Cyber Posture

CWE · MITRE source

CWE-657Violation of Secure Design Principles

Abstraction: Class · CVEs in our corpus: 19

The product violates well-established principles for secure design.

This can introduce resultant weaknesses or make it easier for developers to introduce related weaknesses during implementation. Because code is centered around design, it can be resource-intensive to fix design problems.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (32)AI

Showing the 15 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
PM-11Mission and Business Process DefinitionPMDirectly requires incorporating security and privacy considerations into the definition of mission/business processes, preventing violations of secure design principles at the organizational level.
PM-13Security and Privacy WorkforcePMThe program explicitly teaches secure design principles, decreasing violations of those principles.
PM-2Information Security Program Leadership RolePMA senior officer with mission responsibility promotes adherence to secure design principles throughout the organization.
SA-1Policy and ProceduresSAAcquisition policy and procedures can explicitly require adherence to secure design and engineering principles during system and service purchases.
SA-15Development Process, Standards, and ToolsSADirectly requires a documented process that explicitly addresses security requirements and uses reviewed standards, preventing violations of secure design principles.
SA-17Developer Security and Privacy Architecture and DesignSAEnforces production of a design consistent with secure architecture principles and enterprise goals, directly addressing violation of secure design principles.
PL-1Policy and ProceduresPLDocumented policy with defined scope, roles, responsibilities, and periodic review directly enforces secure design principles and management commitment.
PL-10Baseline SelectionPLBaseline selection enforces adherence to established secure-design principles rather than ad-hoc or insufficient control choices.
PL-2System Security and Privacy PlansPLRequires risk determinations for architecture/design decisions, tailoring rationale, and alignment with enterprise architecture to avoid violations of secure design principles.
SC-1Policy and ProceduresSCMandates documented policies consistent with secure design principles, standards, and guidelines, directly reducing violations from undefined or ad-hoc protection approaches.
SC-29HeterogeneitySCDirectly implements the secure design principle of diversity, preventing homogeneous monocultures that share identical weaknesses.
SC-47Alternate Communications PathsSCMandating redundant paths corrects the design-level omission of single points of failure for security-critical functions.
CA-1Policy and ProceduresCAMandating the policy be consistent with laws, standards, and guidelines enforces secure design principles in security governance and oversight.
CA-5Plan of Action and MilestonesCADeficiencies violating secure design principles are tracked and corrected through planned actions, limiting attacker opportunities from design flaws.
RA-1Policy and ProceduresRAFormal risk assessment policy and procedures directly enforce consistent application of secure design principles across the organization.
Show 17 more broadly-applicable controls
PM-28Risk FramingPMDocumenting assumptions, constraints, priorities, trade-offs, and risk tolerance directly supports adherence to secure design principles rather than allowing unexamined risk decisions to produce violations.
PM-3Information Security and Privacy ResourcesPMRequiring security resources in capital planning supports adherence to secure design principles throughout the system lifecycle.
PM-4Plan of Action and Milestones ProcessPMMandates a repeatable, risk-aligned process for planning and executing security improvements, directly countering ad-hoc or absent secure management practices.
PM-7Enterprise ArchitecturePMThe control requires explicit consideration of secure design principles during architecture development, directly countering violation of those principles.
PM-9Risk Management StrategyPMRisk management strategy explicitly incorporates secure design principles and requires periodic updates to address design violations.
SA-2Allocation of ResourcesSAExplicitly requires security/privacy to be incorporated into mission/business process planning and capital budgeting, directly countering violations of secure design principles that occur when security is treated as an afterthought.
SA-23SpecializationSASpecialization directly applies secure design principles (economy of mechanism, attack-surface reduction) by limiting critical functions to purpose-built components.
SA-24Design For Cyber ResiliencySAExplicitly requires defining and implementing cyber resiliency design principles as part of systems engineering, directly preventing violations of secure design principles.
SA-3System Development Life CycleSAThe control explicitly requires adoption of an SDLC that incorporates security considerations, directly preventing violation of established secure design principles.
SA-8Security and Privacy Engineering PrinciplesSAControl explicitly requires application of secure design principles throughout the lifecycle.
PL-3System Security Plan UpdatePLRegular SSP updates force review of whether the system's evolving design continues to follow documented secure design principles after changes.
PL-7Concept of OperationsPLDeveloping and maintaining a security-focused CONOPS constitutes explicit adherence to secure design and operational principles, directly countering violations of those principles.
PL-8Security and Privacy ArchitecturesPLDeveloping and maintaining documented security architectures enforces secure design principles and prevents violations at the system level.
RA-7Risk ResponseRAAudits and assessments commonly surface violations of secure design principles; formal risk-response processes ensure such findings are remediated according to risk tolerance, reducing the window for exploitation.
AT-1Policy and ProceduresATEstablishing and updating awareness policy promotes adherence to secure design principles through ongoing training, preventing related violations.
MA-1Policy and ProceduresMADocumenting, disseminating, and periodically reviewing maintenance policies and procedures enforces core secure design principles for system maintenance activities.
SI-1Policy and ProceduresSIRequiring a formal integrity policy enforces secure design principles such as least privilege and separation of duties across the organization.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2026-398882.09.90.00102026-04-08
CVE-2024-261391.78.30.00162024-05-23
CVE-2019-00611.67.80.00042019-10-09
CVE-2023-293201.67.80.00112023-08-10
CVE-2026-307921.68.10.00072026-03-05
CVE-2021-285831.57.50.00532021-06-28
CVE-2023-527141.57.50.00092024-04-07
CVE-2022-282441.36.30.01382022-05-11
CVE-2024-338491.36.50.00082024-05-28
CVE-2024-579571.36.60.00102025-02-06
CVE-2025-248871.36.30.00222025-04-30
CVE-2017-60321.15.30.00152017-06-30
CVE-2019-54781.15.50.00022019-09-03
CVE-2020-81331.15.30.00172020-11-09
CVE-2021-360611.15.40.00972021-09-01
CVE-2022-306831.15.30.00252022-09-16
CVE-2019-156111.04.90.00662020-02-04
CVE-2025-542550.84.00.00062025-09-09
CVE-2021-447140.52.50.00532022-01-14