Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

New cybersecurity executive order: The devil is in the detail

By Chris Wysopal
cyber freepik
July 2, 2021

In the wake of recent major cybersecurity incidents, such as the SolarWinds, Microsoft Exchange, and Colonial Pipeline attacks, the Biden administration has released an executive order on cybersecurity, which includes new security requirements for software vendors selling to the U.S. government. After years of cybersecurity challenges, the development of effective cybersecurity industry standards for software is finally, squarely in the spotlight.

The executive order maps out how the U.S. government will implement cybersecurity requirements and standards – but it is just the beginning. The federal government won’t be the last entity demanding more security transparency from software vendors and this is likely a sign of what’s to come for any organization creating software in any industry. We expect to see enterprises and SMBs alike requiring their software vendors to adhere to strict cybersecurity protocols in the future. With that in mind, anyone developing software should be prepared to understand the order in detail, and adapt their processes accordingly to ensure the highest standards of software security are implemented.

So where should we start? This executive order covers a lot of ground, and it will take industry experts the next several months to break it down and fully understand its implications. Here are a few areas that are worth digging into right off the bat.

 

The Three-Day Window on Severe Incidents

One aspect of the executive order is focused on “Removing Barriers to Sharing Threat Information.” Specifically, it calls on cybersecurity contractors to report incidents based on a scale of severity, with reporting of the most severe incidents “not to exceed three days after initial detection.”

As software and SaaS providers with federal contracts will need to report cybersecurity incidents or breaches promptly, the National Institute of Standards and Technology (NIST) is currently working on total preliminary standards and software security requirements. These are likely to be actioned by early 2022.

 

A software bill of materials for “critical software”

The order states that “the development of commercial software often lacks transparency, sufficient focus on the ability of the software to resist attack, and adequate controls to prevent tampering by malicious actors”. As such, security vendors will be required to provide a software bill of materials (SBOM) for “critical software”. The definition of “critical software,” is being worked on in consultation with the Secretary of Defense acting through the Director of the NSA, the Director of Homeland Security acting through the Director of CISA, the Director of OMB, and the Director of National Intelligence.

While we wait for this to emerge, it’s likely the development environment for software will come under the microscope. Where software is developed needs to have the same, if not better, controls than the environment in which the software will be deployed. Consider deployment of two-factor authentication for developers checking elements in and out of code repositories or assigning digital signatures to verify code in the build process. Since critical software is likely to be operated in the most restricted environments, it’ll have to be built in environments like this too.

 

Software Security Testing During the Development Process

Another important focus is on security by design. Instead of a reactionary approach to security where vulnerabilities are found in production and steps taken to remediate each one, integrating automated security testing into the entire software development process ensures security is baked into the build pipeline.  

We’ll have to wait and see which security testing specifics NIST puts into place as standard but, in the meantime, the executive order shared:

  • Automated tools or comparable processes are required to check for known or potential vulnerabilities, and steps taken to remediate
  • Testing should operate regularly, including before product, version or update deployments. This means software scanning will need to be built into the development pipeline, and not only applied to live software
  • In addition to assessing security in the development process, there will be assessments related to security of the development process, such as the environment in which software is built

Every aspect of this executive order is worth diving into further. What is certain is that structure and standards are here for software vendors involved with the U.S. government, and similar standards for the private industry aren’t far behind. Vendors that work quickly to implement the highest standards of software security will help set the stage for the rest of the industry, while serving as an example of our secure digital future.

KEYWORDS: cyber security national security President Biden risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chris Wysopal is co-founder and CTO at Veracode. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • American flag

    Security leaders weigh in on Biden’s new cybersecurity executive order

    See More
  • The White House

    Security Through Quality: Navigating the Latest Cybersecurity Executive Order

    See More
  • New Executive Order Changes Cybersecurity Requirements for Federal Agencies

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing