CHERI can be added to many different [[instruction set architecture]][[instruction set architecture|s]] including [[MIPS architecture|MIPS]], [[AArch64]], and [[RISC-V]], making it usable across a wide range of platforms.
Software must be recompiled to take advantage ofuse CHERI, but most software requires few (if any) changes to the source code.<ref name="ecosystemviability">Assessing the Viability of an Open- Source CHERI Desktop Software Ecosystem, Robert N. M. Watson, Ben Laurie, and Alex Richardson Capabilities Limited, 17 September 2021, Capabilities Ltd, https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/20210917-capltd-cheri-desktop-report-version1-FINAL.pdf</ref> CHERI’s importance has been recognised by governments as a way to improve cybersecurity and protect critical systems.<ref name="ONCDReport">{{cite web |date=February 2024 |title=Final ONCD Technical Report |url=https://web.archive.org/web/20250118014817/https://www.whitehouse.gov/wp-content/uploads/2024/02/Final-ONCD-Technical-Report.pdf |access-date=21 January 2025 |website=White House (Archived) |publisher=Office of the National Cyber Director}}</ref> andIt is under active development by various business and academic organizations.<ref>{{cite web |date=13 November 2024 |title=CHERI Alliance launched |url=https://www.electronicsweekly.com/news/business/cheri-alliance-launched-2024-11/ |access-date=20 January 2025 |publisher=Electronics Weekly}}</ref>