CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读文章,抓住主要信息。 文章讲的是美国网络安全和基础设施安全局(CISA)要求联邦政府机构加强边缘网络设备的生命周期管理,并在12到18个月内移除不再接收安全更新的设备。边缘设备包括路由器、防火墙、物联网设备等,这些设备容易被网络攻击者利用。CISA还发布了具体的指令,要求机构更新软件、分类设备、移除不支持的设备,并建立管理流程。 接下来,我需要把这些信息浓缩成一句话,不超过一百个字。重点包括CISA的行动、目标、涉及的设备类型以及具体措施。同时,要确保语言简洁明了。 可能的结构是:CISA要求联邦机构加强边缘网络设备管理,移除过时设备以减少风险,并提供支持列表和时间表。 检查一下字数是否符合要求,确保没有遗漏关键点。最后,确保表达清晰,没有使用复杂的术语。 </think> 美国网络安全机构要求联邦政府机构加强边缘网络设备管理,在12至18个月内移除不再接收安全更新的设备以减少网络风险,并提供支持列表和时间表。 2026-2-6 13:43:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Federal Security / Infrastructure Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over the next 12 to 18 months.

The agency said the move is to drive down technical debt and minimize the risk of compromise, as state-sponsored threat actors turn such devices as a preferred access pathway for breaking into target networks.

Edge devices is an umbrella term that encompasses load balancers, firewalls, routers, switches, wireless access points, network security appliances, Internet of Things (IoT) edge devices, software-defined networks, and other physical or virtual networking components that route network traffic and hold privileged access.

"Persistent cyber threat actors are increasingly exploiting unsupported edge devices -- hardware and software that no longer receive vendor updates to firmware or other security patches," CISA said. "Positioned at the network perimeter, these devices are especially vulnerable to persistent cyber threat actors exploiting a new or known vulnerability."

To assist FCEB agencies in this regard, CISA said it has developed an end-of-support edge device list that acts as a preliminary repository with information about devices that have already reached end-of-support or are expected to lose support. This list will include the product name, version number, and end-of-support date.

The newly issued Binding Operational Directive 26-02, Mitigating Risk From End-of-Support Edge Devices, requires FCEB agencies to undertake the following actions -

  • Update each vendor-supported-edge device running end-of-support software to a vendor-supported software version (With immediate effect)
  • Catalog all devices to identify those that are end-of-support and report to CISA (Within three months)
  • Decommission all edge devices that  are end-of-support and listed in the edge device list from agency networks and replace them with vendor-supported devices that can receive security updates (Within 12 months)
  • Decommission all other identified edge devices from agency networks and replace with vendor-supported devices that can receive security updates (Within 18 months)
  • Establish a lifecycle management process to enable continuous discovery of all edge devices and maintain an inventory of those that are/will reach  end-of-support (Within 24 months)

"Unsupported devices pose a serious risk to federal systems and should never remain on enterprise networks," said CISA Acting Director Madhu Gottumukkala. "By proactively managing asset lifecycles and removing end-of-support technology, we can collectively strengthen resilience and protect the global digital ecosystem."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/cisa-orders-removal-of-unsupported-edge.html
如有侵权请联系:admin#unsafe.sh