Trump Rewrites Cybersecurity Policy in Executive Order

[Government](https://www.govinfosecurity.com/government-c-524) , [Industry Specific](https://www.govinfosecurity.com/industry-specific-c-515) , [Standards, Regulations -& Compliance](https://www.govinfosecurity.com/standards-regulations-compliance-c-435)Trump Rewrites Cybersecurity Policy in Executive Order======================================================White House Limits Cyber Sanctions, Cuts Digital ID Mandates and Refocuses AI Rules [David Perera](https://www.govinfosecurity.com/authors/david-perera-i-5119) ([@daveperera](https://www.twitter.com/@daveperera)) , [Chris Riotta](https://www.govinfosecurity.com/authors/chris-riotta-i-6140) ([@chrisriotta](https://www.twitter.com/@chrisriotta)) • June 7, 2025 [](https://www.bankinfosecurity.com/trump-rewrites-biden-era-cyber-rules-in-new-executive-order-a-28617#disqus_thread) * * * * * [Credit Eligible](/premium/pricing ‘As a BankInfoSecurity.com annual member, this content can be used toward your membership credits and transcript tracking.’)* [](/premium/pricing ‘As a BankInfoSecurity.com annual member, this content can be used toward your membership credits and transcript tracking.’)* Get Permission* ![Trump Rewrites Cybersecurity Policy in Executive Order](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/trump-rewrites-biden-era-cyber-rules-in-new-executive-order-showcase_image-2-a-28617.jpg) Image: Keith J Finks/ShutterstockPresident Donald Trump signed Friday an executive order reframing U.S. cybersecurity policy, eliminating what the Republican White House described as ‘problematic elements’ inherited from Democratic administrations.**See Also:** [Cisco Umbrella for Government: Helping Agencies Meet Their Enhanced Cybersecurity Mandates and TIC3.0 Standards](https://www.govinfosecurity.com/whitepapers/cisco-umbrella-for-government-helping-agencies-meet-their-enhanced-w-13612?rf=RAM_SeeAlso)The new [order](https://www.whitehouse.gov/presidential-actions/2025/06/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694-and-executive-order-14144/) strikes a push for digital identity documents [made](https://www.federalregister.gov/documents/2025/01/17/2025-01470/strengthening-and-promoting-innovation-in-the-nations-cybersecurity) by then-President Joe Biden in one of his last acts as commander in chief. Digital IDs, the White House said, ‘risked widespread abuse by enabling illegal immigrants to improperly access public benefits’ (see: [*Final Biden Cybersecurity Order Will Face Political Hurdles*](/experts-warn-cybersecurity-order-will-face-political-hurdles-a-27262)).It reaches back into the presidency of Barack Obama to strike [policy in effect since 2015]( https://www.federalregister.gov/documents/2015/04/02/2015-07788/blocking-the-property-of-certain-persons-engaging-in-significant-malicious-cyber-enabled-activities) allowing sanctions against ‘any person’ engaged in foreign-directed hacking operations. The new policy is that only a ‘foreign person’ can be sanctioned.A White House fact sheet [says](https://www.whitehouse.gov/fact-sheets/2025/06/fact-sheet-president-donald-j-trump-reprioritizes-cybersecurity-efforts-to-protect-america/) the order limits cyber sanctions strictly to foreign malicious actors to prevent ‘misuse against domestic political opponents’ and criticizes the Biden administration for ‘micromanaging technical cybersecurity decisions better handled at the department and agency level.’The announcement – which also says ‘cybersecurity is too important to be reduced to a mere political football’ – comes just days after the White House proposed deep budget and staffing cuts at CISA, a move analysts and former officials warn could seriously weaken federal cyber defenses (see: [*’There Will Be Pain’: CISA Cuts Spark Bipartisan Concerns*](/there-will-be-pain-cisa-cuts-spark-bipartisan-concerns-a-28610)).In a prepared statement, the Better identity Coalition, a lobbying association that includes Apple, Microsoft, banks and Okta, decried the White House’s repudiation of digital ID. ‘Nothing in January’s EO included a mandate for the U.S. government to issue digital IDs to anybody – immigrants, or otherwise,’ said Jeremy Grant, association coordinator.