Executive Logo EXECUTIVE|DISORDER

Executive Order 14028

Improving the Nation's Cybersecurity

Ordered by Joseph R. Biden Jr. on May 12, 2021

Summary

Requires federal agencies to modernize cybersecurity practices, adopt zero-trust architecture, cloud security, multifactor authentication, and encryption. Mandates standardized cybersecurity contract requirements, stronger software supply-chain security, a cyber incident review board, and improved incident response coordination. Enhances threat information sharing and reporting obligations.

Overview

Executive Order 14028, issued by President Joseph R. Biden Jr. on May 12, 2021, is a far-reaching mandate aimed at enhancing the cybersecurity infrastructure of the United States in response to ever-evolving cyber threats. The order seeks to establish a more resilient and responsive cybersecurity framework by fostering a collaborative relationship between federal systems and private infrastructure. By mandating transparency and accountability within software development processes, and enhancing federal network defenses, the EO aims to fortify the nation’s defenses against cyber vulnerabilities and threats.

Swift modernization of the federal network security architecture is a key component of the order, mandating the transition to a Zero Trust Architecture and fast-tracking the adoption of secure cloud services. These measures are intended to create an environment where trust is continuously verified, thus bolstering the resilience of federal networks against cyber intrusions. The order places significant importance on leveraging existing technological capabilities, along with a concerted investment in human resources, ensuring that agency heads align with National Institute of Standards and Technology (NIST) guidelines to effectively prioritize their resources in this domain.

The EO also places a spotlight on strengthening the software supply chain by implementing exacting standards for software security. Through the development of a Software Bill of Materials (SBOM), the order seeks greater transparency in the components used in software products, which will facilitate more effective vulnerability assessments and remediation efforts. Manufacturers and suppliers are urged to adopt robust practices to secure both proprietary and open-source software components, aiming to thwart any potential supply chain attacks. The document's multi-layered approach to creating a cybersecurity fortress involves blending policy reforms, technological upgrades, and inter-agency collaboration.

Another critical element of the EO is the establishment of a Cyber Safety Review Board, designed to analyze significant cyber incidents and draw lessons that can be used to improve the nation’s cyber defense posture. By creating uniform procedures for vulnerability response across federal agencies, the EO aims to establish a standard "playbook" to enhance the federal government’s ability to detect, respond, and remediate cyber incidents efficiently. This strategic alignment of security measures ensures protection of current infrastructure and sets the stage for future cybersecurity protocols.

Essentially, Executive Order 14028 represents a comprehensive strategy to address cybersecurity on multiple fronts, encapsulating the administration's determined approach to national and economic security amid a heightened focus on technological resilience and innovation. The directive is set against a backdrop of recent high-profile cyber incidents, marking a substantial shift in acknowledging and operationalizing a robust cybersecurity strategy as a core national tenet.

Legal and Policy Implications

Legally, Executive Order 14028 is transformative, introducing substantial changes to the regulatory framework that governs cybersecurity practices within the federal government. Specifically, the order tasks the Federal Acquisition Regulation (FAR) Council with establishing new contract language for IT and OT service providers, which existing contracts emphasize as part of shared responsibilities in cyber incident reporting. These stipulations for prompt incident reporting and data sharing introduce new compliance requirements, posing a potential change in the allocation of roles and responsibilities between federal agencies and contractors.

The order ushers in a significant policy shift by proposing a departure from traditional security perimeters to embrace a Zero Trust Architecture. This concept challenges the long-standing conventions of network security by abolishing assumed trust for internal and external systems, instead requiring continuous validation of user rights and data access. Enforcing multifactor authentication and encryption on a specified timeline signifies a regulatory leap forward, weaving best procedural cybersecurity practices into the policy fabric.

Moreover, by introducing guidelines for the Software Bill of Materials (SBOM), the order effectively establishes a de facto regulatory framework for software supply chain transparency. Federally mandated guidelines will impact private sector software development protocols, driving them towards improved transparency, accountability, and tracking of software component usage and management. This regulatory influence has the potential to cascade down to state-level policies and industry practices in the private sector.

These legal and policy transitions underscore the expanding role of the federal government in regulating cybersecurity. While the EO seeks to streamline processes and advocate for shared responsibilities, it also invites constitutional considerations, particularly concerning privacy and the government's jurisdiction over state and private sectors. The order foreshadows possible statutory changes, including revisions to information-sharing policies that align with evolving national security priorities.

At its core, Executive Order 14028 represents a pivotal regulatory adaptation to the urgent realities of cybersecurity threats, deploying federal government authority to impose standards that extend into the broader technology ecosystem. Legal professionals and policymakers will likely face complex ramifications from these changes, notably when considering the equilibrium between security and privacy, as well as the extent of federal oversight into commercial activities.

Who Benefits

The primary beneficiaries of Executive Order 14028 are the federal agencies and departments responsible for securing national assets. The EO provides a robust framework for sharing threat intelligence and implements a structured playbook for incident response, thereby enhancing these entities' capacity to manage and mitigate cyber threats effectively. The order strengthens federal departments' ability to establish a fortified defense posture, significantly reducing the risk of successful cyberattacks targeting critical infrastructure.

Technology vendors and contractors, particularly those offering cybersecurity solutions, also stand to gain from the order’s mandates. As federal priorities shift toward Zero Trust Architecture and the adoption of secure cloud services, vendors that deliver these innovative solutions will experience increased demand for their products. Through the establishment of modern cybersecurity requirements and contract obligations, the EO effectively broadens the market for advanced cybersecurity technologies and services.

In a broader context, private sector organizations involved in software development and supply benefit indirectly from the EO’s directives. The required implementation of a Software Bill of Materials (SBOM) propels the industry towards heightened transparency and accountability, fostering improved risk management practices. Companies that proactively align with these standards are likely to gain competitive advantages, as they satisfy federal procurement criteria and strengthen consumer trust and credibility.

End users of technology products and services, that is, consumers, are indirect beneficiaries of the EO. By instituting high standards for software security, the order ensures resiliency against cyber threats across products in multiple sectors, safeguarding personal data and enhancing privacy protections. This empowerment boosts consumer confidence in technology products, fostering an environment where security holds paramount importance.

Additionally, research institutions and think tanks focusing on cybersecurity emerge as beneficiaries, as the EO stimulates public-private partnerships and dialogues. The solicitation of input from diverse sectors by entities such as NIST, in accordance with the EO, generates opportunities for academia and industry experts to contribute to advancing national cybersecurity resilience, potentially guiding technological innovation and policy decisions.

Who Suffers

Executive Order 14028 could impose significant compliance burdens on IT and OT service providers. Companies engaging in federal contracts must adhere to new reporting requirements and information-sharing practices, potentially escalating their operational costs. Small and medium-sized enterprises (SMEs) vying for federal contracts might face challenges due to the resource-intensive nature of complying with the stringent cybersecurity standards outlined by the order.

Organizations reliant on legacy systems could encounter difficulties as they transition to updated architectures and security models mandated by the EO. The shift towards a Zero Trust Architecture and advanced cloud security protocols requires extensive investment not only in technology but also in personnel training. Entities that have maintained traditional cybersecurity models may struggle to adapt quickly to these dynamic changes.

Companies engaged in the production or distribution of software without a comprehensive Software Bill of Materials (SBOM) might see their market opportunities diminish. The order’s focus on software transparency could sideline vendors who fail to certify supply chain integrity, narrowing their competitive edge across federal and private sectors. The transition process towards software supply chain transparency may be resource-intensive and disruptive for those lagging behind.

Federal agencies, too, could face transitional burdens as they work to integrate the EO’s directives. Implementing uniform standards for logging, reporting, and incident management necessitates coordinated action and inter-agency collaboration, potentially straining resources, posing logistical challenges, and hindering other operational priorities.

Furthermore, entities skeptical of expanded governmental oversight might experience drawbacks. The EO’s implied increase in federal authority—particularly regarding data access and inter-agency cooperation—could prompt resistance from civil liberties organizations and privacy advocates concerned about potential overreach or unintended consequences arising from expansive cybersecurity mandates.

Historical Context

Executive Order 14028 is positioned within a longstanding trajectory of federal initiatives aimed at enhancing national cybersecurity frameworks. Since the early 2000s, cybersecurity has consistently occupied a prominent spot on the priority list of successive administrations, necessitating policy adjustments and strategic directives to address evolving threats. Importantly, this order builds on foundations laid by earlier initiatives, like the Cyberspace Policy Review under President Obama and subsequent executive orders enhancing protections for critical infrastructure.

The Biden Administration's strong emphasis on cybersecurity reflects a rare bipartisan consensus regarding the gravity of cyber threats to national security interests. The EO was introduced in the aftermath of major cyber incidents, such as the SolarWinds and Colonial Pipeline breaches, underscoring vulnerabilities in both federal and private networks. This order aligns with the historical paradigm of leveraging federal authority to catalyze substantive changes in cybersecurity governance, mirroring global trends towards heightened state intervention in digital security.

Historically, this EO signals a shift from reactive measures towards a far more proactive cybersecurity strategy. While previous administrations have often responded to cyber threats with targeted defensive actions, this order promotes systematic changes within the cybersecurity landscape by advocating for pre-emptive measures, standardized responses, and enhanced public-private collaboration.

Highlighting broader issues of transparency, trust, and security in technology, the EO reflects international movements towards enhancing technology resilience. Several nations, particularly across Europe and Asia, have implemented or are considering legislative frameworks focusing on supply chain integrity and cybersecurity standards, indicating a global shift towards comprehensive cybersecurity governance.

The EO seamlessly integrates into the administration’s encompassing policy objectives, emphasizing infrastructure development and innovation. As an integral component of national resilience, cybersecurity dovetails with other technological advancements and industrial renewal initiatives designed to elevate America’s economic and strategic positioning on the global stage.

Potential Controversies or Challenges

The enactment of Executive Order 14028 is accompanied by potential legal and constitutional challenges related to data privacy and the breadth of federal oversight. Critics may contend that the expanded government authority over private sector cybersecurity operations infringes upon privacy rights, potentially leading to unintended surveillance and data management complications, raising possible Fourth Amendment concerns. Balancing data sharing and protection remains a contentious area as policies under the EO take effect.

The EO also implicates challenges in assuring harmonization of cybersecurity practices across diverse federal agencies, each with unique IT systems, cultures, and regulatory environments. The complex network of inter-agency collaboration required by the order may lead to jurisdictional disputes, especially when managing incidents or controlling national security systems—traditionally the responsibility of specific agencies like the Department of Defense.

Congressional resistance may surface regarding budget implications and resource allocations tied to the EO’s mandates. The expansive provisions requiring technology upgrades and agency modernization efforts carry considerable fiscal commitments. Lawmakers advocating for fiscal restraint or concerned about administrative overreach might scrutinize the cost-benefit calculus of the approaches stipulated, potentially triggering legislative reviews or oversight hearings.

The private sector’s capacity to adapt rapidly to the enhanced cybersecurity requirements represents another focal point of possible contention. Industry stakeholders may challenge the feasibility of rapid compliance based on the EO’s timelines, arguing that they are overly ambitious. Such views could spark discussions about flexibility in implementation and the need for impact assessments, particularly for small and medium-sized enterprises.

International implications are also at play, as the EO may influence cross-border data sharing and cybersecurity collaborations. Allies and trading partners could voice concerns over interoperability and alignment with international cybersecurity standards, complicating diplomatic engagements and international trade dynamics within the tech industry, particularly if they perceive the EO as indirectly affecting global supply chains.

Implications

This section will contain the bottom line up front analysis.

Users with accounts see get different text depending on what type of user they are. General interest, journalist, policymaker, agency staff, interest groups, litigators, researches.

Users will be able to refine their interests so they can quickly see what matters to them.