- Swift
- Python
- JavaScript
Notice: Most organizations already use memory-safe languages for significant portions of their codebase. The issue is the C/C++ code that handles critical, security-sensitive operations.
What This Means for Strategy
For new development: Default to memory-safe languages unless there’s a compelling reason otherwise.
For existing code: Identify your highest-risk C/C++ components (network-facing, cryptographic, privilege boundaries) and plan for migration or isolation.
For procurement: Expect questions about your memory safety roadmap in enterprise sales cycles, especially federal.
For hiring: Build capability in at least one systems-level memory-safe language (likely Rust or Go).
The Question I’m Thinking About
How are other technology leaders approaching this? Is your organization treating this as a compliance checkbox or a genuine security improvement opportunity?
The deadline is less than a year away. What’s your roadmap look like?