Biden's executive order on cybersecurity: a good beginning

President Biden just released an Executive Order (EO) on improving the nation’s cybersecurity to galvanize public and private efforts to help identify, deter, protect against, detect, and respond to persistent and increasingly sophisticated malicious cyber campaigns. Specific measures in the EO reflect lessons learned from recent crises, such as the recent cyber espionage campaigns.

In our view, the EO signals two things.

  • It calls for making federal government systems stronger and safer so they’re harder to break into. It pushes specific actions to modernize cybersecurity in the federal government, such as zero trust architecture. And it uses the $70 billion information technology (IT) purchasing power of the federal government to impel the market to build security into all software from the ground up.

  • It sets a goal for more effective and agile federal government responses. It requires IT providers to report cyber incidents and removes contractual barriers for them to share information with government entities. The EO also standardizes the playbook for different agencies to respond together to incidents.

This is a matter of national security and trust. The EO says “the trust we place in our digital infrastructure should be proportional to how trustworthy and transparent that infrastructure is, and to the consequences we will incur if that trust is misplaced.” 

This EO is just the first step for dealing with nation-state supply chain attacks. Sean Joyce, PwC’s Global & US Cybersecurity, Privacy & Forensics leader, had raised the urgency of more holistic action: The United States needs a more organized approach to cyberthreats. Already, the government and industry have lagged in updating our laws, our regulations, corporate responsibilities and adjusting to a digital, boundary-free world.

Who is affected?

  1. Federal executive agencies are expected to modernize their technology environment and security practices.

  2. Federal contractors, including commercial-off-the-shelf (COTS) software providers, will likely see new cybersecurity standards built into contract terms. They will be required to share more information on cyber incidents.

  3. The private sector will likely see a focus on software supply chain security, as well as on transparency through proposed consumer security labeling on software and internet of things (IoT) devices. As a result, software and IoT device companies should expect new security requirements and assessment standards.

The Biden administration EO outlines an array of cybersecurity objectives the government must meet, and there’s a short timeline to do so. As with former President Obama’s EO nine years ago, we anticipate a cascading impact, first to federal contractors and then rippling through other industries, as new standards are set and practices are adopted.

We now turn to the implications of the EO for the most directly affected: the providers of IT services to the federal government.

Directives and implications for federal contractors

Increase information sharing for better detection, investigation and remediation

Enhance information sharing

The EO directs the removal of any contractual barriers and requires IT service providers to share breach information that could impact government networks. The aim is to enable more effective defenses of federal departments and to improve the nation’s cybersecurity as a whole.

Implications

Short of national data breach legislation, this EO likely goes as far as it can to mandate cyber incident reporting. 

Traditionally, only defense contractors have had specific requirements regarding breach reporting (DFARS 252.204.7012 clause). This EO will extend the requirement to all Federal Acquisition Regulation (FAR) contracts. As a result, contractors will need to understand the contract requirements and the ability of their underlying data governance frameworks to classify, manage and protect sensitive data (i.e., controlled unclassified information [CUI].) 

In addition, contractors will be expected to collect and share information related to threats, vulnerabilities and incidents collected to share relevant information with CISA, FBI, and other agencies and boards for investigation.

Make the federal government systems stronger and safer

Modernize cyber in government

The EO challenges the federal government to lead the way and increase its adoption of security best practices. These practices include employing a zero-trust security model, accelerating movement to secure cloud services, and consistently deploying foundational security tools such as multifactor authentication and encryption.

Implications

There’s a strong commitment to zero trust architecture in this EO. The business community has been talking about this, and adoption has accelerated since the software supply chain attacks this past winter, but many executives are still asking if it’s the best thing to do. Seeing zero trust architecture called out in the EO may encourage business leaders to consider it a leading practice. It’s important to think of zero trust architecture as a layer in a layered defense strategy, and not the be-all and end-all of cybersecurity investments. 

Federal contractors should expect zero-trust security requirements, as well as further focus on CUI, to be included as new or alternative requirements in NIST requirements (NIST 800-53 (FedRAMP), NIST 800-171 (CMMC)).

There’s also a strong emphasis on getting cloud security right: developing a cloud-service governance framework, a federal cloud security strategy, and cloud-security technical reference architecture documentation. A well-thought-out, step-by-step approach to security can jumpstart cloud adoption. 

Also, contractors that are cloud service providers (CSPs) should expect an expansion in the US government market for solutions that support zero-trust principles.

Improve collaboration within government agencies and with the private sector

Create a Cybersecurity Safety Review Board

The EO establishes a Cybersecurity Safety Review Board, co-chaired by government and private sector leads. The board may convene following a significant cyber incident to analyze what happened and make concrete recommendations for improving cybersecurity.

Implication

This is expected to operate similarly to the National Transportation Safety Board’s (NTSB’s) investigations into major transportation incidents, and it will include participation from the private sector. The details concerning what incidents this review board will participate in have not yet been determined.

Timelines in the Executive Order

Great resolve and good ideas in executive orders need to be translated into rules and standards. What are the important milestones?

Table showing the important cybersecurity milestones for President Biden from May 2021 to February 2022. Table showing the important cybersecurity milestones for President Biden from May 2021 to February 2022.

Contact us

Sean Joyce

Global Cybersecurity & Privacy Leader, PwC US; Cyber, Risk & Regulatory Leader, PwC US

Joseph Nocera

Cyber & Tech Risk Solution Leader, Cybersecurity, Risk & Regulatory, PwC US

Matt Gorham

Cyber & Risk Innovation Institute Leader, PwC US

Follow us
Hide

Required fields are marked with an asterisk(*)

By submitting your email address, you acknowledge that you have read the Privacy Statement and that you consent to our processing data in accordance with the Privacy Statement (including international transfers). If you change your mind at any time about wishing to receive the information from us, you can send us an email message using the Contact Us page.