Compliance

DHS/CISA Binding Operational Directives and supply chain cascade effects in 2026

BOD 22-01 (KEV) and BOD 23-02 (external attack surface) apply directly to federal civilian agencies, but their downstream contractual cascade into the software supply chain is now the more consequential effect.

Hritik Sharma
Security Engineer
8 min read

A Binding Operational Directive under 44 U.S.C. § 3553(b)(2) is a compulsory direction from the Cybersecurity and Infrastructure Security Agency to federal civilian executive branch agencies, requiring those agencies to take specified actions to address known or reasonably anticipated information-security threats. BODs are not regulations under the Administrative Procedure Act, do not bind the private sector directly, and apply only to federal civilian agencies (the Department of Defense and the Intelligence Community operate under their own authorities). The mechanism by which BODs affect private-sector software supply chains is therefore indirect: agencies fold BOD requirements into their procurement language, prime contractors flow those requirements down to subcontractors, and within a few procurement cycles the BOD is functionally a private-sector compliance obligation for anyone selling software into the federal civilian space.

BOD 22-01, issued in November 2021, established the Known Exploited Vulnerabilities (KEV) catalog and required agencies to remediate KEV-listed vulnerabilities within fixed timelines. BOD 23-02, issued in June 2023, required agencies to disable internet-exposed management interfaces. Both directives sit on top of an earlier scaffold (BOD 18-02, BOD 19-02, BOD 20-01) that established baseline scanning and reporting requirements. The cascade effect of the more recent directives is now the operative compliance story for software vendors selling to federal customers, and the same patterns are showing up in state and large-enterprise procurement language.

What does BOD 22-01 actually require, and how does it cascade?

BOD 22-01 directs federal civilian agencies to remediate vulnerabilities listed in the CISA KEV catalog within timelines set in the directive: two weeks for KEVs added after the directive's effective date with a CVE published in 2021 or later, and six months for KEVs from earlier years. The catalog as of early 2026 contains over 1,300 entries, with new additions roughly weekly based on credible evidence of in-the-wild exploitation. The catalog is curated, not algorithmic — CISA adds an entry only when it has evidence (typically from intelligence sources, industry partners, or observed incidents) that the vulnerability is actively being exploited.

The directive applies to all federal information systems, including cloud-hosted systems and systems operated by contractors on behalf of an agency. The "on behalf of an agency" clause is the cascade lever: a managed-service provider operating a system for the Department of Homeland Security inherits the BOD 22-01 obligations through its contract, even though CISA cannot order the MSP directly. Prime contractors with FedRAMP-authorized offerings flow the requirements down to subcontractors that provide components or services to the FedRAMP boundary, and the contractual cascade keeps going.

In 2025 and 2026 we have seen the cascade reach unexpected places. A small open-source-tooling vendor whose product is embedded in a CI/CD pipeline used by a FedRAMP High system has been asked, through the prime, for evidence that its product's dependencies are tracked against the KEV catalog and patched within the directive's timelines. That ask is contractually defensible — the prime needs to demonstrate compliance up the chain — but it imposes a real engineering burden on small vendors who did not contemplate federal use when they built the product. The result is a software-supply-chain market in which KEV alignment is becoming a baseline expectation, not a federal-specific concession.

What does BOD 23-02 actually require, and why is it harder?

BOD 23-02, issued June 2023, requires federal civilian agencies to remove from public-internet exposure any networked management interface for federal information systems, or to implement Zero Trust Architecture (ZTA) capabilities that effectively isolate access. The directive lists categories of interfaces explicitly — HTTP/HTTPS management consoles, SSH, RDP, SMB, Telnet, FTP, SNMP — and gives agencies fourteen days from discovery to remediate.

The reason this directive is harder than 22-01 is that it interacts with operational reality in ways that BOD 22-01 does not. Removing a management interface from the internet typically requires a bastion host, a VPN, or a Zero Trust access broker, and standing up those mechanisms in front of legacy systems is non-trivial. CISA acknowledged the complexity by allowing the ZTA-equivalent path, but agencies have not all moved at the same speed, and the directive has been the subject of follow-up CISA technical guidance throughout 2024 and 2025.

The supply-chain cascade for BOD 23-02 has been most visible in network-appliance and virtualization vendors, where management interfaces are a core product affordance. Vendors selling to federal customers have shipped configuration changes that default management interfaces to non-routable interfaces, added native ZTA integrations, and published deployment guidance that walks customers through BOD 23-02 compliance. The trickier cascade is into software products that ship management consoles as part of self-hosted deployments — those vendors have had to make architectural changes to their products to support BOD-compliant deployment topologies, and those changes are now embedded in the products that other federal customers (and non-federal customers) consume.

How are these BODs interacting with FedRAMP and FAR?

The FedRAMP program operates a separate authorization regime under the Joint Authorization Board and individual agency authorizations, but the FedRAMP control baseline implicitly incorporates BOD requirements because federal agencies subscribing to a FedRAMP-authorized service cannot use that service in a way that violates a BOD. FedRAMP authorizing officials have, throughout 2024-2026, been increasingly explicit about BOD alignment as a continuous monitoring expectation. A CSP whose service ingests vulnerabilities into its plan of action and milestones (POA&M) but does not remediate KEV-listed vulnerabilities within BOD 22-01 timelines faces continuous-monitoring escalation.

The Federal Acquisition Regulation has been moving in the same direction. FAR Part 4 cybersecurity clauses have proliferated since 2023 (the CMMC final rule, the FAR contractor SBOM clause proposed in October 2023, the FAR controlled-unclassified-information clause), and the proposed rules contemplate flow-down of BOD-aligned obligations through contractor and subcontractor tiers. The CISA Secure Software Development Attestation (SSDF attestation) under EO 14028 sits alongside this and creates a parallel compliance track for software producers selling to federal civilian customers.

The net effect is that a software vendor selling to federal customers in 2026 cannot treat BOD compliance, FedRAMP compliance, FAR clauses, and SSDF attestation as independent compliance regimes. They are interlocking, and an engineering practice that satisfies one (continuous vulnerability scanning with KEV-priority remediation, for example) is doing useful work across all of them.

How is this changing what good vulnerability management looks like?

The clearest practical change is that KEV catalog alignment has displaced CVSS score as the primary triage signal for federal-facing programs. CVSS continues to be relevant as a severity indicator, but the KEV catalog is the operative prioritization signal because BOD 22-01 ties it to a binding remediation timeline. Mature programs now run their vulnerability management on two clocks: a KEV clock (with the BOD-aligned remediation SLA) and an internal clock for non-KEV vulnerabilities (typically driven by CVSS, exploit prediction signals like EPSS, and reachability analysis).

Reachability analysis has become a workable bridge between the two clocks in 2026. A non-KEV vulnerability that is also reachable in the runtime context of a federal-facing product can be triaged at the KEV-equivalent priority. A KEV-listed vulnerability that is provably unreachable in the deployed configuration can be documented in a VEX statement and flagged for remediation on a longer cycle without violating the spirit of the BOD (CISA has indicated that VEX-backed non-applicability is acceptable in agency reporting, although the documentation expectations are real).

For software vendors specifically, the engineering implication is that the SBOM is the foundational compliance artifact and the KEV-mapped vulnerability list is the operational compliance artifact. The two have to be tied together with reachability and exploitability evidence, and that tying has to be auditable.

How Safeguard Helps

Safeguard treats KEV alignment, SBOM continuity, and reachability-backed prioritization as a single connected workflow rather than three independent reports. The platform ingests the CISA KEV catalog continuously, maps each entry against your SBOMs in real time, and surfaces remediation work on the BOD-aligned timeline so your federal customers and primes can see the evidence they need to flow up. Griffin AI translates ad-hoc vendor questionnaires (which often paraphrase BOD language) into precise queries against your security posture, drafts the response language with citations to underlying evidence, and flags gaps before they become procurement blockers. Policy gates block deployment of artifacts carrying unmitigated KEV-listed vulnerabilities, generate the audit trail that contractor flow-down language increasingly demands, and integrate with SSDF attestation workflows so the same evidence base supports your CISA Form attestation. The result is a federal-facing compliance posture grounded in continuously generated evidence rather than once-a-quarter spreadsheets.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.