-*The Trump order removes a Biden requirement that would have required software developers to submit attestations validating their use of secure software development practices that were outlined in a 2021 [executive order](https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity). The Trump order says the government will lean on voluntary secure software development guidance developed by consortium established by the National Cybersecurity Center of Excellence with industry.In one change that imposes a deadline rather than lifting it, the order directs the Cybersecurity and Infrastructure Security Agency to establish by Dec. 1, 2025 a list of product categories that widely support post-quantum cryptography. Experts say a transition to post-quantum cryptography should begin immediately to head off ‘harvest now, decrypt later’ attacks in which foreign powers save intercepted encrypted communications for later decryption by a quantum computer. Most experts anticipate that a ‘cryptanalytically relevant quantum computer’ – as it is known – will likely come online in the first years of the coming decade. The Biden administration in 2024 [estimated](https://dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com/external/refpqc-reportfinalsend.pdf) the cost through 2035 for transitioning key federal systems to post-quantum encryption will be at least $7.1 billion (see: [*US NIST Formalizes 3 Post-Quantum Algorithms*](/us-nist-formalizes-three-post-quantum-algorithms-a-26011)).The order places new emphasis on artificial intelligence software flaws within interagency coordination for vulnerability management, ‘including through incident tracking, response, and reporting, and by sharing indicators of compromise for AI systems.’It gives the Trump administration stamp of approval for a cybersecurity labeling program for Internet of Things devices launched by the Democratically-controlled Federal Communications Commission during its last month in power. Federal agencies, the order says, should start within a year to only but IoT devices that carry a U.S. States Cyber Trust Mark (see: [*White House Launches US Cyber Trust Mark for IoT Devices*](/white-house-launches-us-cyber-trust-mark-for-iot-devices-a-27249)).*-*Update June 7, 2025 18:40 UTC: Adds statement from Better identity Coalition* ![David Perera](https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/david-perera-largeImage-5-a-5119.jpeg) #### [David Perera](https://www.govinfosecurity.com/authors/david-perera-i-5119)*Editorial Director, News, ISMG* Perera is editorial director for news at Information Security Media Group. He previously covered privacy and data security for outlets including MLex and Politico.[](https://twitter.com/@daveperera) [](https://www.linkedin.com/in/dperera) [](mailto:dperera@ismg.io) ![Chris Riotta](https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/chris-riotta-largeImage-2-a-6140.jpg) #### [Chris Riotta](https://www.govinfosecurity.com/authors/chris-riotta-i-6140)*Managing Editor, GovInfoSecurity* Riotta is a journalist based in Washington, D.C. He earned his master’s degree from the Columbia University Graduate School of Journalism, where he served as 2021 class president. His reporting has appeared in NBC News, Nextgov/FCW, Newsweek Magazine, The Independent and more.[](https://twitter.com/@chrisriotta) [](mailto:criotta@ismg.io) ![OnDemand | Agency Armor: Cybersecurity Compliance Essentials for Resource-Constrained Teams](https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-cybersecurity-compliance-essentials-for-resource-constrained-state-local-governments-landingPageImage-4-w-5345.jpg) ##### [OnDemand -| Agency Armor: Cybersecurity Compliance Essentials for Resource-Constrained Teams](https://www.govinfosecurity.com/webinars/ondemand-agency-armor-cybersecurity-compliance-essentials-for-resource-w-5345?rf=RAM_Resources)![Making Sense of FedRAMP and StateRAMP](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/making-sense-fedramp-stateramp-showcase_image-8-a-21877.jpg) ##### [Making Sense of FedRAMP and StateRAMP](https://www.govinfosecurity.com/making-sense-fedramp-stateramp-a-21877?rf=RAM_Resources)![OnDemand | How To Meet Your Zero Trust Goals Through Advanced Endpoint Strategies](https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-breaking-down-nist-800-207-to-streamline-your-endpoints-zero-trust-compliance-landingPageImage-9-w-4371.jpg) ##### [OnDemand -| How To Meet Your Zero Trust Goals Through Advanced Endpoint Strategies](https://www.govinfosecurity.com/webinars/ondemand-how-to-meet-your-zero-trust-goals-through-advanced-endpoint-w-4371?rf=RAM_Resources)![Your