CISA Issues New Cybersecurity Directive for Federal Agencies
Time 3 Minute Read

On November 3, 2021, the Cybersecurity and Infrastructure Security Agency (“CISA”) announced Directive 22-01 - Reducing the Significant Risk of Known Exploited Vulnerabilities (the “Directive”), establishing a CISA-managed catalog of vulnerabilities and compelling federal agencies to remediate such vulnerabilities on government information systems. The Directive targets vulnerabilities that pose a significant risk to the federal government and applies to all software and hardware found on federal information systems, including those managed on an agency’s premises, as well as those hosted by third parties on an agency’s behalf. The Directive is the latest in a series of executive branch efforts to address U.S. cybersecurity in the public and private sectors.

The Directive requires agencies to take certain steps in connection with remediating the nearly 300 vulnerabilities identified in CISA’s catalog; accordingly, agencies must:

  • Review and update their internal vulnerability management procedures within 60 days to address, at a minimum, the measures specified in the directive, which include establishing ongoing remediation processes, assigning roles and responsibilities for executing required actions, defining necessary actions to enable prompt responses, establishing internal validation and enforcement procedures for compliance purposes and setting internal tracking and reporting requirements to evaluate and report on compliance, as appropriate. Agencies must provide a copy of their policies and procedures to CISA upon request.
  • Remediate each identified vulnerability within the relevant timeframes set forth in the CISA catalog, which range from six months to two weeks. These timeframes are subject to change in light of relevant risks.
  • Report on the status of the catalogued vulnerabilities. Agencies are expected to automate data exchanges and report their implementation statuses in accordance with the requirements for deploying the Continuous Diagnostics and Mitigation (“CDM”) Federal Dashboard. Agencies that have not migrated reporting to the CDM Federal Dashboard are subject to alternative quarterly reporting, which will entail a bi-weekly requirement beginning October 1, 2022.

CISA provides an option to sign up for automatic alerts when new vulnerabilities are added to the catalog.

As we previously reported, on May 12, 2021, the Biden administration issued an Executive Order on Improving the Nation’s Cybersecurity, outlining a number of initiatives intended to improve U.S. cybersecurity and protect federal government networks. Subsequently, the Biden administration has issued orders, directives and guidance on a variety of cybersecurity issues, including those related to requirements for critical pipeline owners and operators, protecting Americans' sensitive data from foreign adversaries, and the development of critical infrastructure performance goals.

You May Also Be Interested In

Time 2 Minute Read

On June 27, 2025, the U.S. Supreme Court upheld, by in a 6-3 vote, H.B. 1181, a Texas law that requires certain commercial websites publishing sexually explicit content to verify that visitors are 18 years of age or older.

Time 3 Minute Read

On January 20, 2025, President Trump revoked a number of Biden-era Executive Orders, including Executive Order 14110 on Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence.

Time 3 Minute Read

Last week President Biden issued Executive Order 14144, titled “Strengthening and Promoting Innovation in the Nation’s Cybersecurity,” which aims to strengthen software supply chain security, impose more stringent cybersecurity requirements on federal contractors, combat cybercrime, and encourage the development of identity verification technologies.

Time 2 Minute Read

On January 17, 2025, the Supreme Court of the United States unanimously upheld the Protecting Americans from Foreign Adversary Controlled Applications Act, which restricts companies from making foreign adversary controlled applications available (i.e., on an app store) and from providing hosting services with respect to such apps.

Search

Subscribe Arrow

Recent Posts

Categories

Tags

Archives

Jump to Page