NIST - CCD-IS by Vladimir Tsakanyan

Cybersecurity Policy Pivot: Analyzing the White House’s New Executive Order and Its Impact on Government Contractors

Vladimir Tsakanyan

The June 2025 Executive Order (EO) marks a significant moment in federal cybersecurity policy, signaling a strategic shift toward flexibility and targeted enforcement. For organizations working with the federal government, understanding these changes is crucial for future compliance and contract readiness.

On June 6, 2025, the White House issued an Executive Order titled, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144.”

While the name suggests continuity—and many core security initiatives remain intact—the Order officially rolls back several high-profile, prescriptive mandates from the previous administration, particularly those related to software supply chain assurance and digital identity.

Here is a breakdown of the strategic changes and enduring requirements federal agencies and their contractors must navigate.


1. The Pivot: Streamlining and Reducing Centralized Compliance

The most notable changes introduced by the June 2025 EO involve relieving specific administrative burdens and focusing federal efforts on external, foreign threats.

Key Changes from Previous Mandates:

  • Software Attestations: The new EO eliminated centralized submission and validation of secure development attestations to a CISA repository. The basic requirement for agencies to obtain attestations from vendors remains, but the administrative burden of validation is removed.
  • Digital Identity: The directive encouraging federal agencies to expand the acceptance of third-party digital identities (e.g., mobile driver’s licenses) for public benefit programs was completely eliminated.
  • Cyber Sanctions: The scope of authorized sanctions against malicious cyber actors was narrowed to “any foreign person,” focusing enforcement clearly on international threat actors and preventing potential misuse against domestic entities.
  • NIST Minimum Practices: The specific directive for NIST to develop guidance on “mandatory minimum cybersecurity practices” for hardening federal networks was eliminated, opting instead for agencies to follow existing and evolving NIST guidance like the RMF and SP 800-53/171.

The key takeaway from these amendments is a shift away from a “compliance checklist” mentality toward a more risk-based and decentralized approach, placing greater trust in established NIST standards and agency discretion.


2. NIST and Innovation: The Core Mission Sustained

While certain mandates were removed, the EO maintains or accelerates efforts in next-generation cybersecurity, cementing the National Institute of Standards and Technology (NIST) as the essential authority for federal security standards.

The Executive Order sets several critical deadlines for NIST and other agencies:

  • Secure Software Development Framework (SSDF): The EO sustains the requirement to use the SSDF (NIST SP 800-218). It directs NIST to establish an industry consortium by August 1, 2025, to develop guidance on the practical implementation of the SSDF. A preliminary update to the SSDF itself is due by December 1, 2025.
  • Artificial Intelligence (AI): The Order emphasizes harnessing AI to automate cyber defense, rapidly identify vulnerabilities, and increase the scale of threat detection. It directs agencies to ensure existing cyber defense datasets are made accessible for research by November 1, 2025.
  • Post-Quantum Cryptography (PQC): The transition to cryptography resilient against quantum computers remains a top priority, with deadlines set for DHS and NSA to release lists and requirements to prepare for PQC transition.
  • IoT Cyber Trust Mark: The initiative to require vendors selling consumer Internet-of-Things (IoT) products to the government to carry the U.S. Cyber Trust Mark labeling remains on track, with the Federal Acquisition Regulation (FAR) expected to be amended to reflect this requirement.

3. What Federal Contractors Must Do Now

For defense and federal contractors, the new EO offers a mixed bag of relief and continuity.

The Good News: The administrative lift associated with CISA’s centralized software attestation repository has been removed, providing some relief in the contracting process.

The Essential Continuity: Critically, the core security and compliance mandates driving the industry remain fully intact. Contractors must still comply with:

  1. EO 14028 Requirements: Directives from the 2021 EO (which was not rescinded) remain, including strict deadlines for agencies to implement Zero Trust Architecture (ZTA), deploy Multi-Factor Authentication (MFA), and require prompt cyber incident reporting from IT service providers.
  2. DFARS & CMMC: Requirements tied to protecting Controlled Unclassified Information (CUI) under the Defense Federal Acquisition Regulation Supplement (DFARS 252.204-7012) and the Cybersecurity Maturity Model Certification (CMMC) framework are untouched by this new EO. These are fundamentally based on NIST SP 800-171.
  3. Evolving NIST Guidance: Since the government is now relying more heavily on existing standards, companies must closely monitor the scheduled updates to NIST publications, especially the NIST SP 800-218 (SSDF) for secure software delivery and the upcoming changes to NIST SP 800-53 regarding patches and updates (due by September 2, 2025).

Conclusion: Flexibility Demands Proactivity

The June 2025 Executive Order is not a step back from cybersecurity, but a clear shift in strategy. By removing prescriptive, administrative mandates, the government is signaling that compliance is not about checking a box for a repository but about genuine, NIST-guided security investment.

For federal contractors, the call to action is clear: focus resources on strengthening your core systems to meet ZTA and PQC readiness, and ensure your compliance programs are tied to the evolving guidance from NIST. The path to federal contracts is now less about centralized paperwork and more about verifiable, robust security posture.


Discover more from Center for Cyber Diplomacy and International Security

Subscribe to get the latest posts sent to your email.

Discover more from Center for Cyber Diplomacy and International Security

Subscribe now to keep reading and get access to the full archive.

Continue reading