What government agencies need to know about CISA’s new Binding Operational Directive
BOD 22-01 is set to play a major role in shaping how the United States government addresses nearly 300 known software security flaws and handles the unique threats we’re faced with in modern cybercrime. Read on to understand how BOD 22-01 will help shape federal cybersecurity and what agencies can do to keep up.
Your Information will be kept private.
Stay up to date on web security trends
Your Information will be kept private.

The Cybersecurity and Infrastructure Security Agency (CISA) is reinforcing the nation’s cybersecurity efforts by announcing a new Binding Operational Directive (BOD) related to common vulnerabilities and exposures. Also referred to as CVEs, these publicly disclosed flaws in software open doors that attackers are able to exploit at alarming rates: the FBI’s Internet Crime Complaint Center noted in its 2020 report that the department saw a massive 69% increase in suspected cybercrime complaints from 2019 to 2020.
Getting ahead of this worrisome trend, BOD 22-01 is set to play a role in shaping how the United States government addresses nearly 300 known software security flaws and handles the cyber threats we’re faced with today. “Vulnerabilities that have previously been used to exploit public and private organizations are a frequent attack vector for malicious cyber actors of all types,” the BOD states. “These vulnerabilities pose significant risk to agencies and the federal enterprise. It is essential to aggressively remediate known exploited vulnerabilities to protect federal information systems and reduce cyber incidents.”
It’s a widespread problem that all organizations creating and maintaining web apps need to pay attention to. In 2020 alone, 2 out of every 5 data breaches originated from web applications, and the number of records compromised in attacks rose by an alarming 141%. Applications with gaps in security coverage can be low-hanging fruit for threat actors to pluck while organizations are focused on their mission-critical apps. This is why continuously scanning every single application is so important, especially for federal agencies dealing with highly sensitive information daily.
New guidelines and timelines for federal agencies to follow
As outlined by the new directive, establishing a catalog of known flaws and laying out requirements for remediation is a step towards reducing the significant cybersecurity risk posed to federal agencies and, ultimately, the American people’s security and privacy. Serving as an enhancement to BOD 19-02, which focuses on critical and high-risk vulnerabilities in internet-facing federal information systems, BOD 22-01 specifies required actions that agencies must take within 60 days:- Review and update their vulnerability management processes following this new directive.
- Establish a remediation process for identified vulnerabilities using the CISA-managed catalog.
- Assign employees to specific roles and responsibilities that will help execute agency plans.
- Define the steps they need to take to complete the actions outlined in the directive
- Set in place procedures for internal validation and enforcement of the directive’s guidelines.
- Establish internal tracking and reporting guidance for transparency and adherence.