CISA Mandates Federal Agencies Account For Assets On Networks
CISA’s new directive aims to improve asset visibility and allow to manage cybersecurity risks federal agencies face.

The Cybersecurity and Infrastructure Security Agency (CISA) issued a binding operational directive (BOD) Monday requiring federal agencies to account for assets and vulnerabilities residing on their networks and allowing CISA to manage cybersecurity in the federal civilian agencies space more effectively.
The BOD comes after CISA received authority from Congress to require cyber incident reporting earlier this year, complements growing efforts to incorporate zero trust principles into federal agencies’ cybersecurity strategies and encourages federal agencies to develop stronger data management practices in order to “catch” vulnerabilities before they’re exploited.
CISA has been working towards gaining greater visibility into federal agencies’ networks for several years now. The recent SolarWinds software supply chain attack highlighted the need for network visibility when the hackers gained access to SolarWinds customers’ networks, some of which included agencies such as State Department, the Department of Homeland Security, nuclear research labs and government contractors.
“Threat actors continue to target our nation’s critical infrastructure and government networks to exploit weaknesses within unknown, unprotected, or under-protected assets,” CISA Director Jen Easterly said in a press release. “Knowing what’s on your network is the first step for any organization to reduce risk.”
The directive will require all agencies to perform automated asset discovery every seven days, with the minimum requirement of this discovery covering the entire IPv4 space used by the agency; list vulnerabilities across all discovered assets, including laptops, every 14 days; initiate vulnerability enumeration results into the Continuous Diagnostics and Mitigation (CDM) agency dashboard within 72 hours of discovery; establish the ability to perform on-demand asset discovery and vulnerability enumeration within 72 hours of receiving a request from CISA; report vulnerability enumeration performance data within six months of CISA publishing the requirements.
“While the requirements in this Directive are not sufficient for comprehensive, modern cyber defense operations, they are an important step to address current visibility challenges at the component, agency, and FCEB enterprise level,” the directive reads.
Federal agencies will have until April 2023 to implement the required actions. This directive applies to federal civilian agencies and is not pertaining to the Department of Defense and intelligence agencies. While the directive is a mandate for federal agencies only, CISA recommends that state, local, tribal and territorial governments, as well as private businesses, consider implementing asset and vulnerability management programs.
“While this Directive applies to federal civilian agencies, we urge all organizations to adopt the guidance in this directive to gain a complete understanding of vulnerabilities that may exist on their networks,” Easterly said. “We all have a role to play in building a more cyber resilient nation.”
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
New Army Acquisition Plan Cites Autonomy, Predictive Analytics
Officials outline how the Army Transformation Initiative signals a broader shift toward efficiency with tech and acquisition reform.
4m read -
DOE National Labs Launch New AI Tools for Operational Efficiency
The Energy Department's National Laboratories are using AI to increase operational efficiency and drive research efforts forward.
3m read -
AWS Summit: Innovation Accelerates IT Delivery at DOD
Marine Corps Community Services is tackling outdated IT processes with agile development and cutting-edge cloud security to deliver mission-critical capabilities faster.
12m watch -
AWS Summit: NIST Secures High-Performance Computing Against Evolving Threats
NIST’s Yang Guo reveals the broad attack surface of high-performance computing and explains developing guidance and future-proofing security strategies.
9m watch -
Trump Overhauls Federal Cybersecurity with New Executive Order
The new directive aims to strengthen digital defenses while rolling back "burdensome" software requirements and refocusing AI security.
3m read -
AWS Summit: Forging Successful Cloud Modernization Partnerships
Industry leaders share insights on the critical role industry partnerships have in enabling government agencies to navigate procurement challenges for cloud and zero trust solutions.
24m watch Partner Content -
CISA's CVE Program and Why it Matters for Zero Trust
The vulnerability program provides the cybersecurity community visibility into software as part of a key pillar of CISA's zero trust model.
5m read -
Human-AI Collaboration is Key to Secure Government Systems
Former CIA security chief emphasizes training and international standards for effective AI implementation.
23m watch -
Air Force, Coast Guard Talk Data Security Efforts for AI Development
The services' AI initiatives include efforts like creating clean training data, countering data poisoning and bridging siloed teams.
4m read -
Powering Defense with Transparent AI
AI and data innovation are transforming the Defense Department’s operations through cutting-edge initiatives.
20m read -
How Integrated Analytics Can Break Federal Data Silos
The Coleridge Initiative is leading the charge to modernize government data management, breaking down bureaucratic barriers by providing secure data access, advanced analytics and cross-agency collaboration tools.
11m watch -
DHS Secretary Urges Congress to Reauthorize CISA 2015
Federal leaders highlight CISA 2015's role in strengthening public-private partnerships and defending against evolving cyber threats.
3m read