Guide to FISMA Compliance and Firmware Security](https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/your-guide-to-fisma-compliance-firmware-security-pdf-2-w-8893.jpg) [whitepaper](https://www.govinfosecurity.com/whitepapers/your-guide-to-fisma-compliance-firmware-security-w-8893?rf=RAM_Resources)##### [Your Guide to FISMA Compliance and Firmware Security](https://www.govinfosecurity.com/whitepapers/your-guide-to-fisma-compliance-firmware-security-w-8893?rf=RAM_Resources)![The Present and Future of Security Operations](https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/present-future-security-operations-logo-7-w-5912.JPG) [whitepaper](https://www.govinfosecurity.com/whitepapers/present-future-security-operations-w-5912?rf=RAM_Resources)##### [The Present and Future of Security Operations](https://www.govinfosecurity.com/whitepapers/present-future-security-operations-w-5912?rf=RAM_Resources)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/trump-rewrites-biden-era-cyber-rules-in-new-executive-order-showcase_image-2-a-28617.jpg) [Government](https://www.govinfosecurity.com/government-c-524)##### [Trump Rewrites Cybersecurity Policy in Executive Order](https://www.govinfosecurity.com/trump-rewrites-cybersecurity-policy-in-executive-order-a-28617)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/fbi-warns-badbox-20-botnet-surge-in-chinese-devices-showcase_image-8-a-28616.jpg) [Cybercrime](https://www.govinfosecurity.com/cybercrime-c-416)##### [FBI Warns of BADBOX 2.0 Botnet Surge in Chinese Devices](https://www.govinfosecurity.com/fbi-warns-badbox-20-botnet-surge-in-chinese-devices-a-28616)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/us-supreme-court-grants-doge-unfettered-access-to-ssa-systems-showcase_image-8-a-28614.jpg) [Data Privacy](https://www.govinfosecurity.com/data-privacy-c-151)##### [US Supreme Court Grants DOGE Unfettered Access to SSA Systems](https://www.govinfosecurity.com/us-supreme-court-grants-doge-unfettered-access-to-ssa-systems-a-28614)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/eu-prepares-for-transnational-cyberattacks-showcase_image-4-a-28613.jpg) [Critical Infrastructure Security](https://www.govinfosecurity.com/critical-infrastructure-security-c-525)##### [EU Prepares for Transnational Cyberattacks](https://www.govinfosecurity.com/eu-prepares-for-transnational-cyberattacks-a-28613)![](https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/da-sleep-center-worker-installed-secret-camera-in-bathrooms-showcase_image-7-a-28611.jpg) [Data Privacy](https://www.govinfosecurity.com/data-privacy-c-151)##### [DA: Sleep Center Worker Installed Secret Camera in Bathrooms](https://www.govinfosecurity.com/da-sleep-center-worker-installed-secret-camera-in-bathrooms-a-28611)[Overview](https://www.govinfosecurity.com/webinars/risk-management-framework-learn-from-nist-w-255) * Twitter* Facebook* LinkedIn* * * From heightened risks to increased regulations, senior leaders at all levels are pressured to improve their organizations’ risk management capabilities. But no one is showing them how – until now.Learn the fundamentals of developing a risk management program from the man who wrote the book on the topic: Ron Ross, computer scientist for the National Institute of Standards and Technology. In an exclusive presentation, Ross, lead author of NIST Special Publication 800-37 – the bible of risk assessment and management – will share his unique insights on how to:* Understand the current cyber threats to all public and private sector organizations;* Develop a multi-tiered risk management approach built upon governance, processes and information systems;* Implement NIST’s risk management framework, from defining risks to selecting, implementing and monitoring information security controls.Presented By————![Ron Ross](https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/ron-ross-smallImage-a-558.jpg) [Presented By](/authors/ron-ross-i-558)—————————————#### [Ron Ross](/authors/ron-ross-i-558)*Sr. Computer Scientist -& Information Security Researcher, National Institute of Standards and Technology (NIST)*

Related Tags:
NAICS: 54 – Professional

Scientific

Technical Services

NAICS: 517 – Telecommunications

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 92 – Public Administration

NAICS: 51 – Information

Blog: GovInfoSecurity

Obtain Capabilities: Vulnerabilities

Obtain Capabilities

Associated Indicators:
dperera@ismg.io