
President Donald J. Trump signed a sweeping Executive Order that rewrites U.S. cybersecurity policy, dismantling key Biden- and Obama-era directives and reshaping federal priorities around software security, AI, and digital identity.
The changes are positioned as a return to “technical and organizational professionalism” in the cyber domain. The new Executive Order amends Executive Orders 14144 (issued by President Biden in January 2025) and 13694 (originally signed by President Obama in 2015), reversing several of their core initiatives. The White House justified the move as a corrective to what it labeled as “problematic and distracting issues” introduced by previous administrations.
Major revisions
The most significant shift lies in the elimination of mandates for digital identity programs, security attestations for federal software procurement, and proactive AI cybersecurity measures. According to a fact sheet released by the administration, Trump’s order:
- Strips requirements for U.S. government-issued digital IDs, claiming they could facilitate entitlement fraud.
- Ends mandates that would have required federal contractors to submit security attestations and stops CISA from validating or publicizing vendor performance.
- Removes provisions that promoted phishing-resistant authentication and strong email encryption practices.
Conversely, the Executive Order retains and reaffirms several initiatives seen as core to national cyber defense:
- Advancing secure software development practices based on NIST’s SSDF (Special Publication 800–218).
- Directing agencies to act on internet routing security, specifically addressing Border Gateway Protocol (BGP) vulnerabilities.
- Recommitting to post-quantum cryptography (PQC) transition plans, though with reduced scope compared to the Biden directive.
A shift in cybersecurity philosophy
The Trump administration’s revised policy centers around a more targeted and less compliance-driven model. It eliminates references to open source software’s strategic importance, drops the requirement for testing AI in defense infrastructure, and narrows the use of economic sanctions, restricting their application strictly to foreign entities involved in malicious cyber activity.
The changes also de-emphasize proactive AI security, cutting sections that required vulnerability assessments and security-focused AI research initiatives. Instead, the order repurposes AI efforts toward identifying and managing software vulnerabilities without invoking censorship-related mechanisms.
Despite rolling back many Biden-era directives, the new order leaves some Biden initiatives intact. Most notably, it retains the FCC’s Cyber Trust Mark program, which mandates security labeling for consumer IoT devices sold to the federal government starting in 2027.
The Executive Order includes explicit deadlines. NIST must publish updated guidance for secure software practices by December 2025. Agencies must prepare for the PQC transition by 2030, including mandating TLS 1.3 or better for federal networks.
In practical terms, federal software vendors, cloud providers, and hardware manufacturers, particularly those dealing with IoT devices, are directly affected. Contractors will now face fewer reporting and compliance requirements but must still align with evolving technical standards from NIST.
Leave a Reply