Executive Order 14028: Strengthening Software Supply Chain Security with Safety CLI

May 24, 2024
6 mins
Discover how Executive Order 14028 aims to strengthen national cybersecurity by securing the software supply chain. This blog post breaks down EO 14028's key components and demonstrates how Safety CLI helps organizations achieve compliance. Learn about enhancing threat information sharing, modernizing cybersecurity standards, improving software supply chain security, and establishing incident response protocols. Stay ahead of cyber threats and protect your digital assets with Safety CLI.

In the face of escalating cyber threats, the U.S. government took decisive steps towards bolstering national cybersecurity with Executive Order (EO) 14028. This landmark directive, signed in 2021, underscores the need for enhanced cybersecurity measures across federal agencies and their private sector partners, particularly focusing on securing the software supply chain.


Recent high-profile cyber incidents have highlighted vulnerabilities in software supply chains, driving home the necessity for robust cybersecurity strategies. EO 14028 aims to mitigate these risks by mandating comprehensive security practices that ensure the integrity, confidentiality, and availability of software used within federal sectors. For businesses and organizations, the executive order offers a blueprint to elevate their security posture and safeguard critical infrastructure.

Understanding EO 14028

Purpose and Scope

EO 14028 is designed to modernize and strengthen the cybersecurity defenses of federal agencies. Its directives focus on:

  • Enhancing the security of software supply chains.
  • Improving information sharing between the government and private sector.
  • Implementing advanced security practices and standards across agencies.

By compelling federal entities to adhere to stringent security protocols, EO 14028 aims to set a new standard for cybersecurity excellence, encouraging the private sector to follow suit.

Importance for Federal Agencies and Private Sector Partners

The executive order's emphasis on software supply chain security is particularly relevant given the growing reliance on third-party software components in modern applications. Cyber adversaries increasingly exploit these dependencies to launch sophisticated attacks, making it imperative for both federal agencies and the private sector to adopt proactive security measures.

Core Areas of EO 14028

EO 14028 delineates several core areas for enhancing cybersecurity. These include:

  1. Improved Threat Information Sharing: Facilitating seamless communication between the government and private sector to promptly address and mitigate emerging threats.
  2. Modernizing Federal Government Cybersecurity: Mandating the adoption of zero trust architecture and cloud services to enhance security resilience.
  3. Enhancing Software Supply Chain Security: Establishing guidelines for secure software development practices and ensuring the use of trusted code.
  4. Establishing a Cybersecurity Safety Review Board: Creating a board to analyze significant cyber incidents and recommend improvements.
  5. Standardizing Federal Incident Response: Developing consistent incident response procedures across federal agencies.
  6. Improving Detection of Cybersecurity Incidents: Enhancing logging capabilities to improve incident detection and investigation.
  7. Improving Investigative and Remediation Capabilities: Ensuring effective remediation strategies following cyber incidents.

Focus on Software Supply Chain Security

The mandate to secure the software supply chain is crucial for protecting against supply chain attacks. This involves:

  • Mandating Secure Development Practices: Developers are required to follow secure coding practices and undergo rigorous security training.
  • Implementing Multi-Factor Authentication (MFA): Ensuring that access to sensitive systems requires multiple forms of verification.
  • Conducting Regular Vulnerability Scanning: Continuously assessing software for vulnerabilities to promptly address potential risks.

Safety CLI: Empowering Software Supply Chain Security

At Safety, we recognize the critical need for robust security solutions tailored to modern software development environments. Our flagship product, Safety CLI, is a vulnerability scanner designed to safeguard software supply chains by providing comprehensive and real-time security intelligence.

Key Features of Safety CLI

  1. Unparalleled Vulnerability Data: Leveraging the most extensive source of vulnerability data for Python and JavaScript, with plans to support Java soon.
  2. AI-Driven Insights: Utilizing artificial intelligence to provide actionable recommendations and enhance overall security posture.
  3. Comprehensive Coverage: Scanning for vulnerabilities across all stages of software development, from local environments to CI/CD pipelines and production systems.
  4. User-Friendly Integration: Seamlessly integrating with development workflows to ensure minimal disruption and maximum security.

How Safety CLI Aligns with EO 14028

Safety CLI embodies the principles outlined in EO 14028 by promoting secure development practices. It encourages developers to perform vulnerability scans at every stage of the development lifecycle, without requiring changes to workflow. By integrating Safety CLI into your development processes, you can fortify your software supply chain against emerging threats.


Executive Order 14028 represents a pivotal step towards strengthening the cybersecurity landscape, particularly in securing software supply chains. As cyber threats continue to evolve, it is imperative for organizations to adopt proactive security measures that align with the directives of EO 14028.

Safety Cybersecurity stands at the forefront of this effort, offering cutting-edge tools and insights to safeguard your software development projects. By leveraging our comprehensive vulnerability scanner, you can enhance your security posture, ensure compliance with federal mandates, and protect your critical infrastructure from malicious actors.

Reduce vulnerability noise by 90%.
Get a demo today to learn more.