← Back to all briefings
Policy 6 min read Published Updated Credibility 40/100

Policy Briefing — U.S. EO 14028 on Improving the Nation’s Cybersecurity signed

President Biden signed Executive Order 14028 on 12 May 2021, mandating federal zero trust roadmaps, software bill of materials requirements, and incident sharing under new playbooks.

Single-point timeline showing the publication date sized by credibility score.
Publication date and credibility emphasis for this briefing. Source data (JSON)

Executive briefing: President Biden signed Executive Order (EO) 14028 on 12 May 2021, setting a compulsory modernization track for U.S. federal agencies and contractors: accelerated zero trust adoption, secure cloud migration, improved logging, supply-chain assurance via Software Bills of Materials (SBOMs), and standard incident playbooks.

While many milestones were due in 2021–2022, the obligations continue to anchor federal procurement expectations, FedRAMP authorizations, and agency FISMA audits. Security, legal, procurement, engineering, and vendor-management teams should treat EO 14028 as the baseline for all new federal-facing products and managed services and map it to current OMB, CISA, and NIST updates.

For navigation support, use the pillar hub, the federal incident-response guide, and adjacent briefs on OMB M-24-10 safety controls and critical-infrastructure detection benchmarks.

What the EO mandates

  • Zero trust architecture (ZTA): Agencies must define ZTA roadmaps (aligned to NIST SP 800-207) and prioritize identity-centric access, microsegmentation, and continuous authentication for high-value assets.
  • Cloud-first with secure tenancy: Move services to secure cloud with mandatory multi-factor authentication (MFA), DNSSEC, encrypted DNS, and secure DNS resolvers; FedRAMP High/Moderate baselines remain the floor for hosting federal data.
  • Logging and event retention: Unified logging across network, endpoint, cloud, and identity systems with retention sufficient for incident reconstruction; agencies must share relevant logs with CISA and contractors must retain for contractual periods.
  • Government-wide playbooks: CISA-issued incident response playbooks standardize preparation, detection, analysis, containment, eradication, recovery, and post-incident activities; contractors must align response SLAs and evidence collection.
  • Supply-chain security and SBOMs: Software producers providing to the federal government must furnish SBOMs, attest to secure development practices (e.g., memory-safe languages where feasible, signed artifacts, provenance), and document vulnerability disclosure programs.
  • Endpoint detection and response (EDR): Agencies need CISA-coordinated EDR deployment to gain real-time visibility; vendors supplying managed endpoints must prove compatibility with EDR telemetry and containment actions.
  • Vulnerability management cadence: Rapid patch timelines with priority for known exploited vulnerabilities; EO 14028 underpins CISA’s Binding Operational Directives (e.g., KEV catalog) and scanning expectations.

Governance and accountability

Senior officials (Agency heads, CIOs, CISOs, Chief Data Officers, and procurement leads) are accountable for resourcing and verifying compliance. Prime contractors and SaaS vendors must embed EO 14028 control objectives into Statements of Work (SOWs), Authority to Operate (ATO) packages, and Continuous Monitoring Plans.

RolePrimary obligationsEvidence artifacts
CIO/CISOApprove ZTA roadmap, enforce MFA/SSO, ensure logging/EDR coverage, sponsor tabletop drills.ZTA reference architecture, access policies, logging coverage map, drill after-action reports.
ProcurementUpdate contracts with SBOM, secure development, and logging clauses; enforce FedRAMP alignment.Model contract language, supplier attestations, SBOM repository access logs.
Engineering/DevOpsImplement signed builds, provenance (SLSA-style), secret scanning, and automated dependency updates.CI/CD pipeline configs, signing keys inventory, dependency risk dashboard.
Security OperationsDeploy EDR, tune detections, integrate CISA playbooks, maintain forensics-ready logging.EDR deployment matrix, detection rules, log retention plan, incident tickets with timelines.
Privacy/LegalReview data handling, breach notification terms, cross-border transfer constraints.Data flow diagrams, DPA addenda, incident notice templates.
Responsibility matrix linking EO 14028 control owners to the artifacts auditors request.

90-day sprint to align legacy systems

WeekObjectivesDependenciesExit criteria
Weeks 1–2Baseline logging gaps; enable MFA and SSO for all privileged accounts; select SBOM generation tooling.Directory integration, license approvals for logging/SBOM tools.100% admin MFA, log ingestion from identity + network sensors, SBOM pilot on one product line.
Weeks 3–4Deploy EDR to critical servers and laptops; publish incident playbook harmonized with CISA guidance.Endpoint coverage inventory, SOC staffing plan.EDR coverage >85% of managed endpoints; playbook approved by CISO and Legal.
Weeks 5–8Implement signed builds and provenance; automate dependency scanning; map KEV patches to SLAs.CI/CD access, signing infrastructure, vulnerability scanner integrations.Reproducible builds with artifact signing; KEV remediation tracker with SLA by severity.
Weeks 9–12Run full incident tabletop; deliver consolidated ATO update with SBOMs and log retention plan.Drill facilitators, PMO support.After-action report with gaps closed; ATO package submitted/updated; contract mods issued.
Three-month alignment plan to bring legacy environments onto EO 14028 baselines.

SBOM and supply-chain assurance

  • Format and distribution: Support SPDX or CycloneDX; provide machine-readable SBOMs under vendor portal access controls with integrity checks.
  • Provenance: Align with SLSA levels where feasible; sign artifacts; maintain dependency source attestations and release notes that map to vulnerabilities addressed.
  • Vulnerability disclosure: Maintain a coordinated vulnerability disclosure (CVD) program with clear intake, timelines, and acknowledgment process; document exceptions and mitigations.
  • Third-party components: Track licensing, export-control flags, and end-of-support dates; avoid components prohibited for federal environments.

Logging, detection, and incident response

Agencies and contractors must achieve forensic-quality logging that supports rapid containment and reporting to CISA and impacted customers.

  • Coverage: Collect logs from identity (IdP, MFA), network (firewalls, DNS, VPN), endpoints (EDR), cloud (API/audit), and applications. Normalize to a central SIEM or SOAR for correlation.
  • Retention: Maintain retention aligned with contractual clauses and OMB/CISA guidance; ensure immutable storage for high-risk systems.
  • Detection engineering: Prioritize detections for credential abuse, lateral movement, data exfiltration, and supply-chain anomalies (e.g., unsigned packages, unexpected build runners).
  • Response playbooks: Map actions to the CISA playbooks, including severity rating, communication channels, evidence handling, and timelines for initial notification.
  • Exercises: Run at least quarterly tabletops that validate cloud isolation steps, credential revocation speed, and SBOM-driven impact analysis.

Metrics to demonstrate maturity

MetricTargetWhy it matters
Admin MFA coverage100% of privileged accountsReduces account takeover risk and is table stakes for FedRAMP and ZTA.
EDR deployment>=95% of endpoints within scopeEnables correlated detection and rapid isolation for ransomware and intrusion events.
KEV patch SLACritical within 15 days; high within 30 daysAligns to CISA KEV expectations and agency continuous monitoring.
SBOM freshnessUpdated each release and after any critical dependency changeAllows rapid blast-radius analysis and customer notification.
Log retention>=12 months for high-value assetsSupports investigation and contractual evidence obligations.
Exercise cadenceQuarterly IR tabletops, semiannual ZTA control testsValidates that playbooks, access controls, and suppliers work under stress.
Operational indicators that satisfy EO 14028 oversight and procurement scrutiny.

Supplier checklist for federal-facing products

  • Include SBOM download location, signing method, and verification steps in security documentation.
  • Document secure development lifecycle: code review, secret scanning, dependency pinning, reproducible builds, and release approval gates.
  • Provide incident response RACI, 24/7 contact path, and escalation timelines aligned to CISA severity tiers.
  • Maintain an ATO-ready package: system security plan (SSP), control inheritance from cloud platforms, continuous monitoring plan, and POA&Ms.
  • Ensure support for federal identity standards (PIV/CAC, SAML/OIDC), audit logging export, and FIPS-validated cryptography where required.
  • Coordinate with customers on penetration testing windows, data residency expectations, and lawful-access constraints.

Sustainment plan

EO 14028 is now the baseline for federal cyber programs. Sustainment requires:

  • Quarterly reviews of zero trust progress, SBOM completeness, and KEV remediation against agency scorecards.
  • Annual contract refresh to embed updated CISA directives, NIST controls, and FedRAMP revisions.
  • Continuous visibility into supplier subcomponents via attestation renewals and inbound SBOM validation.
  • Training for engineering, procurement, and SOC teams on evolving federal expectations and CISA playbook updates.

Keeping these motions tight aligns federal partners, reduces surprise findings during ATO renewals, and speeds adoption of new federal guidance built on EO 14028.

Single-point timeline showing the publication date sized by credibility score.
Publication date and credibility emphasis for this briefing. Source data (JSON)

Continue in the Policy pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

  • Executive Order 14028
  • zero trust
  • SBOM
  • federal procurement
Back to curated briefings