
January 12, 2026 — The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has retired 10 Emergency Directives (EDs) issued between 2019 and 2024 — marking the largest single retirement wave in agency history and a major milestone for federal cybersecurity maturity. Announced on January 8, 2026 (with formal updates continuing into January 10), this action confirms that the urgent mitigations required by these directives have been successfully implemented across Federal Civilian Executive Branch (FCEB) agencies or fully incorporated into Binding Operational Directive (BOD) 22-01 (Reducing the Significant Risk of Known Exploited Vulnerabilities). The retired EDs addressed some of the most severe and widely exploited vulnerabilities in recent years, including the SolarWinds supply-chain compromise, Microsoft Exchange ProxyLogon, Log4Shell, VMware vCenter flaws, Pulse Secure VPN issues, PrintNightmare, and others. This shift from reactive emergency orders to sustained, long-term requirements frees resources for emerging threats like AI-enhanced attacks, ransomware evolution, and cloud misconfigurations in 2026.
The retired directives span critical incidents that once required immediate federal action:
Seven of these were tied to specific Common Vulnerabilities and Exposures (CVEs) now tracked in CISA’s Known Exploited Vulnerabilities (KEV) catalog. The remaining three were closed because their objectives were achieved, risk postures evolved, and practices rendered them obsolete.
This largest-ever batch retirement reflects key advancements in federal cyber posture:
While federal agencies have met these requirements, private sector, critical infrastructure, and state/local entities should:
The retirement of these 10 Emergency Directives marks a deliberate shift from short-term crisis response to sustainable, long-term cybersecurity resilience. While legacy threats are being retired, the cyber landscape remains dynamic — with AI acceleration, ransomware sophistication, supply-chain risks, and nation-state actors driving new challenges. Organizations that treat BOD 22-01 and the KEV catalog as foundational elements of their strategy will be best positioned to mitigate risk in 2026 and beyond.
“The retirement of these ten Emergency Directives reflects CISA’s commitment to operational collaboration across the federal enterprise and our ongoing efforts to transition from reactive emergency response to proactive, enduring vulnerability management. By integrating these critical mitigations into BOD 22-01, we are ensuring agencies maintain a consistent, long-term approach to reducing significant risk from known exploited vulnerabilities.” CISA Acting Director Madhu Gottumukkala, January 10, 2026
For the complete list of retired directives and current BOD 22-01 requirements, visit the official CISA resources:
CISA Retires Ten Emergency Directives – Official Announcement

January 12, 2026 — The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has retired 10 Emergency Directives (EDs) issued between 2019 and 2024 — marking the largest single retirement wave in agency history and a major milestone for federal cybersecurity maturity. Announced on January 8, 2026 (with formal updates continuing into January 10), this action confirms that the urgent mitigations required by these directives have been successfully implemented across Federal Civilian Executive Branch (FCEB) agencies or fully incorporated into Binding Operational Directive (BOD) 22-01 (Reducing the Significant Risk of Known Exploited Vulnerabilities). The retired EDs addressed some of the most severe and widely exploited vulnerabilities in recent years, including the SolarWinds supply-chain compromise, Microsoft Exchange ProxyLogon, Log4Shell, VMware vCenter flaws, Pulse Secure VPN issues, PrintNightmare, and others. This shift from reactive emergency orders to sustained, long-term requirements frees resources for emerging threats like AI-enhanced attacks, ransomware evolution, and cloud misconfigurations in 2026.
The retired directives span critical incidents that once required immediate federal action:
Seven of these were tied to specific Common Vulnerabilities and Exposures (CVEs) now tracked in CISA’s Known Exploited Vulnerabilities (KEV) catalog. The remaining three were closed because their objectives were achieved, risk postures evolved, and practices rendered them obsolete.
This largest-ever batch retirement reflects key advancements in federal cyber posture:
While federal agencies have met these requirements, private sector, critical infrastructure, and state/local entities should:
The retirement of these 10 Emergency Directives marks a deliberate shift from short-term crisis response to sustainable, long-term cybersecurity resilience. While legacy threats are being retired, the cyber landscape remains dynamic — with AI acceleration, ransomware sophistication, supply-chain risks, and nation-state actors driving new challenges. Organizations that treat BOD 22-01 and the KEV catalog as foundational elements of their strategy will be best positioned to mitigate risk in 2026 and beyond.
“The retirement of these ten Emergency Directives reflects CISA’s commitment to operational collaboration across the federal enterprise and our ongoing efforts to transition from reactive emergency response to proactive, enduring vulnerability management. By integrating these critical mitigations into BOD 22-01, we are ensuring agencies maintain a consistent, long-term approach to reducing significant risk from known exploited vulnerabilities.” CISA Acting Director Madhu Gottumukkala, January 10, 2026
For the complete list of retired directives and current BOD 22-01 requirements, visit the official CISA resources:
CISA Retires Ten Emergency Directives – Official Announcement