Policy Briefing — U.S. EO 14028 on Improving the Nation’s Cybersecurity signed
President Biden signed Executive Order 14028 on 12 May 2021, mandating federal zero trust roadmaps, software bill of materials requirements, and incident sharing under new playbooks.
Executive briefing: President Biden signed Executive Order (EO) 14028 on 12 May 2021, setting a compulsory modernization track for U.S. federal agencies and contractors: accelerated zero trust adoption, secure cloud migration, improved logging, supply-chain assurance via Software Bills of Materials (SBOMs), and standard incident playbooks.
While many milestones were due in 2021–2022, the obligations continue to anchor federal procurement expectations, FedRAMP authorizations, and agency FISMA audits. Security, legal, procurement, engineering, and vendor-management teams should treat EO 14028 as the baseline for all new federal-facing products and managed services and map it to current OMB, CISA, and NIST updates.
For navigation support, use the pillar hub, the federal incident-response guide, and adjacent briefs on OMB M-24-10 safety controls and critical-infrastructure detection benchmarks.
What the EO mandates
- Zero trust architecture (ZTA): Agencies must define ZTA roadmaps (aligned to NIST SP 800-207) and prioritize identity-centric access, microsegmentation, and continuous authentication for high-value assets.
- Cloud-first with secure tenancy: Move services to secure cloud with mandatory multi-factor authentication (MFA), DNSSEC, encrypted DNS, and secure DNS resolvers; FedRAMP High/Moderate baselines remain the floor for hosting federal data.
- Logging and event retention: Unified logging across network, endpoint, cloud, and identity systems with retention sufficient for incident reconstruction; agencies must share relevant logs with CISA and contractors must retain for contractual periods.
- Government-wide playbooks: CISA-issued incident response playbooks standardize preparation, detection, analysis, containment, eradication, recovery, and post-incident activities; contractors must align response SLAs and evidence collection.
- Supply-chain security and SBOMs: Software producers providing to the federal government must furnish SBOMs, attest to secure development practices (e.g., memory-safe languages where feasible, signed artifacts, provenance), and document vulnerability disclosure programs.
- Endpoint detection and response (EDR): Agencies need CISA-coordinated EDR deployment to gain real-time visibility; vendors supplying managed endpoints must prove compatibility with EDR telemetry and containment actions.
- Vulnerability management cadence: Rapid patch timelines with priority for known exploited vulnerabilities; EO 14028 underpins CISA’s Binding Operational Directives (e.g., KEV catalog) and scanning expectations.
Governance and accountability
Senior officials (Agency heads, CIOs, CISOs, Chief Data Officers, and procurement leads) are accountable for resourcing and verifying compliance. Prime contractors and SaaS vendors must embed EO 14028 control objectives into Statements of Work (SOWs), Authority to Operate (ATO) packages, and Continuous Monitoring Plans.
| Role | Primary obligations | Evidence artifacts |
|---|---|---|
| CIO/CISO | Approve ZTA roadmap, enforce MFA/SSO, ensure logging/EDR coverage, sponsor tabletop drills. | ZTA reference architecture, access policies, logging coverage map, drill after-action reports. |
| Procurement | Update contracts with SBOM, secure development, and logging clauses; enforce FedRAMP alignment. | Model contract language, supplier attestations, SBOM repository access logs. |
| Engineering/DevOps | Implement signed builds, provenance (SLSA-style), secret scanning, and automated dependency updates. | CI/CD pipeline configs, signing keys inventory, dependency risk dashboard. |
| Security Operations | Deploy EDR, tune detections, integrate CISA playbooks, maintain forensics-ready logging. | EDR deployment matrix, detection rules, log retention plan, incident tickets with timelines. |
| Privacy/Legal | Review data handling, breach notification terms, cross-border transfer constraints. | Data flow diagrams, DPA addenda, incident notice templates. |
90-day sprint to align legacy systems
| Week | Objectives | Dependencies | Exit criteria |
|---|---|---|---|
| Weeks 1–2 | Baseline logging gaps; enable MFA and SSO for all privileged accounts; select SBOM generation tooling. | Directory integration, license approvals for logging/SBOM tools. | 100% admin MFA, log ingestion from identity + network sensors, SBOM pilot on one product line. |
| Weeks 3–4 | Deploy EDR to critical servers and laptops; publish incident playbook harmonized with CISA guidance. | Endpoint coverage inventory, SOC staffing plan. | EDR coverage >85% of managed endpoints; playbook approved by CISO and Legal. |
| Weeks 5–8 | Implement signed builds and provenance; automate dependency scanning; map KEV patches to SLAs. | CI/CD access, signing infrastructure, vulnerability scanner integrations. | Reproducible builds with artifact signing; KEV remediation tracker with SLA by severity. |
| Weeks 9–12 | Run full incident tabletop; deliver consolidated ATO update with SBOMs and log retention plan. | Drill facilitators, PMO support. | After-action report with gaps closed; ATO package submitted/updated; contract mods issued. |
SBOM and supply-chain assurance
- Format and distribution: Support SPDX or CycloneDX; provide machine-readable SBOMs under vendor portal access controls with integrity checks.
- Provenance: Align with SLSA levels where feasible; sign artifacts; maintain dependency source attestations and release notes that map to vulnerabilities addressed.
- Vulnerability disclosure: Maintain a coordinated vulnerability disclosure (CVD) program with clear intake, timelines, and acknowledgment process; document exceptions and mitigations.
- Third-party components: Track licensing, export-control flags, and end-of-support dates; avoid components prohibited for federal environments.
Logging, detection, and incident response
Agencies and contractors must achieve forensic-quality logging that supports rapid containment and reporting to CISA and impacted customers.
- Coverage: Collect logs from identity (IdP, MFA), network (firewalls, DNS, VPN), endpoints (EDR), cloud (API/audit), and applications. Normalize to a central SIEM or SOAR for correlation.
- Retention: Maintain retention aligned with contractual clauses and OMB/CISA guidance; ensure immutable storage for high-risk systems.
- Detection engineering: Prioritize detections for credential abuse, lateral movement, data exfiltration, and supply-chain anomalies (e.g., unsigned packages, unexpected build runners).
- Response playbooks: Map actions to the CISA playbooks, including severity rating, communication channels, evidence handling, and timelines for initial notification.
- Exercises: Run at least quarterly tabletops that validate cloud isolation steps, credential revocation speed, and SBOM-driven impact analysis.
Metrics to demonstrate maturity
| Metric | Target | Why it matters |
|---|---|---|
| Admin MFA coverage | 100% of privileged accounts | Reduces account takeover risk and is table stakes for FedRAMP and ZTA. |
| EDR deployment | >=95% of endpoints within scope | Enables correlated detection and rapid isolation for ransomware and intrusion events. |
| KEV patch SLA | Critical within 15 days; high within 30 days | Aligns to CISA KEV expectations and agency continuous monitoring. |
| SBOM freshness | Updated each release and after any critical dependency change | Allows rapid blast-radius analysis and customer notification. |
| Log retention | >=12 months for high-value assets | Supports investigation and contractual evidence obligations. |
| Exercise cadence | Quarterly IR tabletops, semiannual ZTA control tests | Validates that playbooks, access controls, and suppliers work under stress. |
Supplier checklist for federal-facing products
- Include SBOM download location, signing method, and verification steps in security documentation.
- Document secure development lifecycle: code review, secret scanning, dependency pinning, reproducible builds, and release approval gates.
- Provide incident response RACI, 24/7 contact path, and escalation timelines aligned to CISA severity tiers.
- Maintain an ATO-ready package: system security plan (SSP), control inheritance from cloud platforms, continuous monitoring plan, and POA&Ms.
- Ensure support for federal identity standards (PIV/CAC, SAML/OIDC), audit logging export, and FIPS-validated cryptography where required.
- Coordinate with customers on penetration testing windows, data residency expectations, and lawful-access constraints.
Sustainment plan
EO 14028 is now the baseline for federal cyber programs. Sustainment requires:
- Quarterly reviews of zero trust progress, SBOM completeness, and KEV remediation against agency scorecards.
- Annual contract refresh to embed updated CISA directives, NIST controls, and FedRAMP revisions.
- Continuous visibility into supplier subcomponents via attestation renewals and inbound SBOM validation.
- Training for engineering, procurement, and SOC teams on evolving federal expectations and CISA playbook updates.
Keeping these motions tight aligns federal partners, reduces surprise findings during ATO renewals, and speeds adoption of new federal guidance built on EO 14028.
Continue in the Policy pillar
Return to the hub for curated research and deep-dive guides.
Latest guides
-
Semiconductor Industrial Strategy Policy Guide — Zeph Tech
Coordinate CHIPS and Science Act, EU Chips Act, and Defense Production Act programmes with capital planning, compliance, and supplier readiness.
-
Digital Markets Compliance Guide — Zeph Tech
Implement EU Digital Markets Act, EU Digital Services Act, UK Digital Markets, Competition and Consumers Act, and U.S. Sherman Act requirements with cross-functional operating…
-
Export Controls and Sanctions Policy Guide — Zeph Tech
Integrate U.S. Export Control Reform Act, International Emergency Economic Powers Act, and EU Dual-Use Regulation requirements into trade compliance, engineering, and supplier